2016
DOI: 10.1109/jsyst.2014.2323266
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis

Abstract: Abstract-Smart grid is delay-sensitive and requires the techniques that can identify and react on the abnormal changes (i.e. system fault, attacker, shortcut, etc.) in a timely manner. In this paper, we propose a real-time detection scheme against false data injection attack in smart grid networks. Unlike the classical detection test, the proposed algorithm is able to tackle the unknown parameters with low complexity and process multiple measurements at once, leading to a shorter decision time and better detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
71
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 142 publications
(71 citation statements)
references
References 35 publications
(28 reference statements)
0
71
0
Order By: Relevance
“…), which are desired for seamless operation of a power system. Estimated conditions of operating states from real-time measurements are used for this purpose [13]. Failure of the decision tools, including servers, will affect power system reliability.…”
Section: Decision Layermentioning
confidence: 99%
“…), which are desired for seamless operation of a power system. Estimated conditions of operating states from real-time measurements are used for this purpose [13]. Failure of the decision tools, including servers, will affect power system reliability.…”
Section: Decision Layermentioning
confidence: 99%
“…In power flow analysis, it is usually considered that the voltage phase differences are relatively small and the voltage amplitudes are normalized to unit [8], such that a linear relation exists between the power measurement and the voltage phase difference. We thus apply a linearized power flow model, which is widely used for real-time analysis of state estimation in the power systems [11].…”
Section: B State Estimationmentioning
confidence: 99%
“…1) Non-stealthy Data Injection Attacks: They are defined as the attacks detectable by conventional residual-test methods [8]. In this case, the measurement matrix H is not known to the attackers.…”
Section: Non-stealthy Attacks and Stealthy Attacksmentioning
confidence: 99%
See 2 more Smart Citations