2017 American Control Conference (ACC) 2017
DOI: 10.23919/acc.2017.7963811
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-attack on a power plant using bias injected measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 15 publications
0
6
0
1
Order By: Relevance
“…This is a state-space representation equivalent (no loss of information) with the original full-state representation, also complying with the formulation (15), which moreover is controllable and can be used for aggressive controller design as done in [7][8][9][10][11].…”
Section: A Fully Interconnected Two Area Examplementioning
confidence: 98%
See 1 more Smart Citation
“…This is a state-space representation equivalent (no loss of information) with the original full-state representation, also complying with the formulation (15), which moreover is controllable and can be used for aggressive controller design as done in [7][8][9][10][11].…”
Section: A Fully Interconnected Two Area Examplementioning
confidence: 98%
“…This symmetry comes without any loss of generality and makes the interpretation of the responses easily understandable. Table I provides the parameter values used for simulations [1,[6][7][8] The "optimal" choice for the coefficients β i has been shown to be [1,3,8]) while for completeness, we also provide the formulas associated with the area gains K pi and time constants T pi as…”
Section: A Fully Interconnected Two Area Examplementioning
confidence: 99%
“…According to [15,16], the input hard constraints do not allow the controllers to perform unsaturated for all states x net 2 X net . To solve this problem, we can define the set A net ¼ X net \ U net and then try to determine the maximal subset of A net that is robust positively invariant with respect to the network dynamics in (11).…”
Section: Attack Detector Designmentioning
confidence: 99%
“…The authors in [15,16] studied bias injection cyberattacks on the frequency sensor measurements, when the attack signal a i was set to a constant value and affected the system indefinitely. It was shown that in the case of a single-area power plant the structural properties of the integral controllers force the frequency deviation to regulate wherever the attack signal dictates.…”
Section: Switching Signal Designmentioning
confidence: 99%
See 1 more Smart Citation