2017
DOI: 10.1049/iet-cps.2017.0033
|View full text |Cite
|
Sign up to set email alerts
|

GPS spoofing effect on phase angle monitoring and control in a real‐time digital simulator‐based hardware‐in‐the‐loop environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 57 publications
(31 citation statements)
references
References 13 publications
0
31
0
Order By: Relevance
“…Gupta et al [66] further detail the different aspects and background of the different cyberphysical security issues in the smart grid. Cyber-physical attacks vary in their type, form, and impact, such as 1) time synchronization attacks [67], 2) GPS spoofing attacks [68], and 3) Denial-of-Service (DOS) attacks [69]. A very important cyber-physical systems attack is the FDI attack where the attacker manipulates or injects false data either in the measurements or the control signals to alter the dynamics of the power grid [70].…”
Section: Blockchain Applications In Cyber-physical Securitymentioning
confidence: 99%
“…Gupta et al [66] further detail the different aspects and background of the different cyberphysical security issues in the smart grid. Cyber-physical attacks vary in their type, form, and impact, such as 1) time synchronization attacks [67], 2) GPS spoofing attacks [68], and 3) Denial-of-Service (DOS) attacks [69]. A very important cyber-physical systems attack is the FDI attack where the attacker manipulates or injects false data either in the measurements or the control signals to alter the dynamics of the power grid [70].…”
Section: Blockchain Applications In Cyber-physical Securitymentioning
confidence: 99%
“…To reduce the number of PMUs used in a system, Chen and Abur [81] developed a placement algorithm to find out locations for PMU installations. In addition to cost concerns, PMUs are vulnerable to GPS spoofing attacks, which could invalidate the PMU data time‐stamps (by faking the GPS signal) and compromise the reliability of all the synchrophasor data [93].…”
Section: Defences Against Fdiasmentioning
confidence: 99%
“…The information attacks vary in their type, form and impact, such as (1) GPS spoofing attacks [28], (2) time synchronization attacks [29], (3) Denial-of-Service (DOS) attacks [30] and False Data Injection (FDI) attacks [31]. The FDI attack is the more common information attack.…”
Section: Information Security Requirements Of the System Operation Layermentioning
confidence: 99%