2020
DOI: 10.1109/jiot.2020.2966221
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Isolation of False Data Injection Attacks in Smart Grid via Unknown Input Interval Observer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(15 citation statements)
references
References 44 publications
0
15
0
Order By: Relevance
“…H∞ filtering and LMI Fading measurements [11,23] Quantization effects [74] Stochastic additive faults [15,28] Medium access constraints [14] Unknown transition probability [75] Comprehensive incomplete measurements [12,13,25,26] EM algorithm under the Bayesian framework Asynchronous measurements in distributed systems [54] Residual generating based on fault diagnosis filters and observers Additive faults & incomplete measurements [7,8,17,24,27,31,32,46,47] Attacks on sensors [73] Soft faults & packet dropouts [48] Actuator faults [42,45] Faulty periodic communication [30] Cyber attacks [39,76] Sliding mode observer Attacks on sensors [72] Unknown input observer False data injection attacks [35] Minimum-variance filtering and Kalman filtering Cyber attacks [20,37,64,70] Additive faults [49] Homomorphic encryption [77] Particle filtering Cyber attacks [41,69] Strong tracking filtering Packet dropouts [78] Distributed resilient filtering Sensor degradation [79] Self-learning approaches Additive sensor fault [71,75,…”
Section: Methodologies Major Problems Addressed Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…H∞ filtering and LMI Fading measurements [11,23] Quantization effects [74] Stochastic additive faults [15,28] Medium access constraints [14] Unknown transition probability [75] Comprehensive incomplete measurements [12,13,25,26] EM algorithm under the Bayesian framework Asynchronous measurements in distributed systems [54] Residual generating based on fault diagnosis filters and observers Additive faults & incomplete measurements [7,8,17,24,27,31,32,46,47] Attacks on sensors [73] Soft faults & packet dropouts [48] Actuator faults [42,45] Faulty periodic communication [30] Cyber attacks [39,76] Sliding mode observer Attacks on sensors [72] Unknown input observer False data injection attacks [35] Minimum-variance filtering and Kalman filtering Cyber attacks [20,37,64,70] Additive faults [49] Homomorphic encryption [77] Particle filtering Cyber attacks [41,69] Strong tracking filtering Packet dropouts [78] Distributed resilient filtering Sensor degradation [79] Self-learning approaches Additive sensor fault [71,75,…”
Section: Methodologies Major Problems Addressed Literaturementioning
confidence: 99%
“…Commonly applied approaches mainly focus on detecting attacks and improving system robustness against attacks. Structural vulnerability was modeled as an unknown input signal into the system [35]. System state was estimated via observers, and a residual-based criterion was then designed to detect and isolate potential false data injections.…”
Section: Considering the Problems Brought By Data Transmissionmentioning
confidence: 99%
“…In this case, the transformation equation ( 60) is not convenient because the rank condition equation (4) (or equation (29)) does not hold. To be able to use the LMI design method presented for descriptor systems, we need to find a convenient transformation of the system equation ( 27) into the form equation (1) for which the rank condition equation ( 4) is fulfilled.…”
Section: Second Case: C M =mentioning
confidence: 99%
“…Indeed, unknown input observers are highly used in fault diagnosis, [21][22][23][24][25][26] and more recently in cyberattacks detection. [27][28][29][30] Several unknown input observers based methods have been recently exploited in secure and resilient estimation of cyber-physical systems. [31][32][33][34] More importantly, unknown input observers will play an important role in learning-based estimation methods due to the presence of a set of unknown parameters to be estimated.…”
Section: Introductionmentioning
confidence: 99%
“…While papers such as [12] offer a partial blind model that builds branch information. Other works in this field include [13], where a method of FDI detection using unknown input internal observer is proposed. While in [14], event-based triggers are used to enhance phasor measurement unit (PMU) based detection.…”
Section: Background a Fdi Attacksmentioning
confidence: 99%