2016
DOI: 10.1109/tsg.2016.2596298
|View full text |Cite
|
Sign up to set email alerts
|

Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
101
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 214 publications
(101 citation statements)
references
References 17 publications
0
101
0
Order By: Relevance
“…In this section, the proposed approach is applied and investigated on the IEEE 14-bus test grid. This test grid is often used in the context of FDI attack detection [27], [29], [30] and attack construction [35], [38]. The voltage angles and magnitudes of this grid are calculated from the AC power flow solver implemented by the pandapower-tool [55].…”
Section: Case Studymentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, the proposed approach is applied and investigated on the IEEE 14-bus test grid. This test grid is often used in the context of FDI attack detection [27], [29], [30] and attack construction [35], [38]. The voltage angles and magnitudes of this grid are calculated from the AC power flow solver implemented by the pandapower-tool [55].…”
Section: Case Studymentioning
confidence: 99%
“…Seeking to derive ways of rendering the smart grid robust to FDI attacks, the authors of [14] review major types of defense strategies, such as data authentication [15], and the inclusion of time synchronized phasor measurement units (PMUs) [29], [30]. In these works, the measurements originating from PMUs arXiv:1810.04894v4 [eess.SP] 23 Aug 2019 are considered to be protected against attacks, and thus can be used as a trustworthy reference.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Techniques proposed to deal with stealthy attacks include statistical methods such as sequential detection using Cumulative Sum (CUSUM)-type algorithms [16], and measurements consistency assessment under certain observability assumptions [35]. A detection method that leverages online information is described in [3], which is applicable by ensuring the availability and accuracy of load forecasts and generation schedules. In [19], a mechanism is introduced to formulate the detection scheme as a matrix separation problem, but it only recovers intrusions among corrupted measurements over a particular period of time.…”
Section: Introductionmentioning
confidence: 99%
“…In power transmission systems, the popular method used to detect bad measurement data is the static state estimator (SSE) based on weighted least squared (WLS). However, SSE can be manipulated by attackers if the power network topology is known [10]- [12]. Therefore, the cyberattacks stay undetected as the attack indicator (control/measurement residuals) of the method is kept under predefined detected level.…”
Section: Introductionmentioning
confidence: 99%