2019
DOI: 10.1109/access.2018.2888582
|View full text |Cite
|
Sign up to set email alerts
|

False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid

Abstract: False data injection (FDI) attack causes a disadvantage to the safety of a power system. In the past, the adversary launching FDI attack mostly needed the complete network topology information of the power system and a large amount of measurements. However, the reality is that the adversary has limited resources and can hardly manipulate massive measurements without being detected. This paper proposes a new method to form attack vector in the condition of incomplete system information. The proposed method firs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 40 publications
0
13
0
Order By: Relevance
“…Several attempts have been performed in the literature to increase the cyber-security of the power grid against possible cyber attacks using steady-state analysis. In [6][7][8][9], authors showed that false data injection (FDI) attacks can mislead the state estimation process of the power grid using topology information of an attackfree system. A comprehensive review of FDI attacks and detection techniques on compromised system topology information can be found in [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…Several attempts have been performed in the literature to increase the cyber-security of the power grid against possible cyber attacks using steady-state analysis. In [6][7][8][9], authors showed that false data injection (FDI) attacks can mislead the state estimation process of the power grid using topology information of an attackfree system. A comprehensive review of FDI attacks and detection techniques on compromised system topology information can be found in [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…Successful implementation of FDIAs commonly requires full knowledge of the network topology. [139] proposed a form of an attack without having complete information of the network topology. This can be done by using the kernel-independent component analysis to map the restricted data into a new Jacobian matrix, through which the undetectable attack is modeled [139].…”
Section: A Fdia Detectionmentioning
confidence: 99%
“…[139] proposed a form of an attack without having complete information of the network topology. This can be done by using the kernel-independent component analysis to map the restricted data into a new Jacobian matrix, through which the undetectable attack is modeled [139]. [140] proposed an extreme learning machine (ELM) technique based on one-class-one-network (OCON) framework to detect any cyber threat on the AC state estimation.…”
Section: A Fdia Detectionmentioning
confidence: 99%
“…When the exposed region is determined, the attack strategy plays important role to achieve an optimal attack effect under the incomplete information. In the research field of network robustness, there are many attack strategies proposed, such as random attack, degree-based attack, centrality-based attack, and mixed attack [45][46][47][48][49]. Among the many attack strategies, we in this paper adopt the most widely-used "mixed attack strategy" to evaluate the vulnerability and robustness of the MPTCP communication system.…”
Section: B Attack Mode and Strategymentioning
confidence: 99%