2021
DOI: 10.1109/jiot.2021.3073060
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical-Attention-Based Defense Method for Load Frequency Control System Against DoS Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…Then, the m-th DoS attack strategy can be generated by A m = {a m } ∪ (a m , a m + τ m ) with a m+1 > a m + τ m , where τ m ≥ 0 denotes the m-th attack's duration. For a time instant t 0 and t ≥ t 0 , the sets of time instants in which communication is denied, are described by [15], [23]- [25] Ξ a (t…”
Section: E Dos Attack Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, the m-th DoS attack strategy can be generated by A m = {a m } ∪ (a m , a m + τ m ) with a m+1 > a m + τ m , where τ m ≥ 0 denotes the m-th attack's duration. For a time instant t 0 and t ≥ t 0 , the sets of time instants in which communication is denied, are described by [15], [23]- [25] Ξ a (t…”
Section: E Dos Attack Modelmentioning
confidence: 99%
“…Remark 2. The random communication network and DoS attack models have been widely adopted in many existing related consensus works, e.g., [31]- [33] and [15], [23]- [25], respectively, with potential applications in the wireless sensor networks, power systems and robotic swarms. In addition, Definitions 1 and 2 have been introduced in [14] and [15] to specify the DoS attacks (see the recent survey paper in [25] for more details).…”
Section: E Dos Attack Modelmentioning
confidence: 99%
“…Meanwhile, one can find that the train and test time is 39 s, optimization time of LQR is 36 s. As shown in Table 5, one can find that the recovery time of the proposed genetic optimization-based LQR controller defense method is 7.16 s. Obviously, compared with other defense works in [26] and [27], the proposed defense method can eliminate the impact of the malicious attack on the voltage in the shortest time to ensure the safe operation of the power grid. It is worth noting that the recovery time in the literature has been given in [34].…”
Section: Case 4: Performance Analysis On the Ieee 118-bus Grid Systemmentioning
confidence: 99%
“…With the event‐triggered scheme extensively applied in power systems, event‐triggered LFC subject to DoS attack was investigated, such as event‐triggered H ∞ LFC with DoS [24] and resilient dynamic event‐triggered LFC power system under DoS attack [25]. In addition, some defence methods were designed against DoS attacks, for example, hierarchical attention‐based defence methods were applied in LFC power systems to offset DoS attacks [26]. Inspired by this, considering that the deception attack and DoS attack will interrupt the measurement data, the event‐trigger scheme can be applied to supplement the missing information.…”
Section: Introductionmentioning
confidence: 99%