2018
DOI: 10.1109/tsg.2017.2665461
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of Synchrophasor-Based WAMPAC Applications’ to Time Synchronization Spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 72 publications
(8 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…In the following, the existence of controlled power load changes is considered. In this case, the load changes are applied to the measured data in the presence of the attack by changing the input of the control in (1). The outputs of NN and NNGSD are shown in Fig.…”
Section: B Gsa Detection In the Presence Of Noisementioning
confidence: 99%
See 1 more Smart Citation
“…In the following, the existence of controlled power load changes is considered. In this case, the load changes are applied to the measured data in the presence of the attack by changing the input of the control in (1). The outputs of NN and NNGSD are shown in Fig.…”
Section: B Gsa Detection In the Presence Of Noisementioning
confidence: 99%
“…Since GPS systems use wireless communication, receivers are vulnerable to cyberattacks, including GPS spoofing attacks. The spoofer generates false GPS signals and broadcasts them [1]. The adjacent GPS receiver tracks transmitted fake signals, so false time tags are received [2].…”
Section: Introductionmentioning
confidence: 99%
“…Beyond a certain value of time delay, damping will cease to be effective. These effects are explored in more detail in [7], [8], [28] and [33]. This work's treatment of communication network delay is limited to measuring and reporting delay values.…”
Section: A Literature Review 1) Feasibility and Design Studiesmentioning
confidence: 99%
“…GPS spoofing exploits publicly available civilian GPS signals using air or cable to produce signals that initially align with the original, but slowly start increasing the power to drown the authentic signal and thereby compromising the receiver [54,127]. By introducing measurement errors in the time synchronization, the attacks induce changes in data consistency and plausibility which can be used as markers to identify the likelihood of the attack [128][129][130].…”
Section: Addressing Cyber-attacks Using Quality Issuesmentioning
confidence: 99%