ACKNOWLEDGMENTS
This research is supported by student scholarships
from Oregon BEST and the Bonneville Power Ad-
ministration. We thank both Portland General Electric
and the Bonneville Power Administration for provid-
ing PMU data.
REFERENCES
Amor, N. B., Benferhat, S., and Elouedi, Z. (2004). Naive
bayes vs decision trees in intrusion detection systems.
In Proc. ACM Symp. Appl. Comput., pages 420–424.
ACM.
Bonebrake, C. and ONeil, L. (2014). Attacks on GPS time
reliability. IEEE Security Privacy, 12(3):82–84.
Chang, C.-C. and Lin, C.-J. (2011). Libsvm: A library for
support vector machines. ACM Trans. Intelligent Syst.
and Technol., 2(3):27.
Chen, T. and Abu-Nimeh, S. (2011). Lessons from stuxnet.
Computer, 44(4):91–93.
Cortes, C. and Vapnik, V. (1995). Support-vector networks.
Mach. Learn., 20(3):273–297.
De La Ree, J., Centeno, V., Thorp, J., and Phadke, A.
(2010). Synchronized phasor measurement applica-
tions in power systems. IEEE Trans. Smart Grid,
1(1):20–27.
Humphreys, T. (2009). Assessing the spoofing threat. GPS
World, 20(1):28–38.
IEEE (2006). IEEE standard for synchrophasors for power
syst. IEEE Std C37.118-2005, pages 1–57.
Jiang, X., Zhang, J., Harding, B., Makela, J., and
Dominguez-Garcia, A. (2013a). Spoofing gps re-
ceiver clock offset of phasor measurement units. IEEE
Trans. Power Syst., 28(3):3253–3262.
Jiang, X., Zhang, J., Harding, B. J., Makela, J. J., and
Dominguez-Garcia, A. D. (2013b). Spoofing GPS re-
ceiver clock offset of phasor measurement units. IEEE
Trans. Power Syst., 28(3):3253–3262.
Kher, S., Nutt, V., Dasgupta, D., Ali, H., and Mixon, P.
(2012). A detection model for anomalies in smart grid
with sensor network. In Future of Instrumentation Int.
Workshop, 2012, pages 1–4. IEEE.
Kim, J., Tong, L., and Thomas, R. J. (2014). Data framing
attack on state estimation. IEEE J. Sel. Areas Com-
mun., 32(7).
Kim, J., Tong, L., and Thomas, R. J. (2015). Subspace
method for data attack on state estimation: Data-
driven approach. IEEE Trans. Signal Process., 63(5).
Kushner, D. (2013). The real story of stuxnet. IEEE Spectr.,
50(3):48–53.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare
weapon. IEEE Security Privacy, 9(3):49–51.
Magiera, J. and Katulski, R. (2013). Accuracy of differen-
tial phase delay estimation for gps spoofing detection.
In 36th Int. Conf. Telecommun. and Signal Process.,
pages 695–699.
Meier, R., Histand, M., Landford, J., McCamish, B., Chiu,
D., Bass, R., and Cotilla-Sanchez, E. (2014). Man-
aging PMU data sets with bitmap indexes. In IEEE
Conf. on Technol. for Sustain., Portland, OR.
Mitchell, R., Chen, I., et al. (2013). Effect of intrusion de-
tection and response on reliability of cyber physical
systems. IEEE Trans. Rel., 62(1):199–210.
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V.,
Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P.,
Weiss, R., Dubourg, V., Vanderplas, J., Passos, A.,
Cournapeau, D., Brucher, M., Perrot, M., and Duch-
esnay, E. (2011). Scikit-learn: Machine learning in
Python. J. Mach. Learn. Res., 12:2825–2830.
Petit, J., Feiri, M., and Kargl, F. (2011). Spoofed data de-
tection in vanets using dynamic thresholds. In IEEE
Vehicular Networking Conf., pages 25–32.
Phadke, A. (2002). Synchronized phasor measurements-a
historical overview. In IEEE PES Asia Pacific Trans-
mission and Distribution Conf. and Exhibition, vol-
ume 1, pages 476–479 vol.1.
Psiaki, M., O’Hanlon, B., Bhatti, J., Shepard, D., and
Humphreys, T. (2013). Gps spoofing detection via
dual-receiver correlation of military signals. IEEE
Trans. Aerosp. Electron. Syst., 49(4):2250–2267.
Shepard, D., Humphreys, T., and Fansler, A. (2012). Evalu-
ation of the vulnerability of phasor measurement units
to gps spoofing attacks. In Int. Conf. Critical Infras-
tructure Protection, Washington, DC, USA.
Steinmetz, C. P. (1893). Complex quantities and their use
in electrical engineering. In Proc. American Institute
of Electrical Engineers, pages 33–74, Chicago, IL.
Vu, K., Begovic, M., Novosel, D., and Saha, M. (1999). Use
of local measurements to estimate voltage-stability
margin. IEEE Trans. Power Syst., 14(3):1029–1035.
Warner, J. and Johnston, R. (2002). A simple demonstration
that the global positioning system (gps) is vulnerable
to spoofing. J. Security Admin., 25:19–28.
Zhang, Z., Gong, S., Li, H., Pei, C., Zeng, Q., and Jin, M.
(2011). Time stamp attack on wide area monitoring
system in smart grid. In Comput. Res. Repository.
Zhang, Z., S.Gong, A.D.Dimitrovski, and H.Li (2013).
Time synchronization attack in smart grid: Impact and
analysis. IEEE Trans. Smart Grid, 4(1):87–98.
SMARTGREENS 2016 - 5th International Conference on Smart Cities and Green ICT Systems
232