2022
DOI: 10.1109/tii.2022.3144445
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Reduced-Order Observer-Based Detection of False Data Injection Attacks With Application to Smart Grid Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…The authors of [1] identified for the first time that stealthy FDI attack vectors, that can circumvent the conventional BDD algorithms, can be generated from the Jacobian matrix of the DC state estimation algorithms for power system. After that, numerous works have been proposed for the detection of FDI attacks using graph theoretic models [2], [3], sparse optimization [4], Kalman Filters [5]- [7] and a variety of different algorithms, each offering some unique advantages. Recently an internal observer based detection algorithm was proposed in [8] for FDIA attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of [1] identified for the first time that stealthy FDI attack vectors, that can circumvent the conventional BDD algorithms, can be generated from the Jacobian matrix of the DC state estimation algorithms for power system. After that, numerous works have been proposed for the detection of FDI attacks using graph theoretic models [2], [3], sparse optimization [4], Kalman Filters [5]- [7] and a variety of different algorithms, each offering some unique advantages. Recently an internal observer based detection algorithm was proposed in [8] for FDIA attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [6] further use Kalman Filters to estimate unknown time varying attack parameters and for the recovery of state estimates. In a different approach, authors in [3] develop a bank of dynamic reduced-order observers by leveraging graph theoretic properties of an interconnected smart grid for attack detection by generating residual signals. The power system is modelled as a discrete time linear dynamical system in [7].…”
Section: Introductionmentioning
confidence: 99%
“…The attack detection problem has been considered for various cyber‐attacks on CPSs as in References 8‐11, in which the false data injection attacks (FDIAs) have received increasing attention due to their widely varied types and catastrophic impact 12,13 . As pointed out in Reference 14, existing attack detection methods for revealing FDIAs on CPSs can be roughly classified into data‐driven and knowledge‐based schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Considering the complicated and large‐scale characteristics of power systems, the control design (e.g., load frequency control (LFC)), state estimation, and economic dispatching are expected to be achieved in a decentralized or distributed way. Based on this fact, decentralized and distributed detection schemes have been recently investigated as in References 10,26‐28. For instance, the authors in Reference 26 proposed a state and attack observer for LFC system to realize decentralized attack detection and mitigation, noting that the load variation was assumed to be known, which makes it less applicable.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation