2020
DOI: 10.1109/tie.2019.2938497
|View full text |Cite
|
Sign up to set email alerts
|

On Detection of False Data in Cooperative DC Microgrids—A Discordant Element Approach

Abstract: Though recent advancements in DC microgrids are largely based on distributed control strategies to enhance reliability and scalability, the absence of a centralized controller to check the global information makes these schemes highly susceptible to cyber attacks. Since false data injection attacks (FDIAs) are considered as a prominent attack methodology in DC microgrids, prior emphasis is usually laid on compromised sensors and controllers only related to DC voltages. Hence, this paper firstly segregates the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
87
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 118 publications
(87 citation statements)
references
References 21 publications
0
87
0
Order By: Relevance
“…where v i (t) = V dci (t) + j Mi u V i (t) with V dci denoting the measured output voltage of i th agent. [14] of unit I and III at t = 1 sec and, current sensor and outgoing communication link [15] of unit II at t = 1 sec with attack II around t = 5 sec -Conventional event-triggered philosophy [22] can not discriminate between a load change and stealth attack since the objectives in ( 5) are met satisfactorily. [14] AND [15] Affected Counterparts Modeling…”
Section: A Preliminaries Of Conventional Cooperative Control In DC Microgridsmentioning
confidence: 99%
See 4 more Smart Citations
“…where v i (t) = V dci (t) + j Mi u V i (t) with V dci denoting the measured output voltage of i th agent. [14] of unit I and III at t = 1 sec and, current sensor and outgoing communication link [15] of unit II at t = 1 sec with attack II around t = 5 sec -Conventional event-triggered philosophy [22] can not discriminate between a load change and stealth attack since the objectives in ( 5) are met satisfactorily. [14] AND [15] Affected Counterparts Modeling…”
Section: A Preliminaries Of Conventional Cooperative Control In DC Microgridsmentioning
confidence: 99%
“…The detection strategies for both the stealth attacks in Table I, have been provided in Table II. More details on its formulation can be referred from [14] and [15]. Upon detection of attack elements, it is vital to remove these attacks as such unbounded signals in the control system may quickly trigger (8)-( 9), ultimately leading to system shutdown.…”
Section: A Detectionmentioning
confidence: 99%
See 3 more Smart Citations