2018
DOI: 10.1007/s40565-018-0452-y
|View full text |Cite
|
Sign up to set email alerts
|

Set-theoretic detection of data corruption attacks on cyber physical power systems

Abstract: This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set, then an alarm will be activated, and the potential threat is co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(32 citation statements)
references
References 23 publications
(45 reference statements)
0
30
0
1
Order By: Relevance
“…The algorithms used for the calculation of the robust invariant sets, and thus for the design of the set-theoretic detectors, involve discrete-time systems [26,27]. In this work, we aim to develop an estimation-based detector and then combine it with a set-theoretic one.…”
Section: System Descriptionmentioning
confidence: 99%
See 4 more Smart Citations
“…The algorithms used for the calculation of the robust invariant sets, and thus for the design of the set-theoretic detectors, involve discrete-time systems [26,27]. In this work, we aim to develop an estimation-based detector and then combine it with a set-theoretic one.…”
Section: System Descriptionmentioning
confidence: 99%
“…In this work, we aim to develop an estimation-based detector and then combine it with a set-theoretic one. We adopt a common modeling basis for both detectors, by remaining consistent with the discrete-time approach introduced in [26,27]. However, our original framework requires certain modifications in order to yield an observable state space model of the power grid.…”
Section: System Descriptionmentioning
confidence: 99%
See 3 more Smart Citations