Results 11 to 20 of about 67,029 (331)

False data injection attack in smart grid: Attack model and reinforcement learning-based detection method

open access: yesFrontiers in Energy Research, 2023
The smart grid, as a cyber-physical system, is vulnerable to attacks due to the diversified and open environment. The false data injection attack (FDIA) can threaten the grid security by constructing and injecting the falsified attack vector to bypass ...
Xixiang Lin   +3 more
doaj   +1 more source

A Controllable False Data Injection Attack for a Cyber Physical System

open access: yesIEEE Access, 2021
With the evolution of the Internet of Things (IoT), various types of devices and massive systems comprising national infrastructures such as a smart grid are connected on a network, which poses various types of security issues in a cyber physical system.
Janghoon Yang
doaj   +1 more source

Distributed Control for AC Microgrids with False Data Injection Attacks and Time Delays [PDF]

open access: yesE3S Web of Conferences, 2020
Distributed control is widely used in AC microgrids to maintain frequency and voltage stability and internal power balance. However, distributed control need realizes information interaction through communication network, which makes microgrid vulnerable
Lu Rentao, Wang Jie
doaj   +1 more source

Strategy optimization of false data injection attack on AC-DC hybrid systems

open access: yes电力工程技术, 2023
False data injection (FDI) attack is one of the attacks that can seriously affect the operation of power systems. Some studies have focused on the cyber-attack methods of AC-DC hybrid systems. However, few studies pay their efforts on the optimization of
XIE Yunyun   +4 more
doaj   +1 more source

Fourier Singular Values-Based False Data Injection Attack Detection in AC Smart-Grids

open access: yesApplied Sciences, 2021
Cyber-physical threats as false data injection attacks (FDIAs) in islanded smart microgrids (ISMGs) are typical accretion attacks, which need urgent consideration.
Moslem Dehghani   +5 more
doaj   +1 more source

A multi-stage low-cost false data injection attack method for power CPS

open access: yesZhejiang dianli, 2023
With the rapid development of information and communication technology, the power system has developed into a cyber physical system (CPS) in which the information system and the physical system are deeply coupled. The constant interplay between data flow
YI Na, XU Jianjun, CHEN Yue, PAN Feiyu
doaj   +1 more source

Dynamic Phasor Estimation Method Considering False Data Attack Detection

open access: yesTaiyuan Ligong Daxue xuebao, 2022
In this paper proposed was a dynamic phasor estimation method considering false data attack. First, an electrical signal model for dynamic conditions is established by Taylor series expansion of electrical signals with harmonic and noise conditions. Then,
Dakai ZHAO   +3 more
doaj   +1 more source

An Efficient Data-Driven False Data Injection Attack in Smart Grids [PDF]

open access: yes2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 2018
Data-driven false data injection attack is one of the emerging techniques in smart grids, provided that the adversary can monitor the meter readings. The basic idea is constructing attack vectors from the estimated signal subspace, without knowing system measurement matrix.
Wen, F., Liu, W.
openaire   +2 more sources

Defense of Massive False Data Injection Attack via Sparse Attack Points Considering Uncertain Topological Changes

open access: yesJournal of Modern Power Systems and Clean Energy, 2022
False data injection attack (FDIA) is a typical cyber-attack aiming at falsifying measurement data for state estimation (SE), which may incur catastrophic consequences on cyber-physical system operation.
Xiaoge Huang   +4 more
doaj   +1 more source

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]

open access: yes, 2017
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy