2018 IEEE Power &Amp; Energy Society Innovative Smart Grid Technologies Conference (ISGT) 2018
DOI: 10.1109/isgt.2018.8403396
|View full text |Cite
|
Sign up to set email alerts
|

Resilient power grid state estimation under false data injection attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Although the existing research on model-based techniques aiming to develop BDD methods resilient against FDIAs, such methods are typically computationally expensive in terms of processing time and scalability [12]. For example, the authors in [13] deploy distributed flexible AC transmission system devices and activate them stochastically to enhance system hardening against attacks. The reconfiguration of system settings and topology would require recalculation of the power flow.…”
Section: Introductionmentioning
confidence: 99%
“…Although the existing research on model-based techniques aiming to develop BDD methods resilient against FDIAs, such methods are typically computationally expensive in terms of processing time and scalability [12]. For example, the authors in [13] deploy distributed flexible AC transmission system devices and activate them stochastically to enhance system hardening against attacks. The reconfiguration of system settings and topology would require recalculation of the power flow.…”
Section: Introductionmentioning
confidence: 99%
“…In [25], multiple least trimmed squares estimations have been used for secure state estimation in power systems. Another effective resilient state estimator has been proposed in [26], where the impacts of perturbations to the impedance of transmission lines in power systems have been analysed. In [27], robust dynamic state estimation (DSE) against spoofing cyber‐attacks has been fulfilled in global positioning systems.…”
Section: Introductionmentioning
confidence: 99%
“…[6] introduces the strong attack regime concept and examines the most damaging attack as the adversary has control over several meter measurements. A novel defense strategy based on applying known perturbation on power grid topology is considered in [13], and the optimal attack and defense strategies are modeled as a zero-sum game. [14] considers the effect of denial-of-service (DoS) attacks on communication infrastructures of smart grids, and shows the dynamic performance of load frequency control for a twoarea power system in presence of attacks.…”
Section: Introductionmentioning
confidence: 99%