2018
DOI: 10.1007/s40565-018-0413-5
|View full text |Cite
|
Sign up to set email alerts
|

Detection of false data injection attacks using unscented Kalman filter

Abstract: It has recently been shown that state estimation (SE), which is the most important real-time function in modern energy management systems (EMSs), is vulnerable to false data injection attacks, due to the undetectability of those attacks using standard bad data detection techniques, which are typically based on normalized measurement residuals. Therefore, it is of the utmost importance to develop novel and efficient methods that are capable of detecting such malicious attacks. In this paper, we propose using th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(43 citation statements)
references
References 36 publications
0
36
0
Order By: Relevance
“…Thus, the three-phase linear DSSE model is expressed as (6), where x is the vector set of state variables which represents the complex bus voltage. The three-phase linear DSSE can be further simplified as (7).…”
Section: A Traditional Three-phase Linear Dsse Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, the three-phase linear DSSE model is expressed as (6), where x is the vector set of state variables which represents the complex bus voltage. The three-phase linear DSSE can be further simplified as (7).…”
Section: A Traditional Three-phase Linear Dsse Modelmentioning
confidence: 99%
“…Based on the characteristics of different cyber-attack types, the corresponding cyber-attack defense strategies are proposed: ① physical security: applying appropriate protection for measurement devices or replacing them with more accurate phase measurement units [3]; ② communication security: using various cryptography technologies to prevent cyber-attacks [4]; ③ information security: utilizing state estimation to track the actual power system under various malicious cyber-attacks [5], [6]. This paper focuses on the information cyber-attack defense strategy based on state estimation.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, many researches on the decision making of real-time defense strategy against cyber-attacks have been reported. The behavior and purpose of cyber-attacks are analyzed in [6], [7], and a corresponding detection and identification method for cyber-attacks is proposed in [8]. The forms and the propagation processes of cyber-attacks are studied in [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…In view of this trend, a large volume of work has been dedicated to studying the potential attack paths and strategies, and possible defense measures to enhance the security of power systems as cyberphysical systems. Among them, a number of publications have focused on the so-called false data injection (FDI) attacks [4] - [9]. There have also been studies on how FDI attacks can be utilized to manipulate the outcomes of real-time electricity markets [10] - [12].…”
Section: Introductionmentioning
confidence: 99%