2019
DOI: 10.1109/tcst.2018.2805294 View full text |Buy / Rent full text
|
|

Abstract: In this paper we develop a set of algorithms that can detect the identities of malicious data-manipulators in distributed optimization loops for estimating oscillation modes in large power system models. The estimation is posed in terms of a consensus problem among multiple local estimators that jointly solve for the characteristic polynomial of the network model. If any of these local estimates are compromised by a malicious attacker, resulting in an incorrect value of the consensus variable, then the entire … Show more

Help me understand this report

Search citation statements

Order By: Relevance
Select...
2
1
1
1
0
10
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

0
10
0
Order By: Relevance
“…There are several works that discuss designing anomaly detectors through other tools. In this direction, [208] uses a Roun-Robin algorithm for localizing the deception attacks on power systems. Another localizing work in power systems is [209], where a graph-theoretic technique is used to lozalize where the effect of an attack exists in a wide-area control architecture.…”
Section: B Defense Mechanismsmentioning
Create an account to read the remaining citation statements from this report. You will also get access to:
  • Search over 1.2b+ citation statments to see what is being said about any topic in the research literature
  • Advanced Search to find publications that support or contrast your research
  • Citation reports and visualizations to easily see what publications are saying about each other
  • Browser extension to see Smart Citations wherever you read research
  • Dashboards to evaluate and keep track of groups of publications
  • Alerts to stay on top of citations as they happen
  • Automated reference checks to make sure you are citing reliable research in your manuscripts
  • 7 day free preview of our premium features.

Trusted by researchers and organizations around the world

Over 130,000 students researchers, and industry experts at use scite

See what students are saying

rupbmjkragerfmgwileyiopcupepmcmbcthiemesagefrontiersapsiucrarxivemeralduhksmucshluniversity-of-gavle
“…There are several works that discuss designing anomaly detectors through other tools. In this direction, [208] uses a Roun-Robin algorithm for localizing the deception attacks on power systems. Another localizing work in power systems is [209], where a graph-theoretic technique is used to lozalize where the effect of an attack exists in a wide-area control architecture.…”
Section: B Defense Mechanismsmentioning
“…• Filtering techniques (Liao & Chakrabortty, 2018): these techniques do not try to identify compromised nodes, but to employ robust statistics and outlier detection techniques in order to accurately compute the desired global quantities even in the presence of malignant data.…”
Section: Manipulation Of Admm Algorithmsmentioning
“…The RR-ADMM detection algorithm to discover the malicious DERs is adapted from [17]. The RR is an arrangement of selecting the DER in a fixed rational order, i.e., DER-1, DER-2, .…”
Section: Round-robin-based Admm Detection Algorithmmentioning
“…Our contribution is to develop a collaborative defense strategy against these attacks by leveraging the communication capabilities under the IEC 61850 standard [16]. To enhance the robustness to malicious control command attacks, we employ the Round-Robin (RR) technique at the central supervisor for generating the consensus variable based on the ADMM algorithm [17]. Interestingly, by tracking the evolution of this RR-based variable, we are able to effectively identify compromised DER controllers.…”
Section: Introductionmentioning