2021
DOI: 10.1049/cth2.12172
|View full text |Cite
|
Sign up to set email alerts
|

An adaptive sliding‐mode resilient control strategy in smart grid under mixed attacks

Abstract: This paper is concerned with security problems for cyber-physical systems (CPSs) under dynamic load altering attacks (DLAA) and false data injection attacks (FDIA). The smart grid, as a typical CPS system, is taken as an example in this paper. Since the communication channel is vulnerable to FDIA and DLAA, the stability of the smart grid may be influenced. For enhancing resilience and stability of smart grids, first of all, the power system model including both DLAA and FDIA is introduced. Second, an adaptive … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…False data injection (FDI) attacks in power systems are presented in Liu et al [7], which demonstrate that an attacker can successfully inject arbitrary attack signals into state variables and the attack can bypass existing detection devices. More importantly, attackers can manipulate control input commands by sabotaging the communication channel, tampering with system measurement data through intrusion measurement devices [8]. In the classical state estimation and feedback control problem, the existence of malicious attacks makes the system performance index seriously drop, so elastic control algorithm is needed to restore the system performance [9].…”
Section: Introductionmentioning
confidence: 99%
“…False data injection (FDI) attacks in power systems are presented in Liu et al [7], which demonstrate that an attacker can successfully inject arbitrary attack signals into state variables and the attack can bypass existing detection devices. More importantly, attackers can manipulate control input commands by sabotaging the communication channel, tampering with system measurement data through intrusion measurement devices [8]. In the classical state estimation and feedback control problem, the existence of malicious attacks makes the system performance index seriously drop, so elastic control algorithm is needed to restore the system performance [9].…”
Section: Introductionmentioning
confidence: 99%
“…During the SMC design process, the attackers can launch the cyber-attacks to invade the information system to threaten the security of sliding dynamics, and then destroy the stable operation of such dynamics. Very recently, a review of literature has witnessed the development of the security SMC [53,55,[63][64][65][66].…”
Section: Introductionmentioning
confidence: 99%