2011 45th Annual Conference on Information Sciences and Systems 2011
DOI: 10.1109/ciss.2011.5766111
|View full text |Cite
|
Sign up to set email alerts
|

Defending false data injection attack on smart grid network using adaptive CUSUM test

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 93 publications
(66 citation statements)
references
References 11 publications
0
66
0
Order By: Relevance
“…In addition, as the use of phasor measurement units (PMUs) is growing, strategic allocation of secure PMUs for protection against data attacks has been also studied [12,21,27]. To facilitate fast detection of an attack, the attack detection as a quickest detection problem was also studied in [9,14,15]. The security measures will be reviewed in Section 6.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, as the use of phasor measurement units (PMUs) is growing, strategic allocation of secure PMUs for protection against data attacks has been also studied [12,21,27]. To facilitate fast detection of an attack, the attack detection as a quickest detection problem was also studied in [9,14,15]. The security measures will be reviewed in Section 6.…”
Section: Related Workmentioning
confidence: 99%
“…in [51], show that even without prior knowledge of the power grid's topology an adversary can still successfully launch stealthy bad data injection attacks. Specifically the authors prove that when the system dynamics are small and can be approximated linearly, an independent component analysis can be applied to calculate the Jacobian matrix that if multiplied by the eigenvectors of the covariance matrix of the state variables can expose information necessary to the adversary wishing to launch an unobservable false data injection attack.…”
Section: ) Ensuring Integritymentioning
confidence: 99%
“…By inspecting (18) and evaluating (11)- (12), we notice that the computation of the inverse Fisher information matrix can be simplified and equivalent to the covariance of residual. Based on (12), we can write the binary hypothesis {H 0 , H 1 } by expanding the multivariate normal distributions.…”
Section: Adaptive Cusum Algorithmmentioning
confidence: 99%
“…The proposed scheme is able to determine the existence of adversary as quickly as possible without violating the given constraints such as a certain level of detection accuracy in terms of the false alarm rate and missed detection rate. In [18], we studied some preliminary works that includes the basic mathematic derivation and numerical simulations; without loss of generality, one in conference version is motivated on the straightforward approach via directly evaluating the likelihood of load for detection decision, instead of formulating the algorithm based on the likelihood of residual in this paper, i.e., state estimation in power systems is based on measurement of residual, and therefore, the derivation and result from this journal can be more accurate and practical for real world applications. In additions, the conference one measured a limited range of the unknown via utilizing oneside Rao test for simplicity, while this paper considers the quadratic equivalence of Rao test for solving the unknown.…”
Section: Introductionmentioning
confidence: 99%