2019
DOI: 10.1109/tpel.2018.2879886
|View full text |Cite
|
Sign up to set email alerts
|

A Stealth Cyber-Attack Detection Strategy for DC Microgrids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
141
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 201 publications
(143 citation statements)
references
References 39 publications
1
141
0
1
Order By: Relevance
“…This is due to the fact that modern control systems are evermore exposed to cyber-attacks, given the increasing integration of physical and cyber resources in CPS control loops [14]. An area that has received specific attention because of its criticality has been the secure control and estimation of power networks, with specific focus on smart grids [9], [15], [16], [17], and microgrids [18], [19], [20], [21]. Among the works addressing the security problem in microgrids, [20], [21] offer techniques to detect cyber-attacks in DCmGs.…”
Section: State Of the Artmentioning
confidence: 99%
See 2 more Smart Citations
“…This is due to the fact that modern control systems are evermore exposed to cyber-attacks, given the increasing integration of physical and cyber resources in CPS control loops [14]. An area that has received specific attention because of its criticality has been the secure control and estimation of power networks, with specific focus on smart grids [9], [15], [16], [17], and microgrids [18], [19], [20], [21]. Among the works addressing the security problem in microgrids, [20], [21] offer techniques to detect cyber-attacks in DCmGs.…”
Section: State Of the Artmentioning
confidence: 99%
“…An area that has received specific attention because of its criticality has been the secure control and estimation of power networks, with specific focus on smart grids [9], [15], [16], [17], and microgrids [18], [19], [20], [21]. Among the works addressing the security problem in microgrids, [20], [21] offer techniques to detect cyber-attacks in DCmGs. In particular, the authors of [20] exploit Signal Temporal Logic (STL) to detect whether an attack is present, by verifying whether given STL requirements are violated.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…In [4], a secure information flow framework was developed for 118-bus distribution network with power electronics driven HVAC system. In [8], a physicsbased, cooperative mechanism was developed to detect stealthy attacks in DC microgrids with a number of DC-DC converters, which can bypass most of observer-based detection methods. In [9], a physics-based framework to detect false-data injection attacks in DC microgrids with a number of DC-DC converters.…”
Section: Introductionmentioning
confidence: 99%
“…A signal temporal logic detection method is proposed in [6] for effectively detect, locate and qualify attack. In [7], a cooperative vulnerability factor (CVF) framework is introduced for each agent, and the positive value of CVF represents that the agent is attacked. A software-defined networking communication architecture and a secure network of assured power enclaves are respectively proposed in [8][9] to enhance the attack resistance of microgrid.…”
Section: Introductionmentioning
confidence: 99%