2022
DOI: 10.1109/jsyst.2022.3181066
|View full text |Cite
|
Sign up to set email alerts
|

Bilevel Model for Protection-Branch Measurements-Based Topology Attack Against DC and AC State Estimations

Abstract: A topology attack, as a special class of false data injection attacks, tampers with topology information of a system to mislead the decision of the control center. This article conducts an in-depth study on topology attacks that aim to interfere with the judgment in topology information and pose potential damage by tampering with measurement data and protection information on branches, namely, protection-branch measurements-based topology attacks (PBT attacks). To achieve PBT attacks in actual networks, we stu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 30 publications
(44 reference statements)
0
0
0
Order By: Relevance
“…However, due to the large-scale integration of smart terminals and the transmission of data through networks by numerous smart devices, the continuous improvement of the intelligent level of the power grid also provides rich attack entrances for malicious attackers. This makes the grid more vulnerable to network attacks, such as denial-of-service attacks [3], replay attacks [4], topological tampering attacks [5], and false data injection attacks (FDIAs) [6].…”
Section: Introductionmentioning
confidence: 99%
“…However, due to the large-scale integration of smart terminals and the transmission of data through networks by numerous smart devices, the continuous improvement of the intelligent level of the power grid also provides rich attack entrances for malicious attackers. This makes the grid more vulnerable to network attacks, such as denial-of-service attacks [3], replay attacks [4], topological tampering attacks [5], and false data injection attacks (FDIAs) [6].…”
Section: Introductionmentioning
confidence: 99%