2021
DOI: 10.1109/tsg.2021.3080693
|View full text |Cite
|
Sign up to set email alerts
|

False Data Injection Attacks Against Synchronization Systems in Microgrids

Abstract: Synchronization systems play a vital role in the day-to-day operation of power systems and their restoration after cascading failures. Hence, their resilience to cyberattacks is imperative. In this paper, we demonstrate that a well-planned false data injection attack against the synchronization system of a generator is capable of causing tripping subsequently leading to instability and blackout. We present an analytical framework behind the design and implementation of the proposed cyberattack. Moreover, we de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 31 publications
0
15
0
Order By: Relevance
“…The authors of Ref. [38] discusses how the synchronisation processes in micro grids enable cyber vulnerabilities and allows attackers to execute FDI attacks with severe consequences. In the paper, they design and demonstrate exploits in the system resonance to influence the microgrid frequency to rapidly trip a generator causing the grid to shutdown prematurely.…”
Section: Background Informationmentioning
confidence: 99%
“…The authors of Ref. [38] discusses how the synchronisation processes in micro grids enable cyber vulnerabilities and allows attackers to execute FDI attacks with severe consequences. In the paper, they design and demonstrate exploits in the system resonance to influence the microgrid frequency to rapidly trip a generator causing the grid to shutdown prematurely.…”
Section: Background Informationmentioning
confidence: 99%
“…2) In the existing resilient control of MG for mitigating FDI attacks, false data detection methods are considered [14] - [18]. However, the stealthiness of FDI attacks makes them difficult to be detected.…”
Section: E Prominent Featuresmentioning
confidence: 99%
“…There are also some research works related to distributed MG control under FDI attacks. Reference [14] presents an analytical framework for conducting effective FDI cyberattacks targeting MGs with synchronous generators. In [15], an effective FDI detection method based on the Kullback-Liebler divergence-based criterion is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [4] presented resonance attacks, in which the attacker corrupts power demand signals to induce unstable frequency oscillations that falsely trigger rate-of-change of frequency (ROCOF) relays deployed to protect generation equipment from operating in unsafe frequency. Similarly, to trip ROCOF protection, authors in [5] compromised microgrid synchronization, and authors in [6] compromised the control of loads providing emulated inertia services. Targeting the false operation of under-frequency load shedding (UFLS) relays, the authors in [7] manipulated the frequency measurements used in wide-area UFLS schemes.…”
Section: Introductionmentioning
confidence: 99%