2018
DOI: 10.1109/tsg.2016.2633943
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Distributed DC Optimal Power Flow Against Data Integrity Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 82 publications
(35 citation statements)
references
References 36 publications
0
30
0
Order By: Relevance
“…Such a strategy combined with a proper observation networks can effectively monitor the behaviors of all neighbors and isolate the misbehaving DGs coming from non-colluding cyber-attacks. Additionally, a resilient distributed algorithm is proposed in [150] to solve DC optimal power flow issue against data integrity attacks. In these two papers, the consensus conception is utilized to estimate the utilization ratios of DGs in [148] by introducing a virtual power plant, and estimate the bus power imbalance in [150] by adopting the primal-dual decomposition method.…”
Section: Distributed Security Control and Filteringmentioning
confidence: 99%
“…Such a strategy combined with a proper observation networks can effectively monitor the behaviors of all neighbors and isolate the misbehaving DGs coming from non-colluding cyber-attacks. Additionally, a resilient distributed algorithm is proposed in [150] to solve DC optimal power flow issue against data integrity attacks. In these two papers, the consensus conception is utilized to estimate the utilization ratios of DGs in [148] by introducing a virtual power plant, and estimate the bus power imbalance in [150] by adopting the primal-dual decomposition method.…”
Section: Distributed Security Control and Filteringmentioning
confidence: 99%
“…As a privacy enhancement methods [1,67,76] use DLP-based encryption systems, which have a comparatively high computational complexity. In [77], nodes embedded with distributed controllers coordinate with neighboring peers in order to find the optimal operating data, such as instantaneous consumption power. In doing so, they transmit plaintext information, and therefore, none of the common cryptographic techniques is applied.…”
Section: Comparison With the State-of-the-art Privacy And Trading Sysmentioning
confidence: 99%
“…In [11], employing a large number of anonymous addresses is part of the solution for privacy attainment, contrary to our framework and to the discussion of Section 2.3. The address of each SM is disclosed in [76] and in the proposed framework only to a central controller, while in [77], it is disclosed only to one-hop nodes. Interested parties can possibly be identified as such by a malicious observer in all compared systems by means of traffic analysis or address de-anonymization, i.e., an observer can identify the role of a participant by such attacks, while in our system, it is completely avoided.…”
Section: Comparison With the State-of-the-art Privacy And Trading Sysmentioning
confidence: 99%
“…Duan et al 83 addresses the vulnerability of the distributed DC optimal power flow (DC-OPF) algorithm to data integrity attacks. Duan et al 83 addresses the vulnerability of the distributed DC optimal power flow (DC-OPF) algorithm to data integrity attacks.…”
Section: Security and Reliabilitymentioning
confidence: 99%
“…Data integrity attacks have to be guarded against in smart grids. Duan et al 83 addresses the vulnerability of the distributed DC optimal power flow (DC-OPF) algorithm to data integrity attacks. There is a growing need for anomaly detection and mitigation mechanisms that fit into the distributed power system framework to counteract highly skilled malicious cyber attackers.…”
Section: Security and Reliabilitymentioning
confidence: 99%