2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) 2020
DOI: 10.1109/3ict51146.2020.9311984
|View full text |Cite
|
Sign up to set email alerts
|

A Secured and Authenticated State Estimation Approach to Protect Measurements in Smart Grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…The system collects relevant evidence of attacks from three different information sources to minimize the number of false positives. Aziz et al (Aziz et al, 2020) rely on the results of state estimation in centralised aggregators, located between smart meters and the control center, to aid in false data detection. Bhattacharjee et al (Bhattacharjee et al, 2021b) embedded the appropriate unbiased mean, the median absolute deviation, etc.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The system collects relevant evidence of attacks from three different information sources to minimize the number of false positives. Aziz et al (Aziz et al, 2020) rely on the results of state estimation in centralised aggregators, located between smart meters and the control center, to aid in false data detection. Bhattacharjee et al (Bhattacharjee et al, 2021b) embedded the appropriate unbiased mean, the median absolute deviation, etc.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, much work has been conducted on the detection for data integrity attacks in AMI, which is mainly divided into three categories (Jiang et al, 2014;Jokar et al, 2016;Yao et al, 2019), including statebased (Huang et al, 2013;Salinas et al, 2014;Leite and Mantovani, 2018;Lo and Ansari, 2013;McLaughlin et al, 2013;Aziz et al, 2020;Bhattacharjee et al, 2021b,a), game theory-based (Cardenas et al, 2012;Yang et al, 2016;Wei et al, 2018Wei et al, , 2017Paul et al, 2020) and classificationbased (Jokar et al, 2016;Singh et al, 2017;Ismail et al, 2018;Yeckle and Tang, 2018;Zheng et al, 2018;Fernandes et al, 2019;Jakaria et al, 2019;Punmiya and Choe, 2019;Zheng et al, 2019;Rouzbahani et al, 2020;Tehrani et al, 2020;Yan and Wen, 2021). As a result of the popularity of artificial intelligence technologies, the feasibility of machine learning to detect attacks in AMI has attracted much attention of a large number of researchers.…”
Section: Introductionmentioning
confidence: 99%
“…An aggregator requires that a user choose a "master password", which is then used to access a collection of all of the user's passwords for all online services. An aggregator will oftentimes provide the ability to choose randomly generated passwords and later pre-fill them for a user upon login [18]. This provides the benefit that the user only has a single password to remember, as well as removing the requirement from the user to choose many unique hard to remember passwords.…”
Section: Introductionmentioning
confidence: 99%