2020 IEEE Power &Amp; Energy Society Innovative Smart Grid Technologies Conference (ISGT) 2020
DOI: 10.1109/isgt45199.2020.9087734
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Impacts of Data Integrity Attacks on Transactive Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…In [64], researchers build a electrical trading protocol in the java programming language to maintain privacy preserve in between prosumers and utility by using blockchain and Elliptic Curve Cryptography (ECC). Seemita pal et al, analyzed the influence of data integrity attacks on electricity pricing exchange in between distribution system operator and price-responsive loads in TES [65]. The system performance is evaluated using four metrics such as operational, financial, comfort, and reliability metrics under data integrity attack by using a 240-bus western electric coordinating council transmission model with modeling of the distribution system at specific buses.…”
Section: Review On Cyber-attacks In Power Distribution Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…In [64], researchers build a electrical trading protocol in the java programming language to maintain privacy preserve in between prosumers and utility by using blockchain and Elliptic Curve Cryptography (ECC). Seemita pal et al, analyzed the influence of data integrity attacks on electricity pricing exchange in between distribution system operator and price-responsive loads in TES [65]. The system performance is evaluated using four metrics such as operational, financial, comfort, and reliability metrics under data integrity attack by using a 240-bus western electric coordinating council transmission model with modeling of the distribution system at specific buses.…”
Section: Review On Cyber-attacks In Power Distribution Systemmentioning
confidence: 99%
“…Many researchers published various analysis methods, detection, and protection techniques in the literature to control the communication attacks. In [89], researchers reviewed about cyber systems and cyber physical systems, as [65] Western Electric Co-ordinating Council 240 -Bus model [35] High Fidelity Simulation Test -Bed [36] NPCC 140 -Bus System [62] TESP & IEEE 9 -Bus System [66] TESP & IEEE 9 -Bus System [67] TESP & IEEE 9 -Bus System [61] TESP & IEEE 9 -Bus System [84] OPNET Simulator [85] SUMO & OMNET ++ [86] Speed Goat Real-Time Digital Simulator [? ]…”
Section: Attacks Through Communication Channelsmentioning
confidence: 99%