Results 21 to 30 of about 63,938 (281)

Design of False Data Injection Attack on Distributed Process Estimation [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2022
arXiv admin note: substantial text overlap with arXiv:2002 ...
Moulik Choraria   +3 more
openaire   +2 more sources

An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks [PDF]

open access: yes, 2018
We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks.
blanke   +8 more
core   +2 more sources

False Data Injection Attack Detection in Smart Grid Using Energy Consumption Forecasting

open access: yesEnergies, 2022
Supervisory Control and Data Acquisition (SCADA) systems are essential for reliable communication and control of smart grids. However, in the cyber-physical realm, it becomes highly vulnerable to cyber-attacks like False Data Injection (FDI) into the ...
Abrar Mahi-al-rashid   +3 more
doaj   +1 more source

Low Latency Detection of Sparse False Data Injections in Smart Grids

open access: yesIEEE Access, 2018
We study low-latency detections of sparse false data injection attacks in power grids, where an adversary can maliciously manipulate power grid operations by modifying measurements at a small number of smart meters. When a power grid is under attack, the
Israel Akingeneye, Jingxian Wu
doaj   +1 more source

Localization of False Data Injection Attack in Smart Grids Based on SSA-CNN

open access: yesInformation, 2023
In recent years, smart grids have integrated information and communication technologies into power networks, which brings new network security issues. Among the existing cyberattacks, the false data injection attack (FDIA) compromises state estimation in
Kelei Shen   +3 more
doaj   +1 more source

System recovery of MIMO nonlinear systems against false data injection attack [PDF]

open access: yesPeerJ Computer Science
This article investigates the system recovery problem for a class of multi-input multi-output (MIMO) nonlinear systems under false data injection attack. Under the conditions that the attack is norm-bounded and the system has a vector relative degree and
Guokai Liang   +8 more
doaj   +2 more sources

Local False Data Injection Attack Theory Considering Isolation Physical-Protection in Power Systems

open access: yesIEEE Access, 2020
Cyber security is a matter of the utmost importance in prosumer energy management systems and modern electric power transmission networks. Modern power system is a typical cyber physical system, which is formed by the deep integration of power network ...
Xueqian Fu, Gengrui Chen, Dechang Yang
doaj   +1 more source

OLTC-Induced False Data Injection Attack on Volt/VAR Optimization in Distribution Systems

open access: yesIEEE Access, 2019
This paper presents a new class of false data injection attacks (FDIAs) on volt/VAR optimization (VVO), which may result in abnormal voltage conditions along the radial medium voltage (MV) distribution feeder with an on-load tap changer (OLTC), capacitor
Daranith Choeum, Dae-Hyun Choi
doaj   +1 more source

Parameter-Free False Data Injection Attack Model on Power System’s Automatic Generation Control

open access: yesIEEE Access, 2023
Automatic generation control (AGC) plays a crucial role in frequency control and economic dispatch of electric power systems. However, AGC systems, relying heavily on frequency and tie-line power measurements, are vulnerable to cyber-attacks.
Mingqiu Du, Xiaozhe Wang, Marthe Kassouf
doaj   +1 more source

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]

open access: yes, 2014
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy