2022
DOI: 10.1016/j.ijepes.2021.107345
|View full text |Cite
|
Sign up to set email alerts
|

Coordinated data falsification attack detection in the domain of distributed generation using deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 28 publications
0
10
0
Order By: Relevance
“…Among a variety of attacks that act similarly to data injection attack (FDI), we highlight camouflage, recommendation, and deduction, each one with its peculiarities 29 . For simplicity, we adopt FDI as the standard because it is more insistent against data‐oriented networks like IIoT.…”
Section: A System For Mitigating Fdi Attacks In Iiot Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…Among a variety of attacks that act similarly to data injection attack (FDI), we highlight camouflage, recommendation, and deduction, each one with its peculiarities 29 . For simplicity, we adopt FDI as the standard because it is more insistent against data‐oriented networks like IIoT.…”
Section: A System For Mitigating Fdi Attacks In Iiot Networkmentioning
confidence: 99%
“…Among a variety of attacks that act similarly to data injection attack (FDI), we highlight camouflage, recommendation, and deduction, each one with its peculiarities. 29 For simplicity, we adopt FDI as the standard because it is more insistent against data-oriented networks like IIoT. We apply a FDI attack model based on Deng et al 25 ; we adapt the way the attack acts on the data to change only one data at a time, instead of the data array as in the original.…”
Section: Fdi Attack Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Among a variety of attacks that act similarly to data injection attack (FDI), we highlight camouflage, recommendation, and deduction, each one with its peculiarities 29 . For simplicity, we adopting FDI as the standard because it is more insistent against data-oriented networks like IIoT.…”
Section: False Data Injection Attack Modelmentioning
confidence: 99%
“…Hence, those behaviors make the attack difficult to identify and increases network malfunction times. Besides, a variety of other attacks, like camouflage, recommendation, and deduction, act in a similar way to the FDI attack, each one of them with its peculiarities 29 . Therefore, the fast identification and isolation of malicious devices in IIoT reduce long periods of network malfunctions, that can affect the data dissemination service, by mitigating that those misbehaving devices generate inconsistent sensed data.…”
Section: Introductionmentioning
confidence: 99%