2023
DOI: 10.3390/electronics12122554
|View full text |Cite
|
Sign up to set email alerts
|

Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach

Abstract: In an attempt to provide reliable power distribution, smart grids integrate monitoring, communication, and control technologies for better energy consumption and management. As a result of such cyberphysical links, smart grids become vulnerable to cyberattacks, highlighting the significance of detecting and monitoring such attacks to uphold their security and dependability. Accordingly, the use of phasor measurement units (PMUs) enables real-time monitoring and control, providing informed-decisions data and ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 30 publications
(45 reference statements)
0
0
0
Order By: Relevance
“…In this context, 11 time domain features that were the same as those used in previous work [8] (see [8], Section 2.3) were extracted. Similarly, the same denoising, outlier removing, and scaling steps applied in [8] were followed to make sure the data were ready for DL model training. Accordingly, Figure 1b is an example of extracted features from the life cycle in Figure 1a, as some degradation patterns clearly can be seen in this situation.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this context, 11 time domain features that were the same as those used in previous work [8] (see [8], Section 2.3) were extracted. Similarly, the same denoising, outlier removing, and scaling steps applied in [8] were followed to make sure the data were ready for DL model training. Accordingly, Figure 1b is an example of extracted features from the life cycle in Figure 1a, as some degradation patterns clearly can be seen in this situation.…”
Section: Methodsmentioning
confidence: 99%
“…In this work, data were subjected to preprocessing, making it easier to extra possible degradation signs at first glance. In this context, 11 time domain feature were the same as those used in previous work [8] (see [8], Section 2.3) were extr Similarly, the same denoising, outlier removing, and scaling steps applied in [8] we lowed to make sure the data were ready for DL model training. Accordingly, Figur an example of extracted features from the life cycle in Figure 1a, as some degrad patterns clearly can be seen in this situation.…”
Section: Methodsmentioning
confidence: 99%
“…One node is a generator bus and the others are load buses (Figure 12). The algorithm reaches the observability and it gives 12 µPMUs implemented in nodes 3,29,2,4,9,12,15,19,22,25,33,30. SORI is equal to 46.…”
Section: Ieee 37-node Networkmentioning
confidence: 99%
“…Addressing communication security issues and noise interference is essential for maintaining the reliability and trustworthiness of µPMU measurements and, by extension, the effectiveness of the power grid monitoring system [22,23]. Robust security measures and data quality assurance techniques are critical components of a resilient and accurate monitoring infrastructure [24,25].…”
Section: Introductionmentioning
confidence: 99%