Design of False Data Injection Attack on Distributed Process Estimation [PDF]
arXiv admin note: substantial text overlap with arXiv:2002 ...
Moulik Choraria +3 more
openaire +2 more sources
An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks [PDF]
We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks.
blanke +8 more
core +2 more sources
False Data Injection Attack Detection in Smart Grid Using Energy Consumption Forecasting
Supervisory Control and Data Acquisition (SCADA) systems are essential for reliable communication and control of smart grids. However, in the cyber-physical realm, it becomes highly vulnerable to cyber-attacks like False Data Injection (FDI) into the ...
Abrar Mahi-al-rashid +3 more
doaj +1 more source
Low Latency Detection of Sparse False Data Injections in Smart Grids
We study low-latency detections of sparse false data injection attacks in power grids, where an adversary can maliciously manipulate power grid operations by modifying measurements at a small number of smart meters. When a power grid is under attack, the
Israel Akingeneye, Jingxian Wu
doaj +1 more source
Localization of False Data Injection Attack in Smart Grids Based on SSA-CNN
In recent years, smart grids have integrated information and communication technologies into power networks, which brings new network security issues. Among the existing cyberattacks, the false data injection attack (FDIA) compromises state estimation in
Kelei Shen +3 more
doaj +1 more source
System recovery of MIMO nonlinear systems against false data injection attack [PDF]
This article investigates the system recovery problem for a class of multi-input multi-output (MIMO) nonlinear systems under false data injection attack. Under the conditions that the attack is norm-bounded and the system has a vector relative degree and
Guokai Liang +8 more
doaj +2 more sources
Local False Data Injection Attack Theory Considering Isolation Physical-Protection in Power Systems
Cyber security is a matter of the utmost importance in prosumer energy management systems and modern electric power transmission networks. Modern power system is a typical cyber physical system, which is formed by the deep integration of power network ...
Xueqian Fu, Gengrui Chen, Dechang Yang
doaj +1 more source
OLTC-Induced False Data Injection Attack on Volt/VAR Optimization in Distribution Systems
This paper presents a new class of false data injection attacks (FDIAs) on volt/VAR optimization (VVO), which may result in abnormal voltage conditions along the radial medium voltage (MV) distribution feeder with an on-load tap changer (OLTC), capacitor
Daranith Choeum, Dae-Hyun Choi
doaj +1 more source
Parameter-Free False Data Injection Attack Model on Power System’s Automatic Generation Control
Automatic generation control (AGC) plays a crucial role in frequency control and economic dispatch of electric power systems. However, AGC systems, relying heavily on frequency and tie-line power measurements, are vulnerable to cyber-attacks.
Mingqiu Du, Xiaozhe Wang, Marthe Kassouf
doaj +1 more source
Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim +3 more
core +1 more source

