-
Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics
Authors:
Abdallah Alalem Albustami,
Ahmad F. Taha
Abstract:
As water distribution networks (WDNs) become increasingly connected with digital infrastructures, they face greater exposure to cyberattacks that threaten their operational integrity. Stealthy False Data Injection Attacks (SFDIAs) are particularly concerning, as they manipulate sensor data to compromise system operations while avoiding detection. While existing studies have focused on either detec…
▽ More
As water distribution networks (WDNs) become increasingly connected with digital infrastructures, they face greater exposure to cyberattacks that threaten their operational integrity. Stealthy False Data Injection Attacks (SFDIAs) are particularly concerning, as they manipulate sensor data to compromise system operations while avoiding detection. While existing studies have focused on either detection methods or specific attack formulations, the relationship between attack sophistication, system knowledge requirements, and achievable impact remains unexplored. This paper presents a systematic analysis of sensor attacks against WDNs, investigating different combinations of physical constraints, state monitoring requirements, and intrusion detection evasion conditions. We propose several attack formulations that range from tailored strategies satisfying both physical and detection constraints to simpler measurement manipulations. The proposed attacks are simple and local -- requiring knowledge only of targeted sensors and their hydraulic connections -- making them scalable and practical. Through case studies on Net1 and Net3 benchmark networks, we demonstrate how these attacks can persistently increase operational costs and alter water flows while remaining undetected by monitoring systems for extended periods. The analysis provides utilities with insights for vulnerability assessment and motivates the development of protection strategies that combine physical and statistical security mechanisms.
△ Less
Submitted 23 April, 2025;
originally announced April 2025.
-
Real-Time Rejection and Mitigation of Time Synchronization Attacks on the Global Positioning System
Authors:
Ali Khalajmehrabadi,
Nikolaos Gatsis,
David Akopian,
Ahmad F. Taha
Abstract:
This paper introduces the Time Synchronization Attack Rejection and Mitigation (TSARM) technique for Time Synchronization Attacks (TSAs) over the Global Positioning System (GPS). The technique estimates the clock bias and drift of the GPS receiver along with the possible attack contrary to previous approaches. Having estimated the time instants of the attack, the clock bias and drift of the receiv…
▽ More
This paper introduces the Time Synchronization Attack Rejection and Mitigation (TSARM) technique for Time Synchronization Attacks (TSAs) over the Global Positioning System (GPS). The technique estimates the clock bias and drift of the GPS receiver along with the possible attack contrary to previous approaches. Having estimated the time instants of the attack, the clock bias and drift of the receiver are corrected. The proposed technique is computationally efficient and can be easily implemented in real time, in a fashion complementary to standard algorithms for position, velocity, and time estimation in off-the-shelf receivers. The performance of this technique is evaluated on a set of collected data from a real GPS receiver. Our method renders excellent time recovery consistent with the application requirements. The numerical results demonstrate that the TSARM technique outperforms competing approaches in the literature.
△ Less
Submitted 5 February, 2018;
originally announced February 2018.
-
Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs
Authors:
Ahmad F. Taha,
Junjian Qi,
Jianhui Wang,
Jitesh H. Panchal
Abstract:
Phasor measurement units (PMUs) can be effectively utilized for the monitoring and control of the power grid. As the cyber-world becomes increasingly embedded into power grids, the risks of this inevitable evolution become serious. In this paper, we present a risk mitigation strategy, based on dynamic state estimation, to eliminate threat levels from the grid's unknown inputs and potential cyber-a…
▽ More
Phasor measurement units (PMUs) can be effectively utilized for the monitoring and control of the power grid. As the cyber-world becomes increasingly embedded into power grids, the risks of this inevitable evolution become serious. In this paper, we present a risk mitigation strategy, based on dynamic state estimation, to eliminate threat levels from the grid's unknown inputs and potential cyber-attacks. The strategy requires (a) the potentially incomplete knowledge of power system models and parameters and (b) real-time PMU measurements.
First, we utilize a dynamic state estimator for higher order depictions of power system dynamics for simultaneous state and unknown inputs estimation. Second, estimates of cyber-attacks are obtained through an attack detection algorithm. Third, the estimation and detection components are seamlessly utilized in an optimization framework to determine the most impacted PMU measurements. Finally, a risk mitigation strategy is proposed to guarantee the elimination of threats from attacks, ensuring the observability of the power system through available, safe measurements. Case studies are included to validate the proposed approach. Insightful suggestions, extensions, and open problems are also posed.
△ Less
Submitted 19 May, 2016; v1 submitted 28 August, 2015;
originally announced August 2015.