Results 31 to 40 of about 66,369 (329)

Local False Data Injection Attack Theory Considering Isolation Physical-Protection in Power Systems

open access: yesIEEE Access, 2020
Cyber security is a matter of the utmost importance in prosumer energy management systems and modern electric power transmission networks. Modern power system is a typical cyber physical system, which is formed by the deep integration of power network ...
Xueqian Fu, Gengrui Chen, Dechang Yang
doaj   +1 more source

Detection of false data injection attacks in smart-grid systems [PDF]

open access: yesIEEE Communications Magazine, 2015
Smart grids are essentially electric grids that use information and communication technology to provide reliable, efficient electricity transmission and distribution. Security and trust are of paramount importance. Among various emerging security issues, FDI attacks are one of the most substantial ones, which can significantly increase the cost of the ...
Chen, P-Y   +4 more
openaire   +2 more sources

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]

open access: yes, 2014
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim   +3 more
core   +1 more source

OLTC-Induced False Data Injection Attack on Volt/VAR Optimization in Distribution Systems

open access: yesIEEE Access, 2019
This paper presents a new class of false data injection attacks (FDIAs) on volt/VAR optimization (VVO), which may result in abnormal voltage conditions along the radial medium voltage (MV) distribution feeder with an on-load tap changer (OLTC), capacitor
Daranith Choeum, Dae-Hyun Choi
doaj   +1 more source

Parameter-Free False Data Injection Attack Model on Power System’s Automatic Generation Control

open access: yesIEEE Access, 2023
Automatic generation control (AGC) plays a crucial role in frequency control and economic dispatch of electric power systems. However, AGC systems, relying heavily on frequency and tie-line power measurements, are vulnerable to cyber-attacks.
Mingqiu Du, Xiaozhe Wang, Marthe Kassouf
doaj   +1 more source

Game-theoretic cybersecurity analysis for false data injection attack on networked microgrids

open access: yesIET Cyber-Physical Systems, 2019
In well-managed coordinated networked microgrids (MGs) besides electricity interchange between MGs, global optimisation is fulfilled. Here the authors studied a networked MG architecture, in which the control centre of microgrids communicates with a ...
Nima Nikmehr   +2 more
doaj   +1 more source

Distributed Resilient Mitigation Strategy for False Data Injection Attack in Cyber-Physical Microgrids

open access: yesFrontiers in Energy Research, 2022
The stable and reliable operation of microgrids requires the immediate communication and accurate measuring data of cyber systems. The cyber security of smart grids consists of detection and mitigation, where the latter mainly refers to resisting the ...
Ge Cao   +5 more
doaj   +1 more source

Guaranteed False Data Injection Attack Without Physical Model

open access: yesIEEE Open Access Journal of Power and Energy
Smart grids are increasingly vulnerable to False Data Injection Attacks (FDIAs) due to their growing reliance on interconnected digital systems. Many existing FDIA techniques assume access to critical physical model information, such as grid topology, to
Chenhan Xiao   +2 more
doaj   +1 more source

Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise

open access: yes, 2016
In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored Gaussian noise.
He, Haibo   +3 more
core   +1 more source

Machine Learning Methods for Attack Detection in the Smart Grid [PDF]

open access: yes, 2015
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings.
Esnaola, Inaki   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy