2016
DOI: 10.1109/tifs.2016.2576898
|View full text |Cite
|
Sign up to set email alerts
|

DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System

Abstract: In the hierarchical control paradigm of a smart grid cyber-physical system, decentralized local agents (LAs) can potentially be compromised by opportunistic attackers to manipulate electricity prices for illicit financial gains. In this paper, to address such opportunistic attacks, we propose a Dirichlet-based detection scheme (DDOA), where a Dirichletbased probabilistic model is built to assess the reputation levels of LAs. Initial reputation levels of the LAs are first trained using the proposed model, based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
39
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 78 publications
(39 citation statements)
references
References 30 publications
0
39
0
Order By: Relevance
“…In a SSDF attack, some malicious users attempt to send false data to the fusion center with the intention of influencing the fusion center to arrive at a wrong decision. Such an attack is similar to the false data injection attacks in smart grid cyber‐physical system . A number of mitigation strategies have been proposed, such as those reported in other works …”
Section: Introductionmentioning
confidence: 85%
See 1 more Smart Citation
“…In a SSDF attack, some malicious users attempt to send false data to the fusion center with the intention of influencing the fusion center to arrive at a wrong decision. Such an attack is similar to the false data injection attacks in smart grid cyber‐physical system . A number of mitigation strategies have been proposed, such as those reported in other works …”
Section: Introductionmentioning
confidence: 85%
“…Such an attack is similar to the false data injection attacks in smart grid cyber-physical system. 22,23 A number of mitigation strategies have been proposed, such as those reported in other works. [24][25][26] In a PUE attack, an attacker transmits a signal with the same characteristic as the primary user signal, attempting to deceive secondary users and preventing them from accessing the available frequency spectrum.…”
mentioning
confidence: 99%
“…The detection of DoS attacks has been investigated thoroughly during the recent years, and several approaches have been suggested, see e.g. [19,20,21,22,18,23,24,25]. On the other hand, works about detection of deception attacks are more scarce in the literature since, as discussed by [26], they are subtler than DoS attacks, hence harder to detect.…”
Section: Introductionmentioning
confidence: 99%
“…Considering the importance of line state and the possibility of data modification, many mechanisms have been proposed to detect line outages and identify FDI attacks [5][6][7][8][9][10][11][12]. For example, in [10], the method based on social users information was described, but, further development was required.…”
Section: Introductionmentioning
confidence: 99%