2022
DOI: 10.1109/access.2022.3202201
|View full text |Cite
|
Sign up to set email alerts
|

Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems

Abstract: Power system functionality is determined on the basis of power system state estimation (PSSE). Thus, corruption of the PSSE may lead to severe consequences, such as disruptions in electricity distribution, maintenance damage, and financial losses. Classical bad data detection (BDD) methods, developed to ensure PSSE reliability, are unable to detect well-designed attacks, named unobservable false data injection (FDI) attacks. In this paper, we develop novel structural-constrained methods for the detection of un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 111 publications
(343 reference statements)
0
7
0
Order By: Relevance
“…. , M , and the TV is not a function of m. 2) For h(L) that satisfy (18) to be a valid graph filter, i.e.…”
Section: Claim 2 Assume the Following Measurement Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…. , M , and the TV is not a function of m. 2) For h(L) that satisfy (18) to be a valid graph filter, i.e.…”
Section: Claim 2 Assume the Following Measurement Modelmentioning
confidence: 99%
“…However, there are various realistic scenarios where the system is partially observable (also named in the literature as unobservable) ([ 1 ] Chpter 4, [ 3 , 4 , 5 ]), that is, the number of sensors is not sufficiently large, or sensors are not well placed in the network. The observability of the system may be compromised due to communication errors, topology changes, sensor failures [ 1 ], malicious attacks [ 6 , 7 , 8 ], and electrical blackouts [ 9 ]. A direct implication of system unobservability is that conventional estimators that assume deterministic states, such as the commonly used weighted least squares (WLS) estimator, can no longer be used since they are inaccurate, inconsistent, and may have large estimation errors even in the absence of noise [ 3 , 10 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the symmetry of the derivative of the Scaled Augmented Lagrangian function in ( 14) w.r.t. G and B, we can derive the update equation for B(i+1) using a similar procedure as for G in (29). Therefore, under the assumption that H 4 + ρE is non-singular, the update equation for B is given by…”
Section: B Alm Solutionmentioning
confidence: 99%
“…Hence, accurate topology identification and precise line-parameter estimation become crucial for ensuring the efficiency and reliability of the network operations. Additionally, topology identification achieved through admittance matrix estimation can serve as a valuable tool for event detection, such as identifying faults and line outages [28], and detection of potential cyberattacks [9], [29]. Furthermore, with the increasing integration of distributed renewable energy resources, the importance of admittance matrix estimation has risen significantly, making it an indispensable element in addressing the challenges of modern power systems.…”
Section: Introductionmentioning
confidence: 99%