2017
DOI: 10.1109/tii.2015.2470218
|View full text |Cite
|
Sign up to set email alerts
|

Defending Against False Data Injection Attacks on Power System State Estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
96
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 281 publications
(96 citation statements)
references
References 22 publications
0
96
0
Order By: Relevance
“…The fixed points of (14) and (15), V * and Q * , lead to the optimal minimax solution for the defender. Correspondingly, the attacker's Nash equilibrium strategy π * A (s), ∀s ∈ S can be obtained by solving the dual of the linear constraint optimization (16):…”
Section: B Nash Equilibrium Strategiesmentioning
confidence: 99%
See 2 more Smart Citations
“…The fixed points of (14) and (15), V * and Q * , lead to the optimal minimax solution for the defender. Correspondingly, the attacker's Nash equilibrium strategy π * A (s), ∀s ∈ S can be obtained by solving the dual of the linear constraint optimization (16):…”
Section: B Nash Equilibrium Strategiesmentioning
confidence: 99%
“…a) Set initial Q 0 (s, a, d) and V (s), ∀s ∈ S, a ∈ A and d ∈ D. b) Define the learning rate αt = 1/(t + 1) ω , for ω ∈ (1/2, 1]. repeat for ∀s ∈ S do for ∀a ∈ A and ∀d ∈ D do c) Update Q t+1 (s, a, d) according to (14). end for d) Update linear programming V (s) according to (16).…”
Section: B Nash Equilibrium Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Internetof-Things), ensuring the security of smart grids and other cyber-physical systems is crucial to the stability of a society [1], [3], [25], [26]. One current line of research is detecting and mitigating insider attacks in smart grids (see [1], [3], [11], [27]- [29]). Liu [29] is, probably, the first to study a new class of insider attacks, the false data injection (FDI) attacks.…”
Section: Related Workmentioning
confidence: 99%
“…To guarantee high reliability and robustness of the underlying critical infrastructure, real-time monitoring, data analytics, and control are highly critical. Empirically, data analytics is generally performed by the state estimator at the system control center (CC) [1]- [3]. However, with the increasing number of interconnections, nonlinearity, and dynamics, real-time data analytics will inevitably impose significant computational burden and complexity on CC [4].…”
Section: Introductionmentioning
confidence: 99%