2012
DOI: 10.1109/mpe.2011.943114
|View full text |Cite
|
Sign up to set email alerts
|

Intruders in the Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
51
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 102 publications
(52 citation statements)
references
References 1 publication
0
51
0
1
Order By: Relevance
“…Liu et al [10] have shown that an intelligent adversary with knowledge of the power system model can corrupt a carefully selected set of sensor data to introduce arbitrary errors in the estimates of certain state variables without triggering an alarm from the BDD. A wrong state estimator output can, for example, falsely indicate a significant voltage drop (hike) in a bus, triggering the utility to inject more (less) reactive power to the bus, which may in turn have a catastrophic effect on the stable operation of the grid [9].…”
Section: Rogue Device Installationmentioning
confidence: 99%
“…Liu et al [10] have shown that an intelligent adversary with knowledge of the power system model can corrupt a carefully selected set of sensor data to introduce arbitrary errors in the estimates of certain state variables without triggering an alarm from the BDD. A wrong state estimator output can, for example, falsely indicate a significant voltage drop (hike) in a bus, triggering the utility to inject more (less) reactive power to the bus, which may in turn have a catastrophic effect on the stable operation of the grid [9].…”
Section: Rogue Device Installationmentioning
confidence: 99%
“…The security domain and user management mechanism are adopted in IEC 61850 protocols to prevent unauthorized access and mitigate the potential impact of a successful intruder [5]. Since the highly intelligent malware, like stuxnet, could infect the physical isolated computer networks via USB drive [6], the second line of defense, intrusion detection system (IDS) is highly preferred [7]. ID is the process of monitoring the events occurring in a computer network to detect the malicious intruder, and hence, attempting to stop detecting possible incidents.…”
Section: Introductionmentioning
confidence: 99%
“…The information and communication technology (ICT) and power infrastructures represent a large and complex cyberphysical system [3]. Previous research considered the cyber system and power system as separate entities.…”
Section: Introductionmentioning
confidence: 99%
“…Frameworks that integrate the power devices and communication networks for agent-based backup protection and special protection schemes were proposed in [5], [6]. Testbeds for cyber security of SCADA systems are reported in [3], [7]- [9]. However, there is a lack of co-simulation of power grids with their entire SCADA models and the control hierarchy.…”
Section: Introductionmentioning
confidence: 99%