2022
DOI: 10.1007/978-3-030-96040-7_10
|View full text |Cite
|
Sign up to set email alerts
|

A Multi Agent Framework to Detect in Progress False Data Injection Attacks for Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…proposed a RL-based detection method without the attack model, utilizing a Q-table to detect attacks by Sarsa algorithm. To address the complexity of storing Q-table, Sinha et al, 2022), applied DQN algorithm to detect FDIAs by neural networks. Moreover, (Alnowibet et al, 2021;Mohamed et al, 2021), studied FDIA detection on energy trading and energy management systems by intelligent priority selection-based RL method.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…proposed a RL-based detection method without the attack model, utilizing a Q-table to detect attacks by Sarsa algorithm. To address the complexity of storing Q-table, Sinha et al, 2022), applied DQN algorithm to detect FDIAs by neural networks. Moreover, (Alnowibet et al, 2021;Mohamed et al, 2021), studied FDIA detection on energy trading and energy management systems by intelligent priority selection-based RL method.…”
Section: Related Workmentioning
confidence: 99%
“…First, to defend against FDIAs before being attacked, researchers have studied the deployment of grid at the cyber-physical level, such as optimizing the distribution of key nodes and devices according to their coupling characteristics (Lei et al, 2020;Wu et al, 2021). Second, to detect FDIAs after attack, substantial efforts has been made, such as dynamic state estimation method (An et al, 2022), tracking the deviation of measurement (Alnowibet et al, 2021;Mohamed et al, 2021;Sinha et al, 2022) and some stochastic game methods (Wei et al, 2018;Oozeer and Haykin, 2019). In summary, above researches had shown that both cyber and physical methods are required in FDIA studies.…”
Section: Introductionmentioning
confidence: 99%
“…• Dos/DDoS Attacks: In smart ecosystems, denial of service and distributed denial of service attacks are prevalent [97]. A hacker attempts to consume legitimate network resources or bandwidth during a DoS attack.…”
Section: ) the Network Layermentioning
confidence: 99%
“…Figure 5 illustrates seven types of attacks that are most encountered at this layer. The following discussion highlights key attacks in the network layer of the IoT: • Dos/DDoS Attacks: In smart ecosystems, denial of service (DoS) and distributed denial of service (DDoS) attacks are prevalent [95]. During a DoS attack, a hacker attempts to consume legitimate network resources or bandwidth.…”
Section: Figure 4: Cybersecurity Threats In Perception Layermentioning
confidence: 99%