2022
DOI: 10.1109/tsg.2022.3150954
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 49 publications
0
6
0
Order By: Relevance
“…As a result, Step 8 in Algorithm 1 is replaced with "compute: d = (I − 2αf 2 (L))c (q) i ". In particular, we can obtain the following two special cases: 1) if the GHPF is selected as (7), then we obtain the same result provided by the graph TV measure, described above and summarized in Algorithm 1; and 2) if the GHPF is selected as (11), the result will be a k-graph frequencies attack, as defined in [51].…”
Section: Remarks 1) Known Topologymentioning
confidence: 90%
See 2 more Smart Citations
“…As a result, Step 8 in Algorithm 1 is replaced with "compute: d = (I − 2αf 2 (L))c (q) i ". In particular, we can obtain the following two special cases: 1) if the GHPF is selected as (7), then we obtain the same result provided by the graph TV measure, described above and summarized in Algorithm 1; and 2) if the GHPF is selected as (11), the result will be a k-graph frequencies attack, as defined in [51].…”
Section: Remarks 1) Known Topologymentioning
confidence: 90%
“…GSP theory includes methods such as the Graph Fourier Transform (GFT), graph filters [44]- [46], and sampling and recovery of graph signals [47]- [49]. By leveraging the graphical properties of the states in PSSE, the works in [39], [40], [50], [51] present GSPbased detectors that are able to detect existing unobservable FDI attacks. The advantages of GSP-based detection methods include their ability to operate with limited data, lack of restrictive assumptions on the adversary's capabilities, and greater resilience to minor changes in the system's topology.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“… 2013 ; Shereen et al. 2022 ). Furthermore, the propagation of tampered substations within a WAN has the potential to impact all synchronized substations, resulting in inaccurate metering, disruptions to state estimation, and significant socio-economic or operational impacts (Wang et al.…”
Section: Cyber Attacks In Sgmentioning
confidence: 99%
“…A notable example is the receiver-spoofer mechanism [28], wherein the spoofer masquerades as a GPS receiver, manipulates authentic GPS signals, and transmits spoofed signals to the target. Both space-based time synchronization (SBTS) and network-based time synchronization (NBTS) mechanisms [29] lack integrated security controls, rendering them highly susceptible to TSAs.…”
Section: B Time Synchronization Attacks (Tsas)mentioning
confidence: 99%