2022
DOI: 10.1080/23307706.2022.2139299
|View full text |Cite
|
Sign up to set email alerts
|

Detection and isolation of false data injection attack via adaptive Kalman filter bank

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…According to the work in [28], the τ is set to three times the size of the noise, which can then meet a false alarm rate of less than 5%. According to the work in [16], the detection process of chi-square detector is given as follows.…”
Section: Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the work in [28], the τ is set to three times the size of the noise, which can then meet a false alarm rate of less than 5%. According to the work in [16], the detection process of chi-square detector is given as follows.…”
Section: Problem Formulationmentioning
confidence: 99%
“…Of note, the method for dividing power grid areas can be seen in [34]. In addition, the calculation of extended model parameters can be seen in [28]. It is assumed that hacker can inject multiple FDI attacks, such as the first generator bus at t ∈ (100 s − 160 s), sixth generator bus at t = 260 s, and thirteenth generator bus at t = 380 s. By designing a bank of UIOs for three subareas, the corresponding change in the estimated state can be obtained, as shown in Figure 8.…”
Section: Case 2: Detection and Identification Of Multiple Fdi Attacks...mentioning
confidence: 99%
“…Rawat and Bajracharya [3] introduced cosine similarity and online cumulative sum detector, respectively, which effectively overcame the defects in [2], and the detection effect and robustness were enhanced. The adaptive unscented Kalman algorithm was proposed in [4]. Based on the state variables, the central limit theorem is used to construct Gaussian variables and combined with a quartile to detect FDIA.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, there are denial-of-service (DoS) attacks, [8][9][10][11] deception attacks 12,13 and false data injection (FDI) attacks. 12,14,15 As a kind of DoS attacks, jamming attacks 14 can disturb the operation of the system by replaying previously transmitted signals, or they can block the signal transmission, which make the system paralyzed and inoperable. Compared with DoS attacks, FDI attacks are carefully compiled by the attacker, which are difficult to be detected and have strong invisibility.…”
Section: Introductionmentioning
confidence: 99%
“…However, this reliance on networks also exposes CPSs to a range of network attacks. Generally, there are denial‐of‐service (DoS) attacks, 8‐11 deception attacks 12,13 and false data injection (FDI) attacks 12,14,15 . As a kind of DoS attacks, jamming attacks 14 can disturb the operation of the system by replaying previously transmitted signals, or they can block the signal transmission, which make the system paralyzed and inoperable.…”
Section: Introductionmentioning
confidence: 99%