2018
DOI: 10.1109/tsusc.2017.2757911
|View full text |Cite
|
Sign up to set email alerts
|

Consideration of Cyber-Physical Interdependencies in Reliability Modeling of Smart Grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 58 publications
(32 citation statements)
references
References 33 publications
0
29
0
1
Order By: Relevance
“…In case 3, we analyze the fault First turning into state 1 in Figure 7, the system operates normally, as shown in Figure 2, at time T. Assuming that an FDI attack occurs on the downlink between the control center and the cyber node connected to branch (5,7), which is represented by , state 1 enters into state 2. In state 2, the breaker of the branch (5,7) trips at time T + 1 by reason of the FDI attack, which leads to the power flow on each branch being redistributed.…”
Section: Casementioning
confidence: 99%
See 3 more Smart Citations
“…In case 3, we analyze the fault First turning into state 1 in Figure 7, the system operates normally, as shown in Figure 2, at time T. Assuming that an FDI attack occurs on the downlink between the control center and the cyber node connected to branch (5,7), which is represented by , state 1 enters into state 2. In state 2, the breaker of the branch (5,7) trips at time T + 1 by reason of the FDI attack, which leads to the power flow on each branch being redistributed.…”
Section: Casementioning
confidence: 99%
“…In state 7, the control center will make decisions and send control commands after receiving physical system information, except for the breaker information of branch (8,9) at time T + 3. Those commands include reclosing the breaks of branch (5,7), branch (4,5), and branch (6,9), which are First turning into state 1 in Figure 7, the system operates normally, as shown in Figure 2, at time T. Assuming that an FDI attack occurs on the downlink between the control center and the cyber node connected to branch (5,7), which is represented by G f t down (7, 5) = G f t down (5, 7) = 0, state 1 enters into state 2. In state 2, the breaker of the branch (5,7) trips at time T + 1 by reason of the FDI attack, which leads to the power flow on each branch being redistributed.…”
Section: Casementioning
confidence: 99%
See 2 more Smart Citations
“…These components are independent, as one failing does not cause the other to fail, but both need to be functional for the system to function: D = { c 1 S , c 2 S }.This system also has two states: the initial state 11 and the failed superstate 01 10 . 4 Once the system has failed, we are no longer interested in its behavior; thus, for this system, we consider 00 unreachable.…”
Section: (Monotonicity)mentioning
confidence: 99%