2017
DOI: 10.1109/jiot.2017.2709252
|View full text |Cite
|
Sign up to set email alerts
|

Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 59 publications
(40 citation statements)
references
References 40 publications
0
40
0
Order By: Relevance
“…As the range of users increases in an IT organization, it becomes a challenge for IT to deliver the right kind of desktop view in the right way for each user type. Desktop virtualization provides a solution by separating the physical location of a client device from its logical interface [12,13].…”
Section: Figure 3 Types Of System Virtualizationmentioning
confidence: 99%
“…As the range of users increases in an IT organization, it becomes a challenge for IT to deliver the right kind of desktop view in the right way for each user type. Desktop virtualization provides a solution by separating the physical location of a client device from its logical interface [12,13].…”
Section: Figure 3 Types Of System Virtualizationmentioning
confidence: 99%
“…Mo et al [34] established a science of cyber-physical system security by integrating system theory and cyber security. Particularly, there have been a number of research efforts devoted to data integrity attacks against key functional modules in the energy-based cyber-physical systems, as well as defense thereof [7,14,15,32,35,36]. For example, Yang et al [13] developed an optimal attack strategy against the state estimation process that enables a minimum set of compromised sensors to launch a successful attack.…”
Section: Related Workmentioning
confidence: 99%
“…The effectiveness of the proposed attack-resilient mechanism is illustrated through case studies in the IEEE 14-bus system. Yang et al 84 explores the security of OFP and investigates the data integrity attack against OPF with the least effort from the adversary's perspective, and proposes defense schemes, with respect to the number of nodes to compromise and the amount of information to manipulate. The 2 developed defensive schemes can make OPF resilient to the data integrity attack via protecting critical nodes and identifying the falsified measurements accurately in the system.…”
Section: Security and Reliabilitymentioning
confidence: 99%