2018
DOI: 10.1177/0142331217740622
|View full text |Cite
|
Sign up to set email alerts
|

Malicious data deception attacks against power systems: A new case and its detection method

Abstract: Power systems usually employ bad data detection (BDD) to avoid faulty measurements caused by their anomalies, and hence can ensure the security of the state estimation of power systems. However, recently BDD has been found vulnerable to malicious data deception attacks submerged in big data. Such attacks can purposely craft sparse measurement values (i.e. attack vectors) to mislead power estimates, while not posing any anomalies to the BDD. Some related work has been proposed to emphasize this attack. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

5
5

Authors

Journals

citations
Cited by 33 publications
(22 citation statements)
references
References 36 publications
0
22
0
Order By: Relevance
“…Communication: As shown in the left-hand side of Fig. 1, when information are transmitted through the network, network-induced delay occurs in the transmission over the network due to limited communication bandwidth and unbalanced network load [42]- [44]. We denote network-induced delay from the visual sensor to the controller and the networkinduced delay from the controller to the actuator by τ sc k and τ ca k , respectively.…”
Section: Problem Formulation a The Framework Of The Nipvssmentioning
confidence: 99%
“…Communication: As shown in the left-hand side of Fig. 1, when information are transmitted through the network, network-induced delay occurs in the transmission over the network due to limited communication bandwidth and unbalanced network load [42]- [44]. We denote network-induced delay from the visual sensor to the controller and the networkinduced delay from the controller to the actuator by τ sc k and τ ca k , respectively.…”
Section: Problem Formulation a The Framework Of The Nipvssmentioning
confidence: 99%
“…The error check field allows the master to confirm that the message contents are valid. 9 The client can connect to the Modbus gateway device and request any query from RTUs over the Modbus protocol. The system uses a thread mechanism to accept the request and to add it to the queue and to respond to these queries efficiently.…”
Section: The Modbus Tcp Packet Is Converted To a Modbusmentioning
confidence: 99%
“…The injection data is sent by an attacker, the purpose of which © 2019 Informa UK Limited, trading as Taylor & Francis Group is to destroy the normal operation of the control system and achieve an illegal purpose (Zhonghua, Fangyuan, Yuguo, & Dehui, 2015). Because the data injection actions are deliberately produced by illegal attackers, the injection data does not present a certain statistical pattern (Chen, Li, Zhong, & Fei, 2018;Du et al, 2018). We can not consider these data as noise information either.…”
Section: Introductionmentioning
confidence: 99%