Results 21 to 30 of about 45,445 (284)

Data Collaborative Detection Scheme of Electric Metering System Based on Edge Computing

open access: yesZhongguo dianli, 2019
False data injection attacks are aimed at destroying the integrity and availability of power data in electric metering system. The false data detection scheme is of great significance to the secure and stable operation of smart grid.
Bin QIAN   +5 more
doaj   +1 more source

An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks [PDF]

open access: yes, 2018
We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks.
blanke   +8 more
core   +2 more sources

Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks

open access: yes, 2020
This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-
Chu, Zhigang   +3 more
core   +1 more source

Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids [PDF]

open access: yes, 2015
This paper discusses malicious false data injection attacks on the wide area measurement and monitoring system in smart grids. Firstly, methods of constructing sparse stealth attacks are developed for two typical scenarios: random attacks in which ...
Chin, WH   +4 more
core   +1 more source

A novel secure diffusion Kalman filter algorithm against false data injection attacks

open access: yesIET Communications, 2021
This paper proposes a novel secure diffusion Kalman filter (dKF) algorithm to improve the estimation performance crippled by false data injection attacks on sensors in wireless sensor networks (WSNs).
Yanan Du, Ning Li, Yonggang Zhang
doaj   +1 more source

Distributed Energy Management for Port Power System under False Data Injection Attacks

open access: yesComplexity, 2022
This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information ...
Qihe Shan   +3 more
doaj   +1 more source

Adaptive Sliding-Mode Path-Following Control of Cart-Pendulum Robots with False Data Injection Attacks

open access: yesActuators, 2023
This paper addresses the displacement path-following problem for a class of disturbed cart-pendulum systems under the fake data injection (FDI) actuator attacks.
Jiadong Liu   +3 more
doaj   +1 more source

State vulnerability assessment against false data injection attacks in AC state estimators

open access: yesEnergy Conversion and Economics, 2022
The transformation of the conventional power grid into a smart grid has revolutionised the power industry. However, this has also made the power grid vulnerable to various cyberattacks.
Gaurav Khare   +2 more
doaj   +1 more source

Security Against False Data-Injection Attack in Cyber-Physical Systems [PDF]

open access: yesIEEE Transactions on Control of Network Systems, 2020
In this paper, secure, remote estimation of a linear Gaussian process via observations at multiple sensors is considered. Such a framework is relevant to many cyber-physical systems and internet-of-things applications. Sensors make sequential measurements that are shared with a fusion center; the fusion center applies a certain filtering algorithm to ...
Arpan Chattopadhyay, Urbashi Mitra
openaire   +2 more sources

Consensus-Based Distributed Target Tracking with False Data Injection Attacks over Radar Network

open access: yesApplied Sciences, 2021
For target tracking in radar network, any anomaly in a part of the system can quickly spread over the network and lead to tracking failures. False data injection (FDI) attacks can damage the state estimation mechanism by modifying the radar measurements ...
Yongtao Shui   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy