2014
DOI: 10.1109/tsg.2013.2291661
|View full text |Cite
|
Sign up to set email alerts
|

Local Load Redistribution Attacks in Power Systems With Incomplete Network Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
103
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 236 publications
(104 citation statements)
references
References 10 publications
0
103
0
Order By: Relevance
“…Furthermore, these approaches only considered that the attacker has complete knowledge of power system. According to a recent research of Rahman et al [13] and Liu et al [14], the attacker's knowledge may be limited.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, these approaches only considered that the attacker has complete knowledge of power system. According to a recent research of Rahman et al [13] and Liu et al [14], the attacker's knowledge may be limited.…”
Section: Related Workmentioning
confidence: 99%
“…This is because in practice it is very difficult for an attacker with limited budget to have this information since: (1) most power grids have thousands of buses and lines; and (2) power grid data are strongly protected. Unfortunately, we have proven that an attacker is able to construct an undetectable attack vector z " H∆θ with incomplete network information [14]. This is done by ensuring that all boundary buses in the attacking region connected to the same non-attacking region have the same incremental phase angle.…”
Section: Review Of False Data Injection Attacksmentioning
confidence: 99%
“…The injected false data ∆D is summed to zero in Equation (7) and the attacking amount at a load bus ∆D d is limited by constraint Equation (8). Corresponding Lagrangian multipliers are assigned for power balance in Equation (10), line flow constraint Equation (11), and lower and upper bound constraints of generation in Equation (12), line flow in Equation (13), and load shedding in Equation (14). Figure 1 summarizes the bilevel model for assessing the risk of one transmission line.…”
Section: Mathematical Formulation Of the Bilevel Attack Modelmentioning
confidence: 99%
See 2 more Smart Citations