2017
DOI: 10.1109/access.2017.2728681
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(31 citation statements)
references
References 32 publications
0
31
0
Order By: Relevance
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18])…”
Section: Sms Resultsmentioning
confidence: 99%
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18])…”
Section: Sms Resultsmentioning
confidence: 99%
“…One of the well-known static detectors is detectors of attacks on state estimation. To date, several strategies have been developed to detect/mitigate FDI attacks targeting state estimation, such as statistical methods [2,106], Kalman filter [107], sparse optimization [108], state forecasting [109,110], network theory [111], time-series simulation [69], machine learning [112][113][114][115][116], generalized likelihood ratio [117], Chi-square detector, and similarity matching [118]. However, these strategies are used to recover DC state information and are suitable for FDI attacks on DC state estimation.…”
Section: Static Detectors Of Cyber-attacksmentioning
confidence: 99%
“…There are currently many popular detection methods that have been developped that relies on special meaurements. Among those we will contrast our method with [48], which is a detection scheme using K-means clustering on CSSVC (Control Signal from the controller to the Static Var Compensator) and NVSI (Node Voltage Stability Index) measurements, and [49], that involves the use of SVD (Singular Value Decomposition) and convex-optimization in order exploit the low-rank property of the measurement matrix comprising of PMU measurements. Compared to those methods, the technique, proposed in this paper, has higher accuracy and is less prone to false positives since the entropic state will decrease as the attack is continuously propagated throughout the generative model.…”
Section: ) Complete Algorithmmentioning
confidence: 99%