2016 IEEE International Conference on Smart Grid Communications (SmartGridComm) 2016
DOI: 10.1109/smartgridcomm.2016.7778773
|View full text |Cite
|
Sign up to set email alerts
|

Combined data integrity and availability attacks on state estimation in cyber-physical power grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(23 citation statements)
references
References 11 publications
0
23
0
Order By: Relevance
“…Taking the attack scenarios under DC model as an example, if the attacker corrupts certain measurements using FDI attack vector a = Hc, it can remain hidden from the BDD but perturb the current state to a degree of c [13]. It's also shown in our recent work [6] that combined attacks can achieve the same target with the attack vector a = (I −diag(d))Hc. It should be noted that these data attacks are assumed not to make the system unobservable.…”
Section: A Data Attacks and Vulnerability Assessment Problemmentioning
confidence: 77%
See 2 more Smart Citations
“…Taking the attack scenarios under DC model as an example, if the attacker corrupts certain measurements using FDI attack vector a = Hc, it can remain hidden from the BDD but perturb the current state to a degree of c [13]. It's also shown in our recent work [6] that combined attacks can achieve the same target with the attack vector a = (I −diag(d))Hc. It should be noted that these data attacks are assumed not to make the system unobservable.…”
Section: A Data Attacks and Vulnerability Assessment Problemmentioning
confidence: 77%
“…A considerable amount of work has been done on vulnerability assessment of data attacks against EMS [4]- [6], [14], [15]. Usually these are system-theoretic measures that are based on analytic methods.…”
Section: B Towards Cyber-secure and Resilient State Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…In reference [15], detection methods that leverage synchrophasor data and other forecast information were presented. The network layer and application layer mitigation schemes, such as multi-path routing and data authentication and protection, are proved to be effective to decrease the vulnerability [16] [17].…”
Section: A State Of the Artmentioning
confidence: 99%
“…In this paper, we extend our prior work reported in [17] to formulate combined attacks with limited adversarial knowledge of the system model and conduct the risk analysis. In order to assess the risk, we first analyze vulnerability of SE with respect to attack resources needed by the adversary and calculate the detection probability of combined attacks.…”
Section: A State Of the Artmentioning
confidence: 99%