Results 21 to 30 of about 46,655 (287)

Detection of false data injection attacks using unscented Kalman filter

open access: yesJournal of Modern Power Systems and Clean Energy, 2018
It has recently been shown that state estimation (SE), which is the most important real-time function in modern energy management systems (EMSs), is vulnerable to false data injection attacks, due to the undetectability of those attacks using standard ...
Nemanja ŽIVKOVIĆ, Andrija T. SARIĆ
doaj   +1 more source

An Unknown Input Multi-Observer Approach for Estimation, Attack Isolation, and Control of LTI Systems under Actuator Attacks [PDF]

open access: yes, 2018
We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks.
blanke   +8 more
core   +2 more sources

Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids [PDF]

open access: yes, 2015
This paper discusses malicious false data injection attacks on the wide area measurement and monitoring system in smart grids. Firstly, methods of constructing sparse stealth attacks are developed for two typical scenarios: random attacks in which ...
Chin, WH   +4 more
core   +1 more source

A novel secure diffusion Kalman filter algorithm against false data injection attacks

open access: yesIET Communications, 2021
This paper proposes a novel secure diffusion Kalman filter (dKF) algorithm to improve the estimation performance crippled by false data injection attacks on sensors in wireless sensor networks (WSNs).
Yanan Du, Ning Li, Yonggang Zhang
doaj   +1 more source

Distributed Energy Management for Port Power System under False Data Injection Attacks

open access: yesComplexity, 2022
This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information ...
Qihe Shan   +3 more
doaj   +1 more source

Adaptive Sliding-Mode Path-Following Control of Cart-Pendulum Robots with False Data Injection Attacks

open access: yesActuators, 2023
This paper addresses the displacement path-following problem for a class of disturbed cart-pendulum systems under the fake data injection (FDI) actuator attacks.
Jiadong Liu   +3 more
doaj   +1 more source

Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks

open access: yes, 2020
This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-
Chu, Zhigang   +3 more
core   +1 more source

State vulnerability assessment against false data injection attacks in AC state estimators

open access: yesEnergy Conversion and Economics, 2022
The transformation of the conventional power grid into a smart grid has revolutionised the power industry. However, this has also made the power grid vulnerable to various cyberattacks.
Gaurav Khare   +2 more
doaj   +1 more source

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]

open access: yes, 2014
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim   +3 more
core   +1 more source

Consensus-Based Distributed Target Tracking with False Data Injection Attacks over Radar Network

open access: yesApplied Sciences, 2021
For target tracking in radar network, any anomaly in a part of the system can quickly spread over the network and lead to tracking failures. False data injection (FDI) attacks can damage the state estimation mechanism by modifying the radar measurements ...
Yongtao Shui   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy