2019
DOI: 10.3390/electronics8090941
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Bad Data Injection Attack and Its Migration in Cyber-Physical Systems

Abstract: False data injection (FDI) attack is a hot topic in cyber-physical systems (CPSs). Attackers inject bad data into sensors or return false data to the controller to cause the inaccurate state estimation. Although there exists many detection approaches, such as bad data detector (BDD), sequence pattern mining, and machine learning methods, a smart attacker still can inject perfectly false data to go undetected. In this paper, we focus on the advanced false data injection (AFDI) attack and its detection method. A… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 31 publications
0
1
0
Order By: Relevance
“…d) False data injection attack defense: It is difficult to defend against FDIAs due to their concealment [131]. Two FDIA detection methods are proposed in [132]: 1) stateestimation based detection, and 2) machine-learning based detection.…”
Section: Malware Attackmentioning
confidence: 99%
“…d) False data injection attack defense: It is difficult to defend against FDIAs due to their concealment [131]. Two FDIA detection methods are proposed in [132]: 1) stateestimation based detection, and 2) machine-learning based detection.…”
Section: Malware Attackmentioning
confidence: 99%
“…Attack studies will also aid the development of defenses against attacks or ways to lessen their effects. Algorithms for attack-resistant control and bad data detection are examples of countermeasures [28].…”
Section: Cps Layers and Attack Modelingmentioning
confidence: 99%
“…Then the control center loses the normal control ability of the physical equipment, which causes the power system to collapse, even leads to a large-scale power failure. In recent years, more kinds of FDIA have emerged, the attacker can use network vulnerabilities to tamper with the measurement data, control data, even the equipment information with the minimum cost, which cause the large-scale chain failures [8]. However, the defense aiming at FDIA become more difficult because of the great concealment of FDIA.…”
Section: Introductionmentioning
confidence: 99%