2019
DOI: 10.1109/access.2019.2939055
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic State Estimation of Generators Under Cyber Attacks

Abstract: Accurate and reliable estimation of generator's dynamic state vectors in real time are critical to the monitoring and control of power systems. A robust Cubature Kalman Filter (RCKF) based approach is proposed for dynamic state estimation (DSE) of generators under cyber attacks in this paper. First, two types of cyber attacks, namely false data injection and denial of service attacks, are modelled and thereby introduced into DSE of a generator by mixing the attack vectors with the measurement data; Second, und… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(44 citation statements)
references
References 36 publications
0
42
0
Order By: Relevance
“…On the other hand, DoS attacks include measurement (packet) loss with two main types of modeling, including Bernoulli distribution [40] and Markov model [41]. The attacker usually initiates DoS attacks by manipulating sensor readings and jamming communication channels, thereby flooding packets in the network [42]. This is illustrated below: where µ k ∈ R is the measurement vector state matrix and µ k (i) denotes the element i in the state transmission matrix.…”
Section: B Adversary Modelmentioning
confidence: 99%
“…On the other hand, DoS attacks include measurement (packet) loss with two main types of modeling, including Bernoulli distribution [40] and Markov model [41]. The attacker usually initiates DoS attacks by manipulating sensor readings and jamming communication channels, thereby flooding packets in the network [42]. This is illustrated below: where µ k ∈ R is the measurement vector state matrix and µ k (i) denotes the element i in the state transmission matrix.…”
Section: B Adversary Modelmentioning
confidence: 99%
“…First, the channel noise of one terminal is analysed. The noise power model of the channel is shown in Formula (3).…”
Section: D2d Communication Channel Model Of Intelligent Terminalmentioning
confidence: 99%
“…However, the current optimisation of electric power communication networks mainly focuses on improving the reliability of cyber-physical systems or enhancing the quality of service (QoS) in networks. For example, Li et al [3] estimated the dynamic state of generators under cyberattacks, in which attacks mainly include false data injection and denial of service attacks in networks. Qu et al [4] proposed a novel method to improve the prediction of power cyber-physical systems risk, where the method of the dependent Markov chain theory was employed.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the power system is facing serious threats of network attacks continuously. Different from the network attacks in the Internet field, cyber-attacks against CPPS concentrate more on destroying the stability control of the cyber layer over the physical layer, even paralyze the operation of the power system [3]. The blackout in Ukraine is the most representative…”
Section: Introductionmentioning
confidence: 99%