2018
DOI: 10.1109/tii.2017.2720726
|View full text |Cite
|
Sign up to set email alerts
|

Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid

Abstract: For reliable operation and control of smart grid, estimating the correct states is of utmost importance to the system operator. With recent incorporation of information technology and Advanced Metering Infrastructure (AMI), the futuristic grid is more prone to cyber-threats. The False Data Injection (FDI) attack is one of the most thoroughly researched cyberattacks. Intelligently crafted, it can cause false estimation of states, which further seriously affects the entire power system operation. In this paper, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
49
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 125 publications
(50 citation statements)
references
References 23 publications
(37 reference statements)
1
49
0
Order By: Relevance
“…From a complete (or even partial) familiarity with the power network topology, a smart attacker can add biased data to meter or sensor-collected measurements Z by forming an attack vector, a = [a 1 , a 2 , ..., a m ] T , to deceive the bad data detector [27]. Let Z a = Z + a be the measurements containing the attacked data.…”
Section: Covert Cyber Deception Attack: Basic Principlementioning
confidence: 99%
See 1 more Smart Citation
“…From a complete (or even partial) familiarity with the power network topology, a smart attacker can add biased data to meter or sensor-collected measurements Z by forming an attack vector, a = [a 1 , a 2 , ..., a m ] T , to deceive the bad data detector [27]. Let Z a = Z + a be the measurements containing the attacked data.…”
Section: Covert Cyber Deception Attack: Basic Principlementioning
confidence: 99%
“…To train the DAE model, commonly used choices for the addition of corruption are the zero-masking DAE (ZDAE) and the additive Gaussian DAE (GDAE) [27]. In addition to these schemes, we have introduced another corruption-addition scheme termed estimated DAE (EDAE).…”
mentioning
confidence: 99%
“…Therefore in the context of SG cyber-security and computational complexity, the selection of distinctive features becomes a promising strategy to detect the CCD assault in real time [5]. Sandeep et al [6] proposed a joint-transformation-based scheme to detect CCD assault. They utilized the Kullback-Leibler distance to find out the difference between probability distributions obtained from measurement variations.…”
Section: Related Workmentioning
confidence: 99%
“…In summary, existing works on CCD assault detection in SGs only have generally considered feature extraction or transformation [5][6][7] in the context of cybersecurity and the curse of dimensionality. To the best of our knowledge, the selection of distinguishing features from the SE-MF dataset in the context of SG security is still an open problem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation