2018
DOI: 10.1109/tste.2017.2782090
|View full text |Cite
|
Sign up to set email alerts
|

Identification of False Data Injection Attacks With Considering the Impact of Wind Generation and Topology Reconfigurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 53 publications
(41 citation statements)
references
References 28 publications
0
41
0
Order By: Relevance
“…Considering the discussions above, the proposed PTSP can be used for probabilistic TS assessment and CR to provide some information about probable topology changes and power system security constraints. It is also noteworthy that such information can be useful in other research fields such as cyber‐physical attack detection [51, 53] and TS‐constrained optimal power flow [54, 55] in power system with high‐penetration of renewable energy resources.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Considering the discussions above, the proposed PTSP can be used for probabilistic TS assessment and CR to provide some information about probable topology changes and power system security constraints. It is also noteworthy that such information can be useful in other research fields such as cyber‐physical attack detection [51, 53] and TS‐constrained optimal power flow [54, 55] in power system with high‐penetration of renewable energy resources.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…is an interim variable that shows the part of the fault current signal which ideally includes only fundamental and highorder integer harmonic components. As mentioned in [40][41][42][43], during the disturbance, the frequency of the power system may deviate from the nominal value f 0 . Also, it is mentioned that changing the power system frequency highly depends on system inertia and the frequency of the system changes slowly during the disturbance.…”
Section: Phasor Estimationmentioning
confidence: 99%
“…If the Inter-Control Center Communications Protocol (ICCP) server and SCADA server are compromised, the attacker could gain the privilege to obstruct the operation of wind farms. The attacker could change the output of the WT, inject false data [20], or instigate an emergency shutdown, which could be a hard stop that induces excessive wear and tear on critical mechanical components. In this paper, the occurrence of cyber-attacks was modeled as the competition result between compromising and fixing the cyber vulnerabilities.…”
Section: Wind Farm Cyber Architecture and Security Risksmentioning
confidence: 99%