2021
DOI: 10.1049/gtd2.12338
|View full text |Cite
|
Sign up to set email alerts
|

A cyber‐attack detection method for load control system based on cyber and physical layer crosscheck mechanism

Abstract: Cyber‐attack has become one of the main threats to the safe operation of the load control system in the distribution network. Currently, a large number of methods are developed to detect cyber‐attacks. However, most of these methods make decisions based on information from a single cyber layer or physical layer. If the decision is wrong, there is no way to verify it. Therefore, if the separate decisions can be made in the cyber layer and physical layer at the same time, and a final judgment is received through… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
(23 reference statements)
0
2
0
Order By: Relevance
“…Smart grids are very complex, cyber-attacks may occur in any link of smart grids [7]. There are many kinds of cyber-attacks in smart grid, including integrity tampering [8], availability jamming [9], replay, wormhole [10], DoS [11], false data injection [12], password pilfering, masquerading [13] and other cyber-attacks [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…Smart grids are very complex, cyber-attacks may occur in any link of smart grids [7]. There are many kinds of cyber-attacks in smart grid, including integrity tampering [8], availability jamming [9], replay, wormhole [10], DoS [11], false data injection [12], password pilfering, masquerading [13] and other cyber-attacks [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…Such interdependencies are beneficial for formulating smarter management strategies and promoting economic development, but also dramatically increase the vulnerability of systems [4] due to double threats from cyber-attacks (e.g. modern malware or malicious code) [5,6] and physical attacks (e.g. adversar-ial disruptions to substations or transmissions) [7].…”
Section: Introductionmentioning
confidence: 99%