The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.3390/app11219972
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Layer Security Scheme for Mitigating Smart Grid Vulnerability against Faults and Cyber-Attacks

Abstract: To comply with electric power grid automation strategies, new cyber-security protocols and protection are required. What we now experience is a new type of protection against new disturbances namely cyber-attacks. In the same vein, the impact of disturbances arising from faults or cyber-attacks should be surveyed by network vulnerability criteria alone. It is clear that the diagnosis of vulnerable points protects the power grid against disturbances that would inhibit outages such as blackouts. So, the first st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(24 citation statements)
references
References 54 publications
0
11
0
Order By: Relevance
“…[127] AMI A quantum key distribution-based secure key transmission is proposed for increasing the security of smart meters against cyber-attacks [128] Applicable to all A multi-layer protocol is proposed to enhance the cyber-security of SG applications.…”
Section: Sg Application Summarymentioning
confidence: 99%
“…[127] AMI A quantum key distribution-based secure key transmission is proposed for increasing the security of smart meters against cyber-attacks [128] Applicable to all A multi-layer protocol is proposed to enhance the cyber-security of SG applications.…”
Section: Sg Application Summarymentioning
confidence: 99%
“…On this basis, the FDI attack, by means of injecting incorrect information into the system as defined by ( 14), is launched, with an arbitrary performance targeted defined as in (15). Attack assessment is checked by constraint (16). In other words, assume that a system will reach an acceptable solution F given the injection of accurately measured data w t to the system model f () at time t, as shown in (14).…”
Section: The Cyber-attack Model Of the Fdi Typementioning
confidence: 99%
“…In recent years, the widespread blackouts in the United States made an impression on a vast number of customers. To avoid future repetition of such cases, grid operation must be examined from a vulnerability analysis perspective [16]. Such an analysis can help in the development of the weak and susceptible points in a system, protecting against all contingencies to establish an invulnerable grid [17].…”
Section: Introductionmentioning
confidence: 99%
“…Environmental, organisational structure, society, administration and communication and corporate governance practises to prevent data theft, unfairness and work overload provide opportunity factors for employees to engage in data theft [111]. To solve this challenge, new cyber security procedures are needed to identify vulnerable locations in the smart grid and prevent power disruptions [112]. The data-driven approaches are ideal for complicated grids with large datasets.…”
Section: Big Data Analytics As Solutions To Achieve Sustainability In the Smart Gridmentioning
confidence: 99%