2022
DOI: 10.1109/tcns.2021.3091631
|View full text |Cite
|
Sign up to set email alerts
|

Revealing a New Vulnerability of Distributed State Estimation: A Data Integrity Attack and an Unsupervised Detection Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…Literature [19] introduces a network anomaly identification model based on bidirectional recurrent neural as the underlying logic, and performance tests based on a database of malicious attacks on power systems confirm that the model can fulfill the role of network anomaly identification. Literature [20] describes the characteristics of false data injection attacks based on distributed principles and conceives a network injection attack identification strategy based on unsupervised machine learning theory to detect and defend against the damage brought to network systems by false data injection attacks. Literature [21] designed a changeable network attack system combined with a local network information base for a deeper understanding of the principles that characterize network attacks, which helps to improve the knowledge of malicious attacks on the network and formulate corresponding measures to prevent them, which is of great significance to enhance the network security and stability of the power system.…”
Section: Introductionmentioning
confidence: 99%
“…Literature [19] introduces a network anomaly identification model based on bidirectional recurrent neural as the underlying logic, and performance tests based on a database of malicious attacks on power systems confirm that the model can fulfill the role of network anomaly identification. Literature [20] describes the characteristics of false data injection attacks based on distributed principles and conceives a network injection attack identification strategy based on unsupervised machine learning theory to detect and defend against the damage brought to network systems by false data injection attacks. Literature [21] designed a changeable network attack system combined with a local network information base for a deeper understanding of the principles that characterize network attacks, which helps to improve the knowledge of malicious attacks on the network and formulate corresponding measures to prevent them, which is of great significance to enhance the network security and stability of the power system.…”
Section: Introductionmentioning
confidence: 99%
“…The envision for smart grid systems is the bidirectional flow of energy and data between power suppliers and customers, resulting in a more efficient, stable, and automated energy network. However, since smart grids use a variety of information and communication technologies to accomplish this goal, they are more susceptible to cyber-attacks associated with significant political, financial, and physical damages [1], [2], [3]. Among the recognized cyber-attacks, attacks on the state estimation (SE) have been widely investigated [5], [6].…”
Section: Introductionmentioning
confidence: 99%