2018
DOI: 10.1049/iet-gtd.2017.1445
|View full text |Cite
|
Sign up to set email alerts
|

Detection of PMU spoofing in power grid based on phasor measurement analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…The nonobservable phasors of the system could be observable with few extra PMUs. A binary search algorithm is exploited to explain the PMUs sites optimally, which would permit the complete network to be observable under usual operating events [23].…”
Section: A Pmu Placementmentioning
confidence: 99%
“…The nonobservable phasors of the system could be observable with few extra PMUs. A binary search algorithm is exploited to explain the PMUs sites optimally, which would permit the complete network to be observable under usual operating events [23].…”
Section: A Pmu Placementmentioning
confidence: 99%
“…ΓnRMn×Mn is a block diagonal matrix, consisting of 1 + L n blocks. TSA on bus n shifts the phase of the measured quantities by an unknown quantity normalΔθn, where each block is the 2 × 2 matrix ][1em4ptcosnormalΔθnsinnormalΔθnsinnormalΔθncosnormalΔθnOnce TSDs of one or more substations suffer GPS spoofing‐based TSA and induced time deviation in phasor measurements, it will result in misleading state estimation and in‐appropriate control as a consequence [48, 49]. The potential outcome of TSA has been simulated in [50].…”
Section: Impact Of Tsa On Power Systemsmentioning
confidence: 99%
“…The detection process of network-based vulnerability scanning is similar to the ''bottoming'' work before the actual attack by the hacker on the attacking site. The security administrator or network administrator actively implements the security vulnerability scanning to detect and analyze the security threats or security existing in the computer system [27]- [29].…”
Section: Vulnerability Mining Detection Key Technology a Researcmentioning
confidence: 99%