2021
DOI: 10.1109/jsen.2020.3027778
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Attack Detection Process in Sensor of DC Micro-Grids Under Electric Vehicle Based on Hilbert–Huang Transform and Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 42 publications
(15 citation statements)
references
References 21 publications
0
15
0
Order By: Relevance
“…The performance of presented detection plan is investigated by using the FDIA scheme and the evaluation outcomes are presented in Table IV. Furthermore, to demonstrate the sufficiency of suggested cyber-attack detection model, it compares with HHT and deep neural network (DNN) presented in the reference [15]. Table IV is able to remark that the offered method can detect the FDIA less than 5ms from the cyber-attack inception in different scenarios with more than 96 % accuracy from 1259 samples.…”
Section: Simulation Resultsmentioning
confidence: 95%
See 1 more Smart Citation
“…The performance of presented detection plan is investigated by using the FDIA scheme and the evaluation outcomes are presented in Table IV. Furthermore, to demonstrate the sufficiency of suggested cyber-attack detection model, it compares with HHT and deep neural network (DNN) presented in the reference [15]. Table IV is able to remark that the offered method can detect the FDIA less than 5ms from the cyber-attack inception in different scenarios with more than 96 % accuracy from 1259 samples.…”
Section: Simulation Resultsmentioning
confidence: 95%
“…So in this totality destruction can be obtained in false data causing by FDI, that its generic procedures include FDIA, replay attack, and man-in-the-middle attack. The confidentiality attack can be obtained in data leakage and illegal use that its general procedures include brute force password cracking, utilization of malware, and internal employee attack [15,16]. In the role of a typical state with the aim of destroying information integrity, the analysis outcomes of state estimation can be disrupted by the FDA, so result in misleading the control center decision.…”
Section: Introductionmentioning
confidence: 99%
“…The FDIA type has analyzed the efficiency/performance of offered detection method, and the appraisal results are depicted in Table 4. Besides, to indicate the performance of the proposed cyber-attack detection approach, it compares the Shallow model and deep neural network (DNN) with Hilbert-Huang Transform (HHT) presented in the [48] in Table 4. As shown in Table 4, it can be argued that the proposed method could diagnose the FDIAs by detection precision over 95% that indicates the performance of the offered diagnosing approach on detecting the FDIAs.…”
Section: Discussionmentioning
confidence: 99%
“…Operating of these units in the AC paradigm is a practical choice to improve its efficiency. Compared to the centralized communication scheme, to avoid a single point of failure, applying distributed controllers' approach is a technical way to enhance MGs' robustness and stability [5], [6]. The distributed control method requires transmitting a lesser amount of data and less traffic in communication links than the integrated communication approach [7].…”
Section: State Of System W Imentioning
confidence: 99%