2020
DOI: 10.1109/access.2020.3003323
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Cyber Attack Model for Cyber-Physical Power Systems

Abstract: Over the past decade, the cyber security of power systems has been widely studied. Most previous studies have focused on cyber physical attacks, and barely considered one typical cyber attack: availability attack. We propose a hybrid attack model and apply conventional state estimation processes to study cyber attacks on power grids in this paper. The proposed model considers both integrity attack and availability attack simultaneously. Compared with the particular attack, namely, false data injected attack, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…The smart grid operators should be conscious of the measurement risks and commands corrupted via attackers internally and externally. Restoration efforts and mitigation need to be guided with sufficient security consciousness for evading secondary recompenses in the post-attack systems [99].…”
Section: B3 Cp Securitymentioning
confidence: 99%
“…The smart grid operators should be conscious of the measurement risks and commands corrupted via attackers internally and externally. Restoration efforts and mitigation need to be guided with sufficient security consciousness for evading secondary recompenses in the post-attack systems [99].…”
Section: B3 Cp Securitymentioning
confidence: 99%
“…The second, assumed as a non-stealthy attack, aims to maximize the damage on power system operation by targeting the most vulnerable transmission line, impeding power dispatch, and causing load shedding. In [48], the authors propose a hybrid data integrity and data availability attack. They demonstrate how control center measurements can be manipulated leading to undetectable FDIAs.…”
Section: B Cpes Security Studiesmentioning
confidence: 99%
“…There have been several research activities to model these interactions. For example, different mathematical tools such as Petri Nets [104][105][106], stochastic graphs [107], and complex networks [108,109] have been used to extract the interaction model. In this context, power grids are also hybrid systems containing a mixture of continuous and discrete-time events [110].…”
Section: Power Grids As Cyber-physical Systemsmentioning
confidence: 99%