2015
DOI: 10.4236/ica.2015.64020
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Technique for Detection of Time Delay Switch Attack on Load Frequency Control

Abstract: In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a power control system, unstable. Therefore, future smart grids will have to use advanced methods to provide better situational awareness of power grid states keeping smart grids reliable and safe from TDS attacks. Here, we introduce a simple method for preventing time delay switch attack on networke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Passive attack Time delay attack [83] DDoS attack [6] Traffic analysis attack [89] Eavesdropping attack [91] Majority attack [98] MITM attack [81] Malleability attack [93] Selfish mining attack [99] Background knowledge attack [68] Skewness attack [116] Homogeneity attack [115] Similarity attack [117] Malicious smart contract [106] BGP hijacking attack [85] Liveness attack [87] Attack layers Attacks Countermeasures…”
Section: Active Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Passive attack Time delay attack [83] DDoS attack [6] Traffic analysis attack [89] Eavesdropping attack [91] Majority attack [98] MITM attack [81] Malleability attack [93] Selfish mining attack [99] Background knowledge attack [68] Skewness attack [116] Homogeneity attack [115] Similarity attack [117] Malicious smart contract [106] BGP hijacking attack [85] Liveness attack [87] Attack layers Attacks Countermeasures…”
Section: Active Attackmentioning
confidence: 99%
“…An attacker tries to control the network traffic, which leads to the delay in the transmission of message[82]. Delay attack can be categorized in the following two attacks: BGP hijacking and Liveness attack.•Countermeasures: To prevent time delay attack, Arman et al[83], proposed a method to track and estimate the time delay during communication on the network. If the measured time delay is more than the allowed time delay, then the system issue an alarm signal to stable the system.…”
mentioning
confidence: 99%
“…In the last few years, a good deal of results have been reported with regard to LFC problems of power systems containing packet dropout as well as time delays [6,[12][13][14][15]. A novel decentralized LFC control strategy based on switching control theory was researched by Yang et al By means of transmission delays as a switching decision parameter, the LFC system as a range of subsystems was modeled, which provides a more accurate description of the impact of delays as well as packet dropout on the system [6].…”
Section: Introductionmentioning
confidence: 99%