2020
DOI: 10.3390/s20030679
|View full text |Cite
|
Sign up to set email alerts
|

FDIPP: False Data Injection Prevention Protocol for Smart Grid Distribution Systems

Abstract: In this paper, a false data injection prevention protocol (FDIPP) for smart grid distribution systems is proposed. The protocol is designed to work over a novel hierarchical communication network architecture that matches the distribution system hierarchy and its vast number of entities. The proposed protocol guarantees both system and data integrity via preventing packet injection, duplication, alteration, and rogue node access. Therefore, it prevents service disruption or damaging power network assets due to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 44 publications
(68 reference statements)
0
9
0
Order By: Relevance
“…Neighborhood Area Networks (NAN) [22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37] Software Defined Networks (SDN) [20,[38][39][40][41][42][43] Interdependent networks (IN) [44][45][46][47][48][50][51][52][53] Field Area Networks (FAN) [21,49,[54][55][56][57][58][59][60][61][62][63]69] Wireless Sensor Networks (WSN) [64][65][66][67][68][69]...…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Neighborhood Area Networks (NAN) [22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37] Software Defined Networks (SDN) [20,[38][39][40][41][42][43] Interdependent networks (IN) [44][45][46][47][48][50][51][52][53] Field Area Networks (FAN) [21,49,[54][55][56][57][58][59][60][61][62][63]69] Wireless Sensor Networks (WSN) [64][65][66][67][68][69]...…”
Section: Discussionmentioning
confidence: 99%
“…Note that 17% can find both in NANs and WSNs, respectively, pointing out a great opportunity to develop smart grids with softwaredefined topologies. Internet of Things [19,23,24,27,28,30,31,36,37,58,64,66,73,74,79,105,107] Machine learning [20,29,32,51,55,56,60,62,69,78,80,81,85,98,102,106] Data mining [47,107] Machine learning and neural training [21,54,69,81,96] Short term memory network [41,61] Power Line Communication Technology [53,63,90] Power electronics [35,50,99,101,<...>…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…If an attacker can only gain control over a small subset of field devices, he can still indirectly influence the power grid, e.g., by sending forged or manipulated sensor readings to the control room [ 25 , 79 , 80 ]. The operators in the control room may act on the wrong data and take steps to correct a non-existent problem [ 81 , 82 ], which may lead to disruption in the power grid, e.g., unintentionally overloading a power line because sensor readings show a normal load.…”
Section: Attack Vectors and Scenariosmentioning
confidence: 99%