{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T02:41:08Z","timestamp":1772851268967,"version":"3.50.1"},"reference-count":48,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T00:00:00Z","timestamp":1734480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>With the introduction of new Information and Communication Technology (ICT) to Electrical Power Systems (EPSs) there is an increased potential and impact of cyber-attacks. Phasor Measurement Units (PMUs) enable very fine granular measurements to allow situational awareness in smart grids. But false data injection attacks, which manipulate measurement data, can trigger wrong decisions and cause critical situations in the grid. In this paper, we analyze four different false data injection attacks on PMU measurements and investigate different methods to detect such attacks. Classical bad data detection methods are not sufficient to detect stealthy attacks. We therefore propose to complement detection by additional methods. For this we analyze the detection performance of four very different detection methods: (a) the classical adaptive bad data detection approach based on the residuals of linear Kalman Filters, (b) a simple threshold based on the Median Average Deviation (MAD), (c) a distribution-based approach using the Kullback-Leibler Divergence (KLD), and (d) the cumulative sum (CUSUM) as a representative of a change point detection method. We show that each method has advantages and disadvantages and that multiple methods should be used together to prevent that attackers can circumvent detection.<\/jats:p>","DOI":"10.3389\/fcomp.2024.1504548","type":"journal-article","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T06:43:57Z","timestamp":1734504237000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An evaluation of methods for detecting false data injection attacks in the smart grid"],"prefix":"10.3389","volume":"6","author":[{"given":"Sarita","family":"Paudel","sequence":"first","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2024,12,18]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1201\/9780203913673","author":"Abur","year":"2004","journal-title":"Power System State Estimation: Theory and Implementation"},{"key":"B2","volume-title":"Detection of Abrupt Changes: Theory and Application","author":"Basseville","year":"1993"},{"key":"B3","article-title":"\u201cDetecting false data injection attacks on dc state estimation,\u201d","author":"Bobba","year":"2010","journal-title":"Preprints of the first workshop on secure control systems, CPSWEEK (Vol"},{"key":"B4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: a survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv"},{"key":"B5","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1109\/TSG.2015.2388545","article-title":"Detecting false data injection attacks in AC state estimation","volume":"6","author":"Chaojun","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"key":"B6","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1049\/iet-stg.2019.0320","article-title":"Quickest attack detection in smart grid based on sequential Monte Carlo filtering","volume":"3","author":"Chen","year":"2020","journal-title":"IET Smart Grid"},{"key":"B7","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/61.85843","article-title":"Power system fault detection and state estimation using Kalman filter with hypothesis testing","volume":"6","author":"Chowdhury","year":"1991","journal-title":"IEEE Trans. Power Deliv"},{"key":"B8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","article-title":"Coordinated data-injection attack and detection in the smart grid: a detailed look at enriching detection solutions","volume":"29","author":"Cui","year":"2012","journal-title":"IEEE Signal Proc. Magaz"},{"key":"B9","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TPWRS.1987.4335300","article-title":"An efficient dynamic state estimation algorithm including bad data processing","volume":"2","author":"Da Silva","year":"1987","journal-title":"IEEE Trans. Power Syst"},{"key":"B10","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/SMARTGRID.2010.5622046","article-title":"\u201cStealth attacks and protection schemes for state estimators in power systems,\u201d","volume-title":"2010 First IEEE International Conference on Smart Grid Communications","author":"D\u00e1n","year":"2010"},{"key":"B11","unstructured":"Epfl smart grid"},{"key":"B12","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1109\/ICACCI.2017.8126013","article-title":"\u201cEnhancing control system security of power grid using anomaly detection and behaviour analysis,\u201d","volume-title":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","author":"Gokarn","year":"2017"},{"key":"B13","first-page":"1","article-title":"\u201cBlackout