2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT) 2013
DOI: 10.1109/isgt.2013.6497846
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-Service (dos) attacks on load frequency control in smart grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
81
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 150 publications
(81 citation statements)
references
References 12 publications
0
81
0
Order By: Relevance
“…This attack leads to causing communication link failure and excessive delays and consequently results in preventing the timely exchange of information between the sensors, actuators, and control systems [19]; • Switching attacks: an adversary causes physical disturbance in the power system by switching on and off one or more elements of the grid to cause instability within the power system. Effective switching attacks could be, for example, based on understanding the structure of the power system and accessing system state information [20]- [22].…”
Section: Control For Resilient Smart Gridsmentioning
confidence: 99%
See 3 more Smart Citations
“…This attack leads to causing communication link failure and excessive delays and consequently results in preventing the timely exchange of information between the sensors, actuators, and control systems [19]; • Switching attacks: an adversary causes physical disturbance in the power system by switching on and off one or more elements of the grid to cause instability within the power system. Effective switching attacks could be, for example, based on understanding the structure of the power system and accessing system state information [20]- [22].…”
Section: Control For Resilient Smart Gridsmentioning
confidence: 99%
“…As obvious from (19) the cyber-physical controller utilizes the centralized form for τ ≤ τ max . However, when the delay exceeds τ max , the controller switches to the decentralized mode.…”
Section: "Cyber-physical" Pfl Controlmentioning
confidence: 99%
See 2 more Smart Citations
“…Some literature focuses on outsider attacks, such as cyber-physical attacks [17], load altering attacks [18] and distribution attacks [19], cyber security of substations [20], data attacks [21], false data injection attacks [22], data integrity attacks [23], traffic analysis attacks [24], man-in-the-middle attacks [25], DoS attacks [26], and etc. However, insider attacks in the SG network, such as attacks by the customer, attacks by the operators/maintenance personnel, and etc., have not been well investigated.…”
Section: Related Workmentioning
confidence: 99%