2019
DOI: 10.1109/tsg.2018.2865316
|View full text |Cite
|
Sign up to set email alerts
|

Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

Abstract: Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into physical and cyber attacks, can be avoided by using the latest and advanced detection mechanisms. However, a new threat called cyber-physical attacks which jointly target both the physical and cyber layers of the system to interfere the operations of the power grid is more malicious as compared with the traditional attacks. In this paper, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
37
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 81 publications
(37 citation statements)
references
References 34 publications
(52 reference statements)
0
37
0
Order By: Relevance
“…With further research, attack strategies have been improved, for example, optimal FDI attack actions are studied to mask the exceptional frequency leading to the largest disruption of generators in the work by the authors of [16]. In the work by the authors of [17], FDI attacks with limited knowledge are described to mask the line outages. In the work by the authors of [18], time synchronization attack was introduced.…”
Section: Fdi Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…With further research, attack strategies have been improved, for example, optimal FDI attack actions are studied to mask the exceptional frequency leading to the largest disruption of generators in the work by the authors of [16]. In the work by the authors of [17], FDI attacks with limited knowledge are described to mask the line outages. In the work by the authors of [18], time synchronization attack was introduced.…”
Section: Fdi Attackmentioning
confidence: 99%
“…False command injection caused the system failure and FDI could delay the time of attack detection and develop impact of attacks. Based on the above discussion, the characters of FDI attacks [13][14][15][16][17][18][19] are summarized in Table 4. We can clearly see that the FDI attack becomes more complex, hides the traces of attacks better, and causes greater disruption.…”
Section: Fdi Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…In CPPS, that abnormal monitoring and control functions in the cyber network expand the scale of the large-scale blackout in [7][8]. Malicious information attacks on cyber networks aggravate the failures of coupled networks in [9][10]. Through the coupled effect inside the grid, generates interactive propagation cascading failure in the network through the coupling between systems, the failures of a single network evolve into cascading failures interactively propagating between cyber networks and power systems, and then enlarge the scale of the blackout.…”
Section: Introductionmentioning
confidence: 99%
“…Ref. [24]- [26] analyzed the impacts of cyber-attacks on power grids vulnerability to cascading outages, and Ref. [27], [28] studied mitigation and recovery approaches from cascading failures.…”
Section: Introductionmentioning
confidence: 99%