2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2018
DOI: 10.1109/globalsip.2018.8646454
|View full text |Cite
|
Sign up to set email alerts
|

Detection of False Data Injection Attacks in Power Systems with Graph Fourier Transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(23 citation statements)
references
References 27 publications
0
23
0
Order By: Relevance
“…The proposed approach for FDI attack detection can be applied to the DC model. The details and a full algorithm for the DC model case can be found in our preliminary work [46].…”
Section: Fdi Attack Detection For the DC Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed approach for FDI attack detection can be applied to the DC model. The details and a full algorithm for the DC model case can be found in our preliminary work [46].…”
Section: Fdi Attack Detection For the DC Modelmentioning
confidence: 99%
“…Finally, we conduct numerical simulations on the IEEE 14-bus test case that demonstrate that the proposed method is able to detect previously undetectable attacks. A preliminary version of this approach, which is limited to the DC model and to the detection of voltage angles and without the derivations of the cutoff frequency of the filter and the detection threshold has been published in [46].…”
mentioning
confidence: 99%
“…False data injection is a major threat for smart grids; simplistic false data injection attacks can be detected by examining whether the reported data comply with the laws of physics, collating the data sourced from the smart grid's data channel with the measurements sourced from the smart grid's energy channel [13]. [43] proposes a model taking into account more features of the power channel and exhibiting increased potential to detect false data injection attacks, even when realistic data are injected.…”
Section: Detecting and Mitigating Attacks On Integritymentioning
confidence: 99%
“…We construct classifiers based on the graph-spectral information generated by the sGFT and the conventional GFT along with the aforementioned GSO-construction methods. The approach for constructing the anomaly detector is similar to those in [35], [50], [51]. In particular, [35] and [50] compute the respective high-frequency components from the adjacency matrix and the graph Laplacian.…”
Section: A Anomaly Detection Taskmentioning
confidence: 99%
“…The approach for constructing the anomaly detector is similar to those in [35], [50], [51]. In particular, [35] and [50] compute the respective high-frequency components from the adjacency matrix and the graph Laplacian. On the other hand, in [51], the Laplacian eigenvectors are obtained from a constrained optimization problem that enforces properties not considered here, such as sparsity.…”
Section: A Anomaly Detection Taskmentioning
confidence: 99%