risk analysis in smart grid WAMPAC system using KL divergence approach,\u201d","volume-title":"2016 IEEE 6th International Conference on Power Systems (ICPS)","author":"Gupta","year":"2016"},{"key":"B14","article-title":"\u201cSelecting weighting factors in logarithmic opinion pools,\u201d","author":"Heskes","year":"1998","journal-title":"Advances in Neural Information Processing Systems"},{"key":"B15","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1109\/CDC.2004.1428738","article-title":"\u201cA distributed multiple-target identity management algorithm in sensor networks,\u201d","volume-title":"2004 43rd IEEE Conference on Decision and Control (CDC) (Cat. No.04CH37601) (IEEE)","author":"Hwang","year":"2004"},{"key":"B16","author":"Jones","year":"2011","journal-title":"Three-phase linear state estimation with phasor measurements"},{"key":"B17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/PESMG.2013.6672516","article-title":"\u201cThree-phase linear state estimation using phasor measurements,\u201d","volume-title":"2013 IEEE Power and Energy Society General Meeting","author":"Jones","year":"2013"},{"key":"B18","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1016\/j.epsr.2011.03.013","article-title":"State estimation and bad data processing for systems including PMU and SCADA measurements","volume":"81","author":"Korres","year":"2011","journal-title":"Electric Power Syst. Res"},{"key":"B19","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/DSN.2016.44","article-title":"\u201cF-DETA: a framework for detecting electricity theft attacks in smart grids,\u201d","volume-title":"2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Krishna","year":"2016"},{"key":"B20","volume-title":"Information Theory and Statistics","author":"Kullback","year":"1968"},{"key":"B21","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","article-title":"On information and sufficiency","volume":"22","author":"Kullback","year":"1951","journal-title":"Ann. Mathem. Stat"},{"key":"B22","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1109\/TIFS.2018.2800908","article-title":"Distributed quickest detection of cyber-attacks in smart grid","volume":"13","author":"Kurt","year":"2018","journal-title":"IEEE Trans. Inf. Foren. Secur"},{"key":"B23","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1016\/j.jesp.2013.03.013","article-title":"Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median","volume":"49","author":"Leys","year":"2013","journal-title":"J. Exper. Soc. Psychol"},{"key":"B24","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.inffus.2019.02.009","article-title":"Second-order statistics analysis and comparison between arithmetic and geometric average fusion: application to multi-sensor target tracking","volume":"51","author":"Li","year":"2019","journal-title":"Inf. Fusion"},{"key":"B25","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.inffus.2021.02.020","article-title":"A distributed particle-PHD filter using arithmetic-average fusion of gaussian mixture parameters","volume":"73","author":"Li","year":"2021","journal-title":"Inf. Fusion"},{"key":"B26","article-title":"\u201cFalse data injection attacks against state estimation in electric power grids,\u201d","author":"Liu","year":"2011","journal-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '011"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727543","article-title":"\u201cWeighted vote algorithm combination technique for anomaly based smart grid intrusion detection systems,\u201d","author":"Lueckenga","year":"2016","journal-title":"2016 International Joint Conference on Neural Networks (IJCNN)"},{"key":"B28","doi-asserted-by":"publisher","DOI":"10.1117\/12.395064","article-title":"\u201cOptimal\/robust distributed data fusion: a unified approach,\u201d","author":"Mahler","year":"2000","journal-title":"SPIE Defense"},{"key":"B29","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/TCNS.2014.2357531","article-title":"Detection of faults and attacks including false data injection attack in smart grid using Kalman filter","volume":"1","author":"Manandhar","year":"2014","journal-title":"IEEE Trans. Control Netw. Syst"},{"key":"B30","doi-asserted-by":"crossref","DOI":"10.1002\/0470010940","volume-title":"Robust Statistics: Theory and Methods","author":"Maronna","year":"2006"},{"key":"B31","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.epsr.2018.01.005","article-title":"Review of non-technical loss detection methods","volume":"158","author":"Messinis","year":"2018","journal-title":"Electr. Power Syst. Res"},{"key":"B32","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1080\/14640749108400962","article-title":"Reaction time analysis with outlier exclusion: bias varies with sample