Proceeding of the 1996 IEEE International Conference on Control Applications IEEE International Conference on Control Applicati
DOI: 10.1109/cca.1996.558870
|View full text |Cite
|
Sign up to set email alerts
|

The potential for malicious control in a competitive power systems environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
31
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(31 citation statements)
references
References 4 publications
0
31
0
Order By: Relevance
“…Possible genuine failures include variations in demand and supply of power or water, line outages or pipe leakages, and failures of sensors and actuators. Possible cyber-physical attacks include measurements corruption [9], [10], [22] and attacks on the control architecture or the physical state [1], [15], [18], [19].…”
Section: Model Of Monitorsmentioning
confidence: 99%
See 2 more Smart Citations
“…Possible genuine failures include variations in demand and supply of power or water, line outages or pipe leakages, and failures of sensors and actuators. Possible cyber-physical attacks include measurements corruption [9], [10], [22] and attacks on the control architecture or the physical state [1], [15], [18], [19].…”
Section: Model Of Monitorsmentioning
confidence: 99%
“…The control centers implement the distributed attack detection procedure described in (15), with G = AC T . It can be verified that the pair (E, A D + GC) is Hurwitz stable, and that ρ (j ωE − A D − GC) −1 A C ) < 1 for all ω ∈ R. As predicted by Theorem 4.3, our distributed attack detection filter is convergent; see Fig.…”
Section: Illustrative Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, a parameterized decoupling structure allows a covert agent to alter the behavior of the physical plant while remaining undetected from the original controller. Finally, security issues of specific systems have received considerable attention, such as power networks [13]- [17], linear networks with misbehaving components [18], [19], and water networks [20], [21]. Contributions.…”
Section: Introductionmentioning
confidence: 99%
“…Fifth, inspired by [13], we consider a competitive power generation scenario (Section V). We exploit our previous findings to characterize all control strategies for a coalition of generators to destabilize other machines involved in the power generation.…”
Section: Introductionmentioning
confidence: 99%