2022
DOI: 10.1049/stg2.12066
|View full text |Cite
|
Sign up to set email alerts
|

Data‐driven detection and identification of IoT‐enabled load‐altering attacks in power grids

Abstract: Advances in edge computing are powering the development and deployment of Internet of Things (IoT) systems to provide advanced services and resource efficiency. However, large‐scale IoT‐based load‐altering attacks (LAAs) can seriously impact power grid operations, such as destabilising the grid's control loops. Timely detection and identification of any compromised nodes are essential to minimise the adverse effects of these attacks on power grid operations. In this work, two data‐driven algorithms are propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 37 publications
0
15
0
Order By: Relevance
“…In formula (12) as the number of clusters n of measurement data decreases monotonously, there is an infection point n 0 . In this way, when the number of measured samples m changes, the number of iterations of the algorithm will change, and the minimum value is taken near the infection point n 0 , namely,…”
Section: Application Of Improved Fcm Algorithm In Anomalymentioning
confidence: 99%
See 2 more Smart Citations
“…In formula (12) as the number of clusters n of measurement data decreases monotonously, there is an infection point n 0 . In this way, when the number of measured samples m changes, the number of iterations of the algorithm will change, and the minimum value is taken near the infection point n 0 , namely,…”
Section: Application Of Improved Fcm Algorithm In Anomalymentioning
confidence: 99%
“…Set formula (12) as the objective function, formula (13), formula (15), and formula (16) as the constraints, and when the error of the two previous and subsequent iterations of the objective function is less than a given positive number after a certain number of iterations, the clustering ends.…”
Section: Application Of Improved Fcm Algorithm In Anomalymentioning
confidence: 99%
See 1 more Smart Citation
“…Detection and localization: The focus of this work is on developing a fast and robust tool to detect and localize D-LAAs with high precision, which is an essential step toward limiting the damage due to D-LAAs. To this end, existing works have proposed utilizing the phase angle/frequency dynamics monitored by phasor measurement units (PMUs) [8]- [10]. Similar approaches using PMU measurement data are also adopted in the broader context of detecting cyberphysical attacks against wide-area monitoring systems [11], [12], localizing the source of faults/oscillations [13]- [15] and disturbance type classification [16].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, dynamic LAAs, in which the attacker injects a series of load perturbations over time, can also destabilize the power grid's frequency control loop [7]. Subsequent work has also focused on detecting LAAs using data-driven approaches based on the data gathered from phasor measurement units [9], [10].…”
Section: Introductionmentioning
confidence: 99%