2017
DOI: 10.1016/j.ifacol.2017.08.2493
|View full text |Cite
|
Sign up to set email alerts
|

Impact Analysis of a Bias Injection Cyber-Attack on a Power Plant

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 14 publications
0
10
0
1
Order By: Relevance
“…The cyber-attack can also be avoided by maintaining the LFC operation in a safe domain by finding the appropriate state constraints and raising alarm if the state is out of this domain [53]. A set-theoretic approach for false data detection is employed to observe the adversary [54].…”
Section: False Data Injection Preventionmentioning
confidence: 99%
“…The cyber-attack can also be avoided by maintaining the LFC operation in a safe domain by finding the appropriate state constraints and raising alarm if the state is out of this domain [53]. A set-theoretic approach for false data detection is employed to observe the adversary [54].…”
Section: False Data Injection Preventionmentioning
confidence: 99%
“…According to [15,16], the input hard constraints do not allow the controllers to perform unsaturated for all states x net 2 X net . To solve this problem, we can define the set A net ¼ X net \ U net and then try to determine the maximal subset of A net that is robust positively invariant with respect to the network dynamics in (11).…”
Section: Attack Detector Designmentioning
confidence: 99%
“…The authors in [15,16] studied bias injection cyberattacks on the frequency sensor measurements, when the attack signal a i was set to a constant value and affected the system indefinitely. It was shown that in the case of a single-area power plant the structural properties of the integral controllers force the frequency deviation to regulate wherever the attack signal dictates.…”
Section: Switching Signal Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Namely, the aim of Wang and Lu [22] is to maximise the frequency deviations and minimise attack cost simultaneously by designing an optimal attack scheme on LFC problem. In [23], the vulnerability of the power system is exploited using robust invariance concepts. Attack detection from the estimated state variables of LFC is presented in [24].…”
Section: Introductionmentioning
confidence: 99%