2017
DOI: 10.1109/tcns.2016.2598427
|View full text |Cite
|
Sign up to set email alerts
|

Security Assessment of Electricity Distribution Networks Under DER Node Compromises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…This two-step cyber-attacks comprising topologypreserving attacks and load redistribution attacks, ensuring the bad data measurements are undetectable. In [150], the authors investigated the security assessment of electricity distribution networks with vulnerable DERs nodes. The game-theoretical model is used to model a 3-stage defenderattacker-defender (DAD) tri-level optimization problem.…”
Section: (Ii) Game-theoretic Modelmentioning
confidence: 99%
“…This two-step cyber-attacks comprising topologypreserving attacks and load redistribution attacks, ensuring the bad data measurements are undetectable. In [150], the authors investigated the security assessment of electricity distribution networks with vulnerable DERs nodes. The game-theoretical model is used to model a 3-stage defenderattacker-defender (DAD) tri-level optimization problem.…”
Section: (Ii) Game-theoretic Modelmentioning
confidence: 99%
“…Therefore, mitigation of cyber risks in electric power networks has attracted a lot of research attention. Among recent research activities on enhancing cyber security of power systems, Shelar et al proposes a game-theoretical model to optimize the security strategy of electricity distribution networks (Shelar and Amin 2016). They consider a specific adversary model, in which false data injection attacks are used to compromise vulnerable distributed energy resource (DER) nodes.…”
Section: Related Workmentioning
confidence: 99%
“…This exposes the operation of the network to malicious attacks from adversaries. Such data tampering will affect the control functions of the distribution management system (DMS) such as integrated volt var control (VVC) and thus, resulting into less reliable and efficient operation of the network [3]- [5]. VVC is an integral part of modern distribution management system.…”
Section: Introductionmentioning
confidence: 99%
“…However, they have not considered PV systems in their framework. Reference [5] have assessed the security of the system under DER node compromises in a radial system with no reverse power flow. Reference [4] has discussed the cyber attacks on voltage control with PVs on a radial system.…”
Section: Introductionmentioning
confidence: 99%