size","volume":"43","author":"Miller","year":"1991","journal-title":"Quart. J. Exper. Psychol. Sect. A"},{"key":"B33","article-title":"Smart false data injection attacks against state estimation in power grid","author":"Mohammad","year":"2018","journal-title":"arXiv preprint arXiv:1809.07039"},{"key":"B34","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-031-68302-2_4","article-title":"\u201cToward a knowledge-based anomaly identification system for detecting anomalies in the smart grid,\u201d","author":"Paudel","year":"2024","journal-title":"Database and Expert Systems Applications"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230868","article-title":"\u201cStealthy attacks on smart grid PMU state estimation,\u201d","author":"Paudel","year":"2018","journal-title":"Proceedings of the 13th International Conference on Availability, Reliability and Security"},{"key":"B36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISGT.2015.7131877","article-title":"\u201cReal-time state estimation of the EPFL-campus medium-voltage grid by using PMUs,\u201d","volume-title":"2015 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT)","author":"Pignati","year":"2015"},{"key":"B37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/PSCC.2014.7038329","article-title":"\u201cA pre-estimation filtering process of bad data for linear power systems state estimators using PMUs,\u201d","volume-title":"2014 Power Systems Computation Conference","author":"Pignati","year":"2014"},{"key":"B38","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.3844\/ajassp.2012.1636.1652","article-title":"A survey of intrusion detection schemes in wireless sensor networks","volume":"9","author":"Rassam","year":"2012","journal-title":"Am. J. Appl. Sci"},{"key":"B39","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1080\/01621459.1993.10476408","article-title":"Alternatives to the median absolute deviation","volume":"88","author":"Rousseeuw","year":"1993","journal-title":"J. Am. Statist. Assoc"},{"key":"B40","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/TIM.2015.2510598","article-title":"Performance assessment of linear state estimators using synchrophasor measurements","volume":"65","author":"Sarri","year":"2016","journal-title":"IEEE Trans. Instrument. Measur"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330147","article-title":"\u201cCombining filtering and statistical methods for anomaly detection,\u201d","author":"Soule","year":"2005","journal-title":"Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement"},{"key":"B42","doi-asserted-by":"crossref","first-page":"5991","DOI":"10.1109\/CDC.2010.5717318","article-title":"\u201cCyber security analysis of state estimators in electric power systems,\u201d","volume-title":"49th IEEE Conference on Decision and Control (CDC)","author":"Teixeira","year":"2010"},{"key":"B43","doi-asserted-by":"publisher","first-page":"108912","DOI":"10.1016\/j.sigpro.2022.108912","article-title":"Robust fusion of gm-phd filters based on geometric average","volume":"206","author":"Wei","year":"2023","journal-title":"Signal Proc"},{"key":"B44","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TSIPN.2018.2790361","article-title":"A novel data fusion algorithm to combat false data injection attacks in networked radar systems","volume":"4","author":"Yang","year":"2018","journal-title":"IEEE Trans. Signal Inf. Proc. Over Netw"},{"key":"B45","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1109\/LSP.2024.3356823","article-title":"Hierarchical average fusion with gm-phd filters against fdi and dos attacks","volume":"31","author":"Yang","year":"2024","journal-title":"IEEE Signal Process. Lett"},{"key":"B46","author":"Zanni","year":"2017","journal-title":"Power system estimation based on PMUs-static and dynamic approaches from theory to real implementation"},{"key":"B47","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","article-title":"Outlier detection techniques for wireless sensor networks: a survey","volume":"12","author":"Zhang","year":"2010","journal-title":"IEEE Commun. Surv. Tutor"},{"key":"B48","author":"Zhang","year":"2007","journal-title":"A taxonomy framework for unsupervised outlier detection techniques for multi-type data sets"}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1504548\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T06:44:07Z","timestamp":1734504247000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1504548\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,18]]},"references-count":48,"alternative-id":["10.3389\/fcomp.2024.1504548"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2024.1504548","relation":{},"ISSN":["2624-9898"],"issn-type":[{"value":"2624-9898","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,18]]},"article-number":"1504548"}}