2010 44th Annual Conference on Information Sciences and Systems (CISS) 2010
DOI: 10.1109/ciss.2010.5464816
|View full text |Cite
|
Sign up to set email alerts
|

Limiting false data attacks on power system state estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 140 publications
(89 citation statements)
references
References 6 publications
0
89
0
Order By: Relevance
“…A number of recent studies have exploited the FDI attacks on power system state estimation and defense mechanisms, including detection-based methods (e.g. [5][6][7]) and protection-based methods (e.g. [8][9][10][11][12][13][14][15][16]).…”
Section: Introductionmentioning
confidence: 99%
“…A number of recent studies have exploited the FDI attacks on power system state estimation and defense mechanisms, including detection-based methods (e.g. [5][6][7]) and protection-based methods (e.g. [8][9][10][11][12][13][14][15][16]).…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, we extend our prior work in [8] to develop a more practical technique based on l 1 norm minimization. This is based on the well-known nature of the l 1 norm as a heuristic to find sparse solutions to optimization problems.…”
Section: A Summary Of Results and Contributionsmentioning
confidence: 99%
“…Because the adversary can choose where to attack the network and design the injected data, the problem of detecting malicious data cannot be formulated as a simple hypothesis test, and the uniformly most powerful test does not exist in general. We study a detector based on the generalized likelihood ratio test (GLRT) that was originally introduced in our prior work [8]. GLRT is not optimal in general, but it is known to perform well in practice and it has well established asymptotic optimality [9], [10], [11].…”
Section: A Summary Of Results and Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…An undetectable false data injection attack motivates a Bayesian framework, which was first proposed in Kosut et al [6]. The historical data can be used by the control center to track its belief state of the power system.…”
Section: Related Workmentioning
confidence: 99%