2015
DOI: 10.5120/20172-2355
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Threats in Synchrophasor System in Wams

Abstract: The article that you are looking for is unavailable to public domain. The article is subjected to compliance with 2014-2015 IJCA scientific data guidelines. You might want to navigate the journal via the menu options provided in the left side of the screen. However, feel free to contact us anytime regarding any article which you are unable to find.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…The difference is more apparent in the 118-bus network than in the 14-bus network, so we report the computation times for the former. 3 Specifically, for simultaneous attack on two PMUs in the 118-bus system, Algorithm 2 takes 2 hours and 10 minutes. On the other hand, Algorithm 1 required more than 48 hours to solve the total of ( 118 2 ) nonconvex problems, and the execution was terminated at 48 hours.…”
Section: A Vulnerable Pmu Locationmentioning
confidence: 99%
See 1 more Smart Citation
“…The difference is more apparent in the 118-bus network than in the 14-bus network, so we report the computation times for the former. 3 Specifically, for simultaneous attack on two PMUs in the 118-bus system, Algorithm 2 takes 2 hours and 10 minutes. On the other hand, Algorithm 1 required more than 48 hours to solve the total of ( 118 2 ) nonconvex problems, and the execution was terminated at 48 hours.…”
Section: A Vulnerable Pmu Locationmentioning
confidence: 99%
“…In an FDI attack, the attacker tries to inject false data that are not detectable by bad data detection algorithms into the network; see e.g., the recent works [1], [2]. GPS spoofing is caused by transmitters mimicking the GPS signal with the intention of altering the GPS time estimated by the PMU's GPS receiver [3], [4]. These attacks maliciously introduce erroneous time stamps, thereby inducing a wrong phase angle in the PMU measurements [5], and are also called time synchronization attacks (TSAs).…”
mentioning
confidence: 99%
“…Many authentication and authorization algorithms are proposed to secure synchrophasor data over communication channels [57]. These methods range from conventional encryption methods to cyber trust.…”
Section: Cybersecurity Challengesmentioning
confidence: 99%
“…Moreover, being a typical cyberphysical system, the cyber-layer defence technologies could also be critical to secure microgrid secondary control systems. When wireless communication links are used for signal communication between the MGCC and DGs, wireless spoofing attacks could be one of the primary cyber threats [23]. Therefore, wireless spoofing and data encryption are mainly considered as the attack and defence actions in this work.…”
Section: Introductionmentioning
confidence: 99%