2018
DOI: 10.1109/tsg.2017.2662688
|View full text |Cite
|
Sign up to set email alerts
|

Synchrophasor Data Correction Under GPS Spoofing Attack: A State Estimation-Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(46 citation statements)
references
References 19 publications
0
46
0
Order By: Relevance
“…Such a probing signal leads to a larger measurement residual, and therefore, ∆ > 2 is required. , which is not difficult to achieve, since these phase shifts are usually significant [11], [13]. Typical spoofed phase angles such as 52°, 60° and 70° are reported in [5], [8], and [9].…”
Section: Corollary 1 For Pmu Ifmentioning
confidence: 99%
“…Such a probing signal leads to a larger measurement residual, and therefore, ∆ > 2 is required. , which is not difficult to achieve, since these phase shifts are usually significant [11], [13]. Typical spoofed phase angles such as 52°, 60° and 70° are reported in [5], [8], and [9].…”
Section: Corollary 1 For Pmu Ifmentioning
confidence: 99%
“…State estimation and GPS spoofing attack identification in power networks is pursued in [24], [25]. A computationally efficient algorithm to identify an attack on at most one PMU is developed in [24].…”
Section: Literature Review and Paper Contributionsmentioning
confidence: 99%
“…The algorithm is also compared to one of the previous GPS spoofing identification approaches [24]. The developed algorithm can identify simultaneous attacks to more than one PMU, in contrast to [24]. Even if 20% of the PMUs are attacked, the algorithm correctly identifies the attacked PMU locations and yields an accurate state estimate, as indicated by tests on standard IEEE transmission networks.…”
Section: Literature Review and Paper Contributionsmentioning
confidence: 99%
“…GPS spoofing exploits publicly available civilian GPS signals using air or cable to produce signals that initially align with the original, but slowly start increasing the power to drown the authentic signal and thereby compromising the receiver [54,127]. By introducing measurement errors in the time synchronization, the attacks induce changes in data consistency and plausibility which can be used as markers to identify the likelihood of the attack [128][129][130].…”
Section: Addressing Cyber-attacks Using Quality Issuesmentioning
confidence: 99%