Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








321 Hits in 4.2 sec

Impacts of Bad Data on the PMU based Line Outage Detection [article]

Xuan Liu, Zhiyi Li, Zuyi Li
2015 arXiv   pre-print
In this paper, we demonstrate that the outages of some lines can be masked by injecting false data into a set of measurements.  ...  The success of the topology attack can be guaranteed by making that: 1)the injected false data obeys KCL and KVL to avoid being detected by the bad data detection program in the state estimation; 2)the  ...  Accordingly, this outage of the line can be masked by injecting the false data.  ... 
arXiv:1502.04236v2 fatcat:2ubz3ndnb5dhfpsdgckac6j2cq

Localization of Coordinated Cyber-Physical Attacks in Power Grids Using Moving Target Defense and Deep Learning [article]

Yexiang Chen, Subhash Lakshminarayana, Fei Teng
2022 arXiv   pre-print
Firstly, moving target defense (MTD) is applied to expose the physical attack by actively perturbing transmission line reactance via distributed flexible AC transmission system (D-FACTS) devices.  ...  MTD invalidates the attackers' knowledge required to mask their physical attack.  ...  It consists of a "physical attack" such as disconnecting a transmission line/circuit breaker, and a coordinated "cyber attack" such as a false data injection attack (FDIA) that masks the effect of the  ... 
arXiv:2207.12339v1 fatcat:6lobhwgufzbifdhdywqxynv44y

Intelligent data attacks against power systems using incomplete network information: a review

Yufei SONG, Xuan LIU, Zhiyi LI, Mohammad SHAHIDEHPOUR, Zuyi LI
2018 Journal of Modern Power Systems and Clean Energy  
transmission line outage detection appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were via false data attacks  ...  P, Liang H (2018) False data injection attacks false data injection attacks on power systems?  ... 
doi:10.1007/s40565-018-0427-z fatcat:vxwosuquojhztncfcsppivp4zi

Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts [article]

Haftu Tasew Reda, Adnan Anwar, Abdun Mahmood
2021 arXiv   pre-print
Recently, false data injection (FDI) has become one of the most critical cyberattacks, and appears to be a focal point of interest for both research and industry.  ...  In conclusion, a range of technical limitations of existing false data attack research is identified, and a number of future research directions is recommended.  ...  Following the same principle as in [83] and [99] , the authors of [84] came up with a concept that line outages can be masked through manipulating PMU data based outage detection by injecting malicious  ... 
arXiv:2103.10594v1 fatcat:ovgq6m43nbd4nk32gwdtpuzjve

Smart Grid Cyber-Physical Attack and Defense: A Review

Hang Zhang, Bo Liu, Hongyu Wu
2021 IEEE Access  
manipulation to mask line-outage Measurement manipulation Voltage violation and line overflow Measurement injection y a t Stuxnet-Like Attack [93], [94] Communication channel Incorrect  ...  [75] defined a special type of false data injection attacks, namely load redistribution (LR) attacks.  ... 
doi:10.1109/access.2021.3058628 fatcat:5p2dbk6dlnbnplungfhv6k55lu

Moving-Target Defense Against Cyber-Physical Attacks in Power Grids via Game Theory [article]

Subhash Lakshminarayana, E. Veronica Belmega, H. Vincent Poor
2021 arXiv   pre-print
The main idea of the proposed approach is to invalidate the knowledge that the attackers use to mask the effects of their physical attack by actively perturbing the grid's transmission line reactances  ...  via distributed flexible AC transmission system (D-FACTS) devices.  ...  Undetectable False Data Injection Attacks: We denote the false data injection (FDI) attack vector by a ∈ R M , which the attacker injects into the sensor measurements by exploiting the aformentioned SCADA  ... 
arXiv:2006.07697v2 fatcat:ediqmpvzpbhyjpnikuy76qqa2q

Local False Data Injection Attack Theory Considering Isolation Physical-Protection in Power Systems

Xueqian Fu, Gengrui Chen, Dechnag Yang
2020 IEEE Access  
Both the line power losses, and energy conservation are taken into account in establishing the local false data attack model.  ...  INDEX TERMS Cyber physical power system, false data injection attack, prosumer energy management, state estimation.  ...  The study in [14] emphasized that the outages of some lines can be masked via FDI attacks, which maximized the residual of lines.  ... 
doi:10.1109/access.2020.2999585 fatcat:vlfnd4gz6rhifi2uzrzvse5qkq

Cyber-physical attacks and defences in the smart grid: a survey

Haibo He, Jun Yan
2016 IET Cyber-Physical Systems  
This paper provides a comprehensive and systematic review of the critical attack threats and defence strategies in the smart grid.  ...  With an in-depth review of the attacks and defences, we then discuss the opportunities and challenges along the smart grid CP security.  ...  The masking attack has been further utilised to conceal line outages created by the LR attack.  ... 
doi:10.1049/iet-cps.2016.0019 fatcat:sa3rq3zwafebxk4tse7sqmmjw4

Cyber Risk Assessment of Transmission Lines in Smart Grids

Xuan Liu, Xingdong Liu, Zuyi Li
2015 Energies  
In this paper, we assess the risk of transmission lines being overloaded due to cyber-based false data injection attacks.  ...  The cyber risk assessment is formulated as bilevel optimization problems that determine the maximum line flows under false data injection attacks.  ...  false data injection attacks.  ... 
doi:10.3390/en81212393 fatcat:m3tfk67cgngixbnug7etnj7gvq

Failure and fault classification for smart grids

Zuzana Krivohlava, Stanislav Chren, Bruno Rossi
2022 Energy Informatics  
nodes) • false data injection attack through transmission lines, leading to overheat- • load redistribution attack • replay attack • ing and outage of the lines • natural disasters man-in-the-middle attack  ...  Integrity attacks such as false data injection attacks can relate to tampered data packets of false measurements.  ...  Availability of data and materials The datasets generated and/or analysed during the current study are available in the Figshare repository: https:// doi. org/ 10. 6084/ m9. figsh are. 19086 593.  ... 
doi:10.1186/s42162-022-00218-3 fatcat:24zonqzh6jazjkvlzq6l33jozi

CPS Attacks Mitigation Approaches on Power Electronic Systems With Security Challenges for Smart Grid Applications: A Review

Mahmoud Amin, Fayez F. M. El-Sousy, Ghada A. Abdel Aziz, Khaled Gaber, Osama A. Mohammed
2021 IEEE Access  
INDEX TERMS Cyber-security, cyber-attacks, cyber-physical system, voltage source