2011 IEEE International Conference on Smart Grid Communications (SmartGridComm) 2011
DOI: 10.1109/smartgridcomm.2011.6102326
|View full text |Cite
|
Sign up to set email alerts
|

Stealth false data injection using independent component analysis in smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 117 publications
(69 citation statements)
references
References 15 publications
0
69
0
Order By: Relevance
“…The use of independent component analysis in [13] is the most relevant. The authors of [13] proposed to identify a mixing matrix from which to construct an unobservable attack. However, such techniques require that loads are statistically independent and non-Gaussian, and the techniques need full sensor observations.…”
Section: B Related Work and Organizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of independent component analysis in [13] is the most relevant. The authors of [13] proposed to identify a mixing matrix from which to construct an unobservable attack. However, such techniques require that loads are statistically independent and non-Gaussian, and the techniques need full sensor observations.…”
Section: B Related Work and Organizationmentioning
confidence: 99%
“…The fusion center observes corrupted measurements instead of the real measurements . The adversarial modification is mathematically modeled by: (12) where is an attack vector, and is the set of feasible attack vectors defined as (13) Liu, Ning, and Reiter [6] presented an unobservable attack, which is a powerful attack mechanism capable of perturbing the state estimate without being detected. An unobservable attack can be formally defined as follows.…”
Section: Adversary Modelmentioning
confidence: 99%
“…These works assume an omniscient attacker knowing the system parameters and topology. For more practical attack scenarios, data-driven attacks that learn the necessary system information from partial sensor observations are proposed [11,23,26]. Section 3 reviews the detail of the vulnerability analysis and the attack mechanisms for unobservable state attacks.…”
Section: Related Workmentioning
confidence: 99%
“…For a general matrix H, this problem has been known to be NP-complete (e.g., see Corollary 1 in [43].) However, Kosut et al show in [28] that the special structure of H can be exploited to have a polynomial time algorithm for solving (11). The solution of (11) provides the smallest S A that enables an unobservable state attack and the sparsest attack vector.…”
Section: Cost-effective Attack Strategymentioning
confidence: 99%
See 1 more Smart Citation