2022
DOI: 10.1016/j.apenergy.2021.118425
|View full text |Cite
|
Sign up to set email alerts
|

False Data Injection Cyber-Attacks Detection for Multiple DC Microgrid Clusters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…MGs heavily depend on telecommunication infrastructure, which brings challenges like connectivity interruptions, leading to potential catastrophic events such as blackouts and partial power outages. To address this, new administrative frameworks have been developed to ensure proper control requirements are met even in cases of connectivity breakdowns [17,18]. Some recent studies [19][20][21] propose innovative auxiliary control mechanisms that reinstate load profiles and frequency stabilization, as well as precise energy allocation based on event-triggered conditions.…”
Section: Introductionmentioning
confidence: 99%
“…MGs heavily depend on telecommunication infrastructure, which brings challenges like connectivity interruptions, leading to potential catastrophic events such as blackouts and partial power outages. To address this, new administrative frameworks have been developed to ensure proper control requirements are met even in cases of connectivity breakdowns [17,18]. Some recent studies [19][20][21] propose innovative auxiliary control mechanisms that reinstate load profiles and frequency stabilization, as well as precise energy allocation based on event-triggered conditions.…”
Section: Introductionmentioning
confidence: 99%
“…15,16 Although the data-driven methods are useful in attack detection (especially, these methods do not require accurate models 17,18 ), they may introduce unbearable computational burden, and the requirement of a large amount of training data may not always be satisfied. 9 The knowledge-based detection schemes are alternative methods. A representative strategy is to generate a residual based on state estimation, and by comparing the obtained residual with a properly designed threshold, one can detect whether there happens cyber-attack or not.…”
Section: Introductionmentioning
confidence: 99%
“…The attack detection problem has been considered for various cyber‐attacks on CPSs as in References 8‐11, in which the false data injection attacks (FDIAs) have received increasing attention due to their widely varied types and catastrophic impact 12,13 . As pointed out in Reference 14, existing attack detection methods for revealing FDIAs on CPSs can be roughly classified into data‐driven and knowledge‐based schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The distributed control systems' reliance on a global communication network makes the entire system vulnerable to cyber-attacks. This has led to a greater interest in developing and implementing attack detection strategies for DCMGs using distributed control systems; however, significant technical gaps remain [17][18][19].…”
Section: Introductionmentioning
confidence: 99%