2020
DOI: 10.35833/mpce.2019.000216
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-attack Detection Strategy Based on Distribution System State Estimation

Abstract: Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system. This paper proposes a cyber-attack detection strategy based on distribution system state estimation (DSSE). The uncertainty of the distribution network is represented by the interval of each state variable. A three-phase interval DSSE model is proposed to construct the interval of each state variable. An improved iterative algorithm (IIA) is developed to solve the interval DSSE … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(18 citation statements)
references
References 25 publications
0
18
0
Order By: Relevance
“…Therefore, low bandwidth communication channels are used for accomplishing the same function. Nevertheless, it provides noticeable criteria of valuation of interruption attempts, vulnerability to cyber-attacks cannot be essentially assured for coordinated attacks [27], [28]. This can be clarified because inadequate information exists in every node, which does not function as sufficient inclusive information for cyber-attack detection.…”
Section: B the Cyber Stagementioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, low bandwidth communication channels are used for accomplishing the same function. Nevertheless, it provides noticeable criteria of valuation of interruption attempts, vulnerability to cyber-attacks cannot be essentially assured for coordinated attacks [27], [28]. This can be clarified because inadequate information exists in every node, which does not function as sufficient inclusive information for cyber-attack detection.…”
Section: B the Cyber Stagementioning
confidence: 99%
“…Distributed power supply and meter infrastructure [28], [55], [57], [97] Modifying the instrument's readings, disturbing the management of the distribution, and reducing the credibility of the power generation.…”
Section: Distribution Threatsmentioning
confidence: 99%
“…The use of a feeder terminal unit (FTU), distribution terminal unit (DTU), and the emerging transformer terminal unit (TTU) in recent years has caused the collection of multistate measurement data in the distribution network to be realized in an orderly manner. At the same time, effective data cleaning of these measurement data can provide high-quality data sources for the realization of multitype protection and fault isolation transparency and online safety checking of the distribution network [4,5]. Therefore, the cleaning of abnormal data is greatly important in practical engineering applications [1].…”
Section: Introductionmentioning
confidence: 99%
“…This cyber incident was a successful FDI on an actual power grid [8]. The 2019 Venezuela blackout resulted from a cyberattack on energy supplies in eighteen states that affected two-thirds of the country [9,10]. These cyber disruptions determine the criticality of studying cyber attacks on NCSs, like power grids.…”
Section: Introductionmentioning
confidence: 99%