2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) 2020
DOI: 10.1109/smartgridcomm47815.2020.9303022
|View full text |Cite
|
Sign up to set email alerts
|

Model-Agnostic Algorithm for Real-Time Attack Identification in Power Grid using Koopman Modes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 25 publications
0
15
0
Order By: Relevance
“…Nandanoori et al in [13] proposed a Koopman mode decomposition (KMD) based algorithm to detect and identify false data attacks in realtime. The Koopman modes (KMs) are capable of capturing the nonlinear modes of oscillation in the transient dynamics of the power networks and reveal the spatial embedding of both natural and anomalous modes of oscillations in the sensor measurements.…”
Section: Related Workmentioning
confidence: 99%
“…Nandanoori et al in [13] proposed a Koopman mode decomposition (KMD) based algorithm to detect and identify false data attacks in realtime. The Koopman modes (KMs) are capable of capturing the nonlinear modes of oscillation in the transient dynamics of the power networks and reveal the spatial embedding of both natural and anomalous modes of oscillations in the sensor measurements.…”
Section: Related Workmentioning
confidence: 99%
“…For the prediction step of KF, rather than using a physical model, we utilize Koopman Mode Analysis (KMA) [14] for fitting the model for prediction of behaviour of the system with a data-driven approach. A lot of application for KMA in power system has been developed including but not limited to power system stability and dynamic analysis [15], control and estimation [16], and fault line isolation [17] and attack detection [18]. There has been other studies of voltage stability-based analysis incorporating HVDC lines, including cyber and physical co-simulation in [19] which are also of high potential fits for KMA applications.…”
Section: B Related Workmentioning
confidence: 99%
“…Adversarial attacks on power grids comprise of false-data injection, jamming, DoS and packet-dropping attacks [9,10,15]. While researchers have proposed a multitude of defense mechanisms [27], including Moving Target Defense (MTDs) [7,20], they do not consider the problem of sensor placement to monitor HVTs.…”
Section: Related Workmentioning
confidence: 99%
“…identify the source of the anomaly by utilizing the sensor readings generated by PMUs. With the continuous discovery of real-world attacks such as Stuxnet [13], Dragonfly [28] and a wide range of cyberattacks-jamming, Denial of Service, packet dropping, false-data injection and compromise of data integrity [15,16]-robustness of existing sensor placement mechanisms becomes critical. Thus, in this work, we leverage the ideas of Moving Target Defense (MTD) in cybersecurity [12,25] and the Minimum Discriminating Code Set (MDCS) based PMU placement [3,4] to build a defense-in-depth solution.…”
Section: Introductionmentioning
confidence: 99%