2011 IEEE International Conference on Smart Grid Communications (SmartGridComm) 2011
DOI: 10.1109/smartgridcomm.2011.6102324
|View full text |Cite
|
Sign up to set email alerts
|

Smart grid data integrity attacks: characterizations and countermeasures<sup>&#x03C0;</sup>

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
99
0
1

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 115 publications
(100 citation statements)
references
References 21 publications
0
99
0
1
Order By: Relevance
“…The observation was made using a linearized model of the SE, but it was shown later on a SCADA/EMS testbed that stealth attacks are also possible under a non-linear model [4]. Since then the security of standalone SE has received much attention [3], [4], [5], [6], [7], [8], [9], [10]. Various schemes were proposed to mitigate stealth attacks, through individual data protection [5], through changes to the BDD algorithm [6], and through the protection of the SCADA infrastructure [7], [8].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The observation was made using a linearized model of the SE, but it was shown later on a SCADA/EMS testbed that stealth attacks are also possible under a non-linear model [4]. Since then the security of standalone SE has received much attention [3], [4], [5], [6], [7], [8], [9], [10]. Various schemes were proposed to mitigate stealth attacks, through individual data protection [5], through changes to the BDD algorithm [6], and through the protection of the SCADA infrastructure [7], [8].…”
Section: Related Workmentioning
confidence: 99%
“…The importance of SE has made its security a major concern, and therefore the vulnerability of standalone SEs to so called stealth attacks has been widely studied [3], [4], [5], [6], [7], [8], [9], [10]. Stealth attacks are false data injection attacks O.…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, unobservable attacks can cause significant errors in state estimation. In [13], we address sparse unobservable attacks which involve the compromise of a modest number of meters. Specifically, we offer efficient algorithms to find all unobservable attacks involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines.…”
Section: Unobservable Attacksmentioning
confidence: 99%
“…Specifically, we offer efficient algorithms to find all unobservable attacks involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines. Applying these algorithms to a synthetic 2383 bus power system, we identify 685 possible unobservable attacks that involve the compromise of 4 or fewer meters [13]. Other examples produce similar statistics.…”
Section: Unobservable Attacksmentioning
confidence: 99%
See 1 more Smart Citation