2019
DOI: 10.1109/tsg.2018.2832544
|View full text |Cite
|
Sign up to set email alerts
|

Signal Temporal Logic-Based Attack Detection in DC Microgrids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
57
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 105 publications
(57 citation statements)
references
References 25 publications
0
57
0
Order By: Relevance
“…Assuming a pre-condition that the system always operates at a certain global reference voltage is known to each agent, (11) should be a sufficient criteria to justify that the system is attacked by an external entity. Many likely potential attacks on DC microgrids such as FDI & DoS [32], jamming [33] and distributed DoS [34] attacks have already been well studied in the literature. These attacks can be caused using several cyber-physical amendments such as jamming of cyber link, loss of measurements, data-packets flooding, compromised communication servers, sensors, etc.…”
Section: B Cooperative Control Of Sublayers In DC Microgridsmentioning
confidence: 99%
See 4 more Smart Citations
“…Assuming a pre-condition that the system always operates at a certain global reference voltage is known to each agent, (11) should be a sufficient criteria to justify that the system is attacked by an external entity. Many likely potential attacks on DC microgrids such as FDI & DoS [32], jamming [33] and distributed DoS [34] attacks have already been well studied in the literature. These attacks can be caused using several cyber-physical amendments such as jamming of cyber link, loss of measurements, data-packets flooding, compromised communication servers, sensors, etc.…”
Section: B Cooperative Control Of Sublayers In DC Microgridsmentioning
confidence: 99%
“…These attacks can be caused using several cyber-physical amendments such as jamming of cyber link, loss of measurements, data-packets flooding, compromised communication servers, sensors, etc. However, the authors in [32], [33] have already established that such attacks disrupt the cooperative synchronization law [30], which can be easily detected since (10) is violated. To provide with a detailed explanation, the abovementioned disturbances introduce an uncoordinated discontinuity in updating (5) which disrupts the consensus between agents, ultimately leading to (11).…”
Section: B Cooperative Control Of Sublayers In DC Microgridsmentioning
confidence: 99%
See 3 more Smart Citations