Results 11 to 20 of about 45,445 (284)

Detection of false data injection attacks in smart-grid systems [PDF]

open access: yesIEEE Communications Magazine, 2015
Smart grids are essentially electric grids that use information and communication technology to provide reliable, efficient electricity transmission and distribution. Security and trust are of paramount importance. Among various emerging security issues, FDI attacks are one of the most substantial ones, which can significantly increase the cost of the ...
Chen, P-Y   +4 more
openaire   +4 more sources

Reachability-Based False Data Injection Attacks and Defence Mechanisms for Cyberpower System

open access: yesEnergies, 2022
With the push for higher efficiency and reliability, an increasing number of intelligent electronic devices (IEDs) and associated information and communication technology (ICT) are integrated into the Internet of Things (IoT)-enabled smart grid.
Ren Liu   +3 more
doaj   +1 more source

An Efficient Data-Driven False Data Injection Attack in Smart Grids [PDF]

open access: yes2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 2018
Data-driven false data injection attack is one of the emerging techniques in smart grids, provided that the adversary can monitor the meter readings. The basic idea is constructing attack vectors from the estimated signal subspace, without knowing system measurement matrix.
Wen, F., Liu, W.
openaire   +2 more sources

Robustness of Short-Term Wind Power Forecasting against False Data Injection Attacks

open access: yesEnergies, 2020
The accuracy of wind power forecasting depends a great deal on the data quality, which is so susceptible to cybersecurity attacks. In this paper, we study the cybersecurity issue of short-term wind power forecasting. We present one class of data attacks,
Yao Zhang, Fan Lin, Ke Wang
doaj   +1 more source

Secure LQG control for a Quadrotor under false data injection attacks

open access: yesIET Control Theory & Applications, 2022
The linear quadratic Gaussian (LQG) control for a quadrotor unmanned aerial vehicle (UAV) under false data injection attacks is studied. The LQG control depends on optimal state estimation, while this type of attacks makes the optimal state estimation ...
Hong Lin   +4 more
doaj   +1 more source

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]

open access: yes, 2017
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash   +3 more
core   +2 more sources

Detection of false data injection attacks using unscented Kalman filter

open access: yesJournal of Modern Power Systems and Clean Energy, 2018
It has recently been shown that state estimation (SE), which is the most important real-time function in modern energy management systems (EMSs), is vulnerable to false data injection attacks, due to the undetectability of those attacks using standard ...
Nemanja ŽIVKOVIĆ, Andrija T. SARIĆ
doaj   +1 more source

Coordinated False Data Injection Attacks in AGC System and Its Countermeasure

open access: yesIEEE Access, 2020
The Automatic Generation Control (AGC) system is vital for power system frequency stability. The frequency and tie-line power flow are measured and transmitted to the control room to form Area Control Error (ACE), which is then sent to each generator for
Xi He, Xuan Liu, Peng Li
doaj   +1 more source

Design of False Data Injection Attack on Distributed Process Estimation [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2022
arXiv admin note: substantial text overlap with arXiv:2002 ...
Moulik Choraria   +3 more
openaire   +2 more sources

A moving target defense to detect stealthy attacks in cyber-physical systems [PDF]

open access: yes, 2019
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communication patterns when compared to classical information technology networks.
Cardenas, A, Giraldo, J, Sanfelice, RG
core   +1 more source

Home - About - Disclaimer - Privacy