2020
DOI: 10.1109/tii.2019.2919202
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Distributed and Stealthy Attack on Active Distribution Networks and a Mitigation Strategy

Abstract: Rapid advances in smart devices tremendously facilitate our day-to-day lives. However, these can be exploited remotely via existing cyber vulnerabilities to cause disruption at the physical infrastructure level. In this paper, we discover a novel distributed and stealthy attack that uses malicious actuation of a large number of small-scale loads residing within a distribution network (DN). This attack is capable of cumulatively violating the underlying operational system limits, leading to widespread and prolo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…5, in order to observe the fluctuation caused by the selection matrices, we plot the MSE in (38) and MSE ′ = 1 L lim k→∞ L i=1 tr(P i (k)) with P i (k) in (8). 1 Thus, we can examine the accuracy of our theoretical finding to compute the expected value of the error covariance with respect to the selection matrices in (23). The comparable performance of the MSE and MSE ′ in Fig.…”
Section: Simulation Resultsmentioning
confidence: 97%
See 2 more Smart Citations
“…5, in order to observe the fluctuation caused by the selection matrices, we plot the MSE in (38) and MSE ′ = 1 L lim k→∞ L i=1 tr(P i (k)) with P i (k) in (8). 1 Thus, we can examine the accuracy of our theoretical finding to compute the expected value of the error covariance with respect to the selection matrices in (23). The comparable performance of the MSE and MSE ′ in Fig.…”
Section: Simulation Resultsmentioning
confidence: 97%
“…with P i being the steady-state error covariance matrix of agent i in (23). The simulation results presented in the following are obtained by averaging over 100 independent experiments.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Studies on the vulnerability of the power grid structure were generally based on the complex network theory, especially the analysis and verification of small‐world (SW) characteristics and scale‐free characteristics in power systems 9,10,11,12,13 . However, some scholars focused on the vulnerability analysis of ADNs 5,6,14 . Cao et al 5 proposed a routing algorithm based on the link‐state protocol to determine the optimum data transmission paths in cyber networks.…”
Section: Introductionmentioning
confidence: 99%
“…Liu et al 6 proposed a cyber‐physical active distribution system to minimize the construction and operation cost of CPSs and maximize the penetration level of distributed generation. Srikantha et al 14 proposed a population game using real‐time and adaptive defense mechanisms based on data aggregation to mitigate the adverse effects of the Stackelberg game attacks that used malicious actuation of large number of small‐scale loads residing in a distribution network. Small‐scale and large‐scale test networks were simulated as a CPS in ADNs to verify the feasibility and effectiveness of a hybrid state estimator and hybrid state estimator based single‐phase‐to‐ground fault line identification methods 7 .…”
Section: Introductionmentioning
confidence: 99%