2019
DOI: 10.1109/tnse.2018.2837894
|View full text |Cite
|
Sign up to set email alerts
|

REACT to Cyber Attacks on Power Grids

Abstract: Motivated by the recent cyber attack on the Ukrainian power grid, we study cyber attacks on power grids that affect both the physical infrastructure and the data at the control center. In particular, we assume that an adversary attacks an area by: (i) remotely disconnecting some lines within the attacked area, and (ii) modifying the information received from the attacked area to mask the line failures and hide the attacked area from the control center. For the latter, we consider two types of attacks: (i) data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 43 publications
(49 reference statements)
0
19
0
Order By: Relevance
“…The possibility of cyber-or cyberphysical attacks on power grids has yielded mathematical work designed to detect and reconstruct such attacks. See [1] [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19].…”
Section: A Prior Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The possibility of cyber-or cyberphysical attacks on power grids has yielded mathematical work designed to detect and reconstruct such attacks. See [1] [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19].…”
Section: A Prior Workmentioning
confidence: 99%
“…the result of the attack is that sensors stop reporting, sophisticated techniques may still be brought to bear in order to identify, for example, the topology modification. See [14]- [17]. Most of the above work relies on the DC arXiv:1807.06707v14 [math.OC] 16 Oct 2018 (linear) model of power flows; the model in [16] (as far as we can tell) was the first to use the nonlinear AC power flows model.…”
Section: A Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Diffusion Based on Obfuscated Coded Data; TNSE Oct.-Dec. 2019 968-982 Wang, J., see Wang, J., TNSE Oct.-Dec. 2019 968-982 Wang, L., and Cheng, S., Data-Driven Resource Management for Ultra-Dense Small Cells: An Affinity Propagation Clustering Approach; TNSE July-Sept. 2019 267-279 Wang, X., Duan, L., and Zhang, J., Mobile Social Services with Network Externality: From Separate Pricing to Bundled Pricing; TNSE July-Sept. 2019 379-390 Wang, X., He, J., Cheng, P., and Chen, J., Differentially Private Maximum Consensus: Design, Analysis and Impossibility Result; TNSE Oct.-Dec. 2019 928-939 Wang, X., see Wu, H., TNSE Oct.-Dec. 2019 646-656 Wang, X., see Zhang, J., TNSE Oct.-Dec. 2019 952-967 Wu, B., Shen, H., andChen, K., SPread: Exploiting Fractal Wu, T., Chang, C., and Liao, W., Tracking Network Evolution and Their Appli-cations in Structural Network Analysis; TNSE July-Sept. 2019 562-575 Wu, W., see Zhu, J., TNSE Oct.-Dec. 2019 801-811 X Xiao, Y., Dorfler, F., Schaar, M.v.d., Incentive Design in Peer Review: Rating and Repeated Endogenous Matching;898-908 Xu, M., see Wang, J., TNSE Jan.-March 2019 Y Yannakakis, M., see Soltan, S., TNSE July-Sept. 2019459-473 Yao, Y., see Zhang, J., TNSE Oct.-Dec. 2019 Yatauro, M., The Edge Cover Probability Polynomial of a Graph and Optimal Network Construction; TNSE July-Sept. 2019 538-547 Yeh, E., see Zhang, J., TNSE July-Sept. 2019474-487 Ying, L., see Liu, X., TNSE Oct.-Dec. 2019909-916 Yousefizadeh, H., see Gharib, M., TNSE July-Sept. 2019501-511 Yu, L., see Qiu, C., TNSE July-Sept. 2019 Yu, W., see Hong, H., TNSE Oct.-Dec. 2019760-772 Yu, X., see Hamedmoghadam, H., TNSE July-Sept. 2019 Yu, X., see Hong, H., TNSE Oct.-Dec. 2019 760-772 Yuan, J., see Zhu, J., TNSE Oct.-Dec. 2019801-811 Z Zelazo, D., see Mukherjee, D., TNSE Oct.-Dec. 2019 Zhan, C., and Tse, C.K., A Model for Growth of Markets of Products or Services Having Hierarchical Dependence; TNSE July-Sept. 2019 198-209 Zhang, H., see Du, J., TNSE April -June 2019 103-115 Zhang, J., see Wang, X., TNSE July-Sept. 2019 379-390 Zhang, J., Yeh, E., and Modiano, E., Robustness of Interdependent Random Geometric Networks; TNSE July-Sept. 2019 474-487 Zhang, J., Fu, L., Li, S., Yao, Y., and Wang, X., Core Percolation in Interdependent Networks; TNSE Oct.-Dec. 2019 952-967 Zhang, L., see Wang, B., TNSE July-Sept. 2019 523-537 Zhang, Y., and Cortes, J., Characterizing Tolerable Disturbances for Transient-State Safety in Power Networks; TNSE July-Sept. 2019 210-224 Zhang, Z., see Qi, Y., TNSE July-Sept...…”
Section: Enhancing the Anonymity In Informationmentioning
confidence: 99%
“…In [5], the authors focused on FDI(false data injection) attacks and how to mitigate such cyber attacks. And in [6], the authors investigated the effects of cyber attacks on power grids.…”
Section: Introductionmentioning
confidence: 99%