2017
DOI: 10.1109/jproc.2017.2686394
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
77
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 218 publications
(90 citation statements)
references
References 45 publications
0
77
0
1
Order By: Relevance
“…With the development of technologies, the traditional power system is undergoing a comprehensive transformation to a smarter, computer-and communication-based grids. Cyber security issues are increasingly closely related to all aspects of the electric grids in generation, transmission, distribution and the end-users [23][24][25][26][27][28]. Many interesting issues have been addressed on the AC power system, but few studies have focused on the DC grids.…”
Section: Literature Surveymentioning
confidence: 99%
“…With the development of technologies, the traditional power system is undergoing a comprehensive transformation to a smarter, computer-and communication-based grids. Cyber security issues are increasingly closely related to all aspects of the electric grids in generation, transmission, distribution and the end-users [23][24][25][26][27][28]. Many interesting issues have been addressed on the AC power system, but few studies have focused on the DC grids.…”
Section: Literature Surveymentioning
confidence: 99%
“…Second, extensive information on the system model might be exposed to the adversary. There are two ways by which a malicious adversary can obtain information about the power system model: 1) The detailed physical model may be directly leaked to the attacker via disgruntled employees or malicious insiders [10]; 2) The statistical model of the power system can be learned using mathematical tools based on the leaked system operating data. The attackers in the former case can bypass the SE-based detection algorithm by conducting "unobservable attacks" described in [11] or by conducting the packet-reordering integrity attack reported in [12], whereas the adversaries in the latter case can tamper with the measurements without triggering the alarm defined in [9] by replacing the actual measurement sequence with a different sequence that still conforms to the learned statistical model [13].…”
Section: Introductionmentioning
confidence: 99%
“…II. RELATED WORK Vulnerability of power grids to failures and attacks has been widely studied [10], [11], [12], [13], [14], [15], [16], [17], [18], [19]. In particular false data injection attacks on power grids and anomaly detection have been studied using the DC power flows in [20], [21], [22], [23], [24], [25].…”
Section: Introductionmentioning
confidence: 99%