2020
DOI: 10.1109/jiot.2020.2991693
|View full text |Cite
|
Sign up to set email alerts
|

A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
67
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 112 publications
(67 citation statements)
references
References 22 publications
0
67
0
Order By: Relevance
“…The FDI attack can result in various outcomes relying on the intention of the intruder, which comprises error in the locational marginal prices (LMP) for illegal market profits, energy theft, along with physical destruction through the network. FDI attacks can affect the LMP by confusing the state estimation, which then unsympathetically involves the contingency analysis processes [45]. • Insertion of worms or malware can range from malicious software that operates in backgrounds to decelerate the smart grid computers' operations via employing Trojan software for stealing the certificates of practical security [46].…”
Section: A Causes Of Cyber-attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The FDI attack can result in various outcomes relying on the intention of the intruder, which comprises error in the locational marginal prices (LMP) for illegal market profits, energy theft, along with physical destruction through the network. FDI attacks can affect the LMP by confusing the state estimation, which then unsympathetically involves the contingency analysis processes [45]. • Insertion of worms or malware can range from malicious software that operates in backgrounds to decelerate the smart grid computers' operations via employing Trojan software for stealing the certificates of practical security [46].…”
Section: A Causes Of Cyber-attacksmentioning
confidence: 99%
“…Exploiting the wireless capabilities to control the industrial control system application remotely [5], [157], [165], [212] Disturbing the industrial control system operation Physical threats Spoofing a temperature sensor in a specific environment [53], [39], [45], [63], [164] Sending deceptive, false measurements to the control center…”
Section: Criminal Threatsmentioning
confidence: 99%
“…In SVM, we sketch data items by the point in an ndimensional area where n represents the considered features [25]. It creates a hyper plane and separates the data into classes [26].…”
Section: ) Support Vector Machinementioning
confidence: 99%
“…DBNs are compositions of simple, unsupervised networks such as restricted Boltzmann machines or autoencoders [127]. The authors in [128] utilised autoencoder networks for the detection of FDIA leveraging temporal and spatial sensor data correlations. He et al [108] proposed a DBN and state vector estimator (SVE) for real‐time detection of FDIAs.…”
Section: Machine Learning For Fdias Detectionmentioning
confidence: 99%