2020
DOI: 10.1109/tpel.2019.2957071
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Screening of Hijacking Attacks in DC Microgrids

Abstract: It is well known that distributed control can improve the resiliency of DC microgrids against multiple link failures as compared to centralized control. However, the control layer is still vulnerable to cyber attacks. Unlike widely studied false data injection attacks (FDIAs), which involve adding false signals on top of existing ones in the controller or communication links, hijacking attacks completely replace the existing signals. As a result, the compromised agent(s) diverge from steady state owing to imba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 62 publications
(33 citation statements)
references
References 30 publications
0
33
0
Order By: Relevance
“…Converter outage under attack ! Line-to-line fault DM i < Υ 2 1 A fault detection metric F D i I is proposed in [16] to differentiate between current sensor faults and cyber attacks. 2 A line-to-line fault evaluation theory is proposed in [15] to differentiate between line faults and cyber attacks.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Converter outage under attack ! Line-to-line fault DM i < Υ 2 1 A fault detection metric F D i I is proposed in [16] to differentiate between current sensor faults and cyber attacks. 2 A line-to-line fault evaluation theory is proposed in [15] to differentiate between line faults and cyber attacks.…”
Section: Discussionmentioning
confidence: 99%
“…However, since the detection criteria DM i doesn't exceed the detection threshold Υ for these disturbances, the event-driven mitigation process will not be activated. More details on detection of line-to-line and sensor faults and their differentiation with cyber attacks have been provided in [15] and [16], respectively. Finally, the main features of the proposed event-driven resilient scheme are:…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the proposed detection concept for heterogeneous sources (operating with an adaptive droop ∆R i ) is basically inspired from [8] - [9], it is termed as adaptive discordant element (ADE) in this letter, can be mathematically represented for i th agent using Remark II as:…”
Section: Design Of Resilient Control Strategymentioning
confidence: 99%
“…Further, data intrusion from stealth attacks is also possible, as demonstrated in [8]- [12]. Such attacks are capable of increasing the generation cost without causing any obvious indications of power imbalance.…”
Section: A Linear Regression Based Resilient Optimalmentioning
confidence: 99%