2018
DOI: 10.1049/iet-cta.2017.0725
|View full text |Cite
|
Sign up to set email alerts
|

Robust protection scheme against cyber‐physical attacks in power systems

Abstract: This paper presents a robust defence strategy in reaction to destabilizing cyber-physical attacks launched against linear time invariant systems and its application to power systems. The proposed protection scheme aims at making the dynamics of a selected subsystem decoupled from the dynamics of the subsystem targeted by the attack. The standard decoupling methods are made robust, in spite of poor information about plant parameters and lack of state measurement, with the aid of an extended observer. In this wa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…A first control is used in order to force the state subspace related to the zero dynamics to be a controlled invariant; then a second control is applied in order to destabilize them. The attack, originally presented in [25,26] using the machinery of geometric control theory, is formally summarized in the following using arguments similar to those reported in [118]. Consider a system of the forṁ…”
Section: Zero Dynamics and Covert Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…A first control is used in order to force the state subspace related to the zero dynamics to be a controlled invariant; then a second control is applied in order to destabilize them. The attack, originally presented in [25,26] using the machinery of geometric control theory, is formally summarized in the following using arguments similar to those reported in [118]. Consider a system of the forṁ…”
Section: Zero Dynamics and Covert Attacksmentioning
confidence: 99%
“…Indeed, a scenario can be conceived in which the output of model ( 28) represents a set of variables to be protected against the spread of an attack affecting the zero dynamics. In this regard in [118] a robust defence scheme is proposed, which makes the dynamics of a selected set of power plants decoupled from the dynamics of the subsystem targeted by the attack, with the aid of an extended high-gain observer [123,124], used to robustify the control (32) in spite of inaccurate knowledge of model parameters and lack of state measurements.…”
Section: Zero Dynamics and Covert Attacksmentioning
confidence: 99%
“…Denial of Service) [7][8][9]; and (iii) deception which is the corruption of signals (e.g. spoofing, false-data injection) [10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…In this category, the proposed methods can be further categorised into (1) protection‐based methods, (2) detection‐based methods, and (3) resilient techniques. The protection‐based approaches focus on protecting the communication links [8, 9] or a critical set of measurements [10] that provide sufficient information for solving the state estimation problem. Since the main concern of this paper is the cyber‐attack detection and secure state estimation, only the literature of categories 2 and 3 are reviewed.…”
Section: Introductionmentioning
confidence: 99%