2019 15th European Dependable Computing Conference (EDCC) 2019
DOI: 10.1109/edcc.2019.00041
|View full text |Cite
|
Sign up to set email alerts
|

Model-Free Detection of Cyberattacks on Voltage Control in Distribution Grids

Abstract: Incorporating information and communication technology in the operation of the electricity grid is undoubtedly contributing to a more cost-efficient, controllable, and flexible power grid. Although this technology is promoting flexibility and convenience, its integration with the electricity grid is rendering this critical infrastructure inherently vulnerable to cyberattacks that have potential to cause large-scale and farreaching damage. In light of the growing need for a resilient smart grid, developing suit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…We evaluate m-pasad using the Tennessee-Eastman (TE) process control model. While the original algorithm has been shown to work in more complex scenarios involving sensors with more varying dynamics [1,6,7], this choice of simulation platform is particularly suitable for evaluating m-pasad since it was used to evaluate pasad, 1 which makes the results comparable. We first start with a high-level description of the TE process, then we present experimental results followed by an evaluation of m-pasad's performance.…”
Section: Discussionmentioning
confidence: 99%
“…We evaluate m-pasad using the Tennessee-Eastman (TE) process control model. While the original algorithm has been shown to work in more complex scenarios involving sensors with more varying dynamics [1,6,7], this choice of simulation platform is particularly suitable for evaluating m-pasad since it was used to evaluate pasad, 1 which makes the results comparable. We first start with a high-level description of the TE process, then we present experimental results followed by an evaluation of m-pasad's performance.…”
Section: Discussionmentioning
confidence: 99%
“…Integration of communication network infrastructure and other computing systems into the physical electric power grid has led to a real-time, complex heterogeneous environment [22].…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
“…Integration of communication network infrastructure and other computing systems into the physical electric power grid has led to a real‐time, complex heterogeneous environment [22]. In a cyber‐attack, services provided by the infrastructure can be made completely unavailable for instance, power outages.…”
Section: Communication and Cyber‐attack Scenarios In LV Gridmentioning
confidence: 99%
“…Kemal at al. [130] describe DoS, Integrity and Replay attack scenarios on voltage control in distribution network in the smart grid. For DoS scenario they developed anomaly detection based on offline data.…”
Section: Intrusion Detection/preventionmentioning
confidence: 99%