2021
DOI: 10.1109/jiot.2020.3021429
|View full text |Cite
|
Sign up to set email alerts
|

False Data Injection Attack and Defense Method on Load Frequency Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(7 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…Modelling of FDI attacks and the protection schemes were presented in [6–13, 15, 48–50] to analyse the vulnerabilities of the system and defend against cyberattacks. For instance, Kim and Tong [6] developed an undetectable attack model followed by a PMU‐placement‐based defence strategy using a graph‐theoretic condition to defend against FDI attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Modelling of FDI attacks and the protection schemes were presented in [6–13, 15, 48–50] to analyse the vulnerabilities of the system and defend against cyberattacks. For instance, Kim and Tong [6] developed an undetectable attack model followed by a PMU‐placement‐based defence strategy using a graph‐theoretic condition to defend against FDI attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The research of data‐driven algorithms allows this limitation to be overcome. Li et al 33 proposed the false data injection attack detection and defense mechanism based on the GAN network. Chen et al 34 presented a data‐driven resilient automatic generation control scheme for physical power systems under a false data injection attack.…”
Section: Introductionmentioning
confidence: 99%
“…The two sides of attack and defense are modeled as game models, and the optimal attack and defense strategies are obtained with the help of the min–max Q learning method under the optimization framework 9 . Different from the above results, some secure control schemes are proposed based on the attack detection mechanism 10,11 . The problem of attack detection and recovery of FDI attacks in the network control system is studied 12 .…”
Section: Introductionmentioning
confidence: 99%
“…9 Different from the above results, some secure control schemes are proposed based on the attack detection mechanism. 10,11 The problem of attack detection and recovery of FDI attacks in the network control system is studied. 12 Multiple sensors measure the same physical quantity, and residual redundancy is constructed through different measurement values to increase the resilience of the system to attacks and faults.…”
mentioning
confidence: 99%