2020
DOI: 10.1049/iet-cps.2019.0043
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating zero dynamic attack in communication link‐enabled droop‐controlled hybrid AC/DC microgrids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 35 publications
(66 reference statements)
0
4
0
Order By: Relevance
“…The parity-space-based technique is well applied for FD purposes in the induction motor drive system (Dybkowski & Klimkowski, 2017), electromechanical brake systems (Hwang & Huh, 2015), vehicles (Wang et al, 2019), and power systems (Rasoolzadeh & Salmasi, 2020).…”
Section: Parity-space-based Residual Generationmentioning
confidence: 99%
“…The parity-space-based technique is well applied for FD purposes in the induction motor drive system (Dybkowski & Klimkowski, 2017), electromechanical brake systems (Hwang & Huh, 2015), vehicles (Wang et al, 2019), and power systems (Rasoolzadeh & Salmasi, 2020).…”
Section: Parity-space-based Residual Generationmentioning
confidence: 99%
“…Many studies attempted to identify and mitigate cyberattacks through various methods, including employing additional data ( [1,3,11,12,[21][22][23]), observers in specific circumstances ( [14,15]), and the attack's effects on the system ( [13,[16][17][18][19][20]), and removed the attacked links from the consensus algorithm to perform mitigation. However, only Ref.…”
Section: Introductionmentioning
confidence: 99%
“…The parity method, as a kind of model‐based fault detection approach, is applied to detect the attacks in Ref. [15], followed by the mitigation of the attacked link by removing the secondary controller. A confidence parameter was introduced in Ref.…”
Section: Introductionmentioning
confidence: 99%
“…In some cases, the attackers may know part or all of the system configuration information and can thus carry out their attacks more effectively and avoid detection [56,57]. For example, a zerodynamic attack or a covert attack is an attack that can significantly change the state variables of a system without changing the systems outputs, when the attackers have a thorough understanding of the system parameters and configurations [58][59][60][61].…”
Section: Effects Of Malicious Attacks On Microgridsmentioning
confidence: 99%