2019
DOI: 10.1109/tii.2019.2902163
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Data Injection Attack Detection of Cyber Physical Power Systems With Uncertainties

Abstract:  Understanding potential behaviors of attackers is of paramount importance for improving the cyber-security of power systems. However, the attack behaviors in existing studies are often modeled statically on a single snapshot, which neglects the reality of a dynamically time-evolving power system. Accordingly, a dynamic cyber-attack model with local network information is proposed to characterize the typical data injection attack with the integration of potential dynamic behaviors of an attacker. The proposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 91 publications
(44 citation statements)
references
References 45 publications
0
44
0
Order By: Relevance
“…where p i and q i are the active and reactive power injected into bus i. p ij and q ij are the active and reactive power flows of line i-j out from the attack region. From (27) and 28, we see that the measurements in the non-attack region are not attacked. Thus,p ij andq ij in (25) and (26) are of the given values, which will change the Jacobian matrix of the power injected into the boundary buses.…”
Section: Fdi Attack With Complete Network Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…where p i and q i are the active and reactive power injected into bus i. p ij and q ij are the active and reactive power flows of line i-j out from the attack region. From (27) and 28, we see that the measurements in the non-attack region are not attacked. Thus,p ij andq ij in (25) and (26) are of the given values, which will change the Jacobian matrix of the power injected into the boundary buses.…”
Section: Fdi Attack With Complete Network Informationmentioning
confidence: 99%
“…To account for the dynamic behavior of FDI, (17) can be easily reformulated as a summation of z − Hx over T snapshots, and the resulting optimization problem can be solved in a similar way. The details can be found in [27].…”
Section: Fdi Attack With Complete Network Informationmentioning
confidence: 99%
“…The input-output table of HLCA is the same as that of EIOLCA. The advantage of HLCA is that it can eliminate the truncation error, and can also incorporate the usage and recycling stages into the evaluation scope [31], [32]. However, HLCA is still in its infancy stage for practical application because it has high requirements for matrix calculations.…”
Section: B Life Cycle Assessmentmentioning
confidence: 99%
“…Therefore, how to reduce the energy consumption of airconditioning systems has received great attention from both academics and industry. In addition, the advancement of communication and power electronics technology has led the development of power systems from centralized to distributed [4], and new technologies such as microgrid have emerged. Microgrid refers to a small power generation and distribution system composed of distributed generator, energy storage, loads and protection devices [5].…”
Section: Introductionmentioning
confidence: 99%