2013
DOI: 10.1109/mcom.2013.6400435
|View full text |Cite
|
Sign up to set email alerts
|

Bad data injection in smart grid: attack and defense mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
77
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(78 citation statements)
references
References 11 publications
0
77
0
1
Order By: Relevance
“…According to [7], a computationally efficient algorithm was derived to detect false data injection attacks using the generalized likelihood ratio test (GLRT) in the Bayesian framework. Huang et al [8] and [9] proposed cumulative sum (CUSUM)-based quickest detection (QD) to study the tradeoff between the attack detection speed and performance.…”
Section: Related Workmentioning
confidence: 99%
“…According to [7], a computationally efficient algorithm was derived to detect false data injection attacks using the generalized likelihood ratio test (GLRT) in the Bayesian framework. Huang et al [8] and [9] proposed cumulative sum (CUSUM)-based quickest detection (QD) to study the tradeoff between the attack detection speed and performance.…”
Section: Related Workmentioning
confidence: 99%
“…(F/100)−1 (9) After obtaining the model orders and parameters, the identified models can be evaluated by comparing their outputs with the actual system responses. The objective function for the model evaluation is e (F/100)−1 .…”
Section: Model Structure For Dynamic Response Estimationmentioning
confidence: 99%
“…Then the manipulated measurement z a = z + a can pass the bad data detection and identification of direct-current (DC) SE [8,9]. Thus, the measurement residual is:…”
Section: Tfdimentioning
confidence: 99%
“…While relatively effective against random noises, these detectors lack the ability to detect specialized and highly structured false data that conforms to the network topology and some particular physical laws. Recent works [4][5][6][7][8][9][10] have demonstrated that an adversary, armed with knowledge about the network's configuration, can successfully construct undetectable FDI attacks on SE avoiding detection. However, there are still some obstacles to launch such attacks.…”
Section: Introductionmentioning
confidence: 99%