2022
DOI: 10.1109/access.2022.3224758
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Machine Learning State Estimation Model for Unobservable Microgrids

Abstract: An observable microgrid may become unobservable when sensors are at fault, sensor data is missing, or data has been tampered by malicious agents. In those cases, state estimation cannot be performed using traditional approaches without pseudo-measurements. To address the lack of observability, this article presents the design and implementation of a novel three-phase state estimation method for unobservable and unbalanced AC microgrids, using machine learning techniques, without pseudo-measurements, and under … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 52 publications
0
1
0
Order By: Relevance
“…False data injection attacks (FDIAs), such as data poisoning or noise injection, can significantly affect the decision-making process of energy management system (EMS) applications, for instance, voltage regulation [1]. FDIAs are destructive to EMS [2], because the attacker can manipulate the meter readings by injecting additional false data, causing system instability [3] and even cascading failures leading to massive blackouts [4]. Therefore, various methodologies have been developed over the past decade to defend against such attacks.…”
Section: Introductionmentioning
confidence: 99%
“…False data injection attacks (FDIAs), such as data poisoning or noise injection, can significantly affect the decision-making process of energy management system (EMS) applications, for instance, voltage regulation [1]. FDIAs are destructive to EMS [2], because the attacker can manipulate the meter readings by injecting additional false data, causing system instability [3] and even cascading failures leading to massive blackouts [4]. Therefore, various methodologies have been developed over the past decade to defend against such attacks.…”
Section: Introductionmentioning
confidence: 99%