2018 20th National Power Systems Conference (NPSC) 2018
DOI: 10.1109/npsc.2018.8771807
|View full text |Cite
|
Sign up to set email alerts
|

Data-driven Online Detection of Replay Attacks on Wide-Area Measurement Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Power systems, wide-area measurement systems; self-correlation coefficient [113], singular value decomposition [114], stochastic coding [115], frequency-based signature [116], etc. Data injection attack Sensors and controllers; LDS [117], [118], SLS [119]; state estimation [117], MPC [118], statistical anomaly detection technique [120], etc.…”
Section: Replay Attackmentioning
confidence: 99%
“…Power systems, wide-area measurement systems; self-correlation coefficient [113], singular value decomposition [114], stochastic coding [115], frequency-based signature [116], etc. Data injection attack Sensors and controllers; LDS [117], [118], SLS [119]; state estimation [117], MPC [118], statistical anomaly detection technique [120], etc.…”
Section: Replay Attackmentioning
confidence: 99%
“…A comparison study with the two methods discussed in [16] is implemented to further bring out the benefits of the proposed scheme. It is important to note that the authors of [16] have considered only a level‐0 attack model using a pre‐recorded disturbance record as replayed data. The level‐1 and level‐2 replay attacks cannot get detected with this approach.…”
Section: Simulated Replay Attacks With Field Pmu Datamentioning
confidence: 99%
“…This is probably true for control centre monitoring applications where human response time is much larger than the delays involved in the replay attacks but they will surely cripple protection or control systems. In [15, 16], the finite time replay such as data repetition, false data injection, and fault resembling attacks on a smaller number of PMUs are discussed. These attacks are comparatively easy to detect since a large variation in data is observed during these attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations