2015
DOI: 10.1109/tsg.2014.2382714
|View full text |Cite
|
Sign up to set email alerts
|

Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
141
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 283 publications
(143 citation statements)
references
References 28 publications
0
141
0
2
Order By: Relevance
“…In this section, the proposed approach is applied and investigated on the IEEE 14-bus test grid. This test grid is often used in the context of FDI attack detection [27], [29], [30] and attack construction [35], [38]. The voltage angles and magnitudes of this grid are calculated from the AC power flow solver implemented by the pandapower-tool [55].…”
Section: Case Studymentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, the proposed approach is applied and investigated on the IEEE 14-bus test grid. This test grid is often used in the context of FDI attack detection [27], [29], [30] and attack construction [35], [38]. The voltage angles and magnitudes of this grid are calculated from the AC power flow solver implemented by the pandapower-tool [55].…”
Section: Case Studymentioning
confidence: 99%
“…Most of the aforementioned works, notably [27]- [32], [35], rely on the linearized DC model to describe the electrical behavior of the power system. However, since the DC model is only a simplification of the more realistic and more accurate AC model, this is a significant shortcoming with regard to the vulnerability analysis [11].…”
mentioning
confidence: 99%
“…Note that direct application of subspace estimation algorithm as proposed in [5], [6], [7] (Algorithm 1) uses all N estimated 1 Limiting eigen value distribution is the distribution of eigen values of Σz when M, T → ∞, M/T = p > 0. eigen modes for the construction of the FDI attack. However, following the application of RMT spiked model results, it is clear that eigen modes for which µ i < √ p cannot be recovered from the sample covariance matrix, and hence, must not be used in the construction of FDI attack.…”
Section: Data-driven Fdi Attacks With Limited Number Of Measurementsmentioning
confidence: 99%
“…Unlike the studies discussed before, Yu and Chin [18] proposed a principal component analysis (PCA) based method to design blind FDI attacks, which did not need any prior knowledge of Jacobian matrix in smart grid. Furthermore, Anwar and Mahmood [19] clarified that the PCA based blind attack strategy was only valid for the measurements with Gaussian noises.…”
Section: Introductionmentioning
confidence: 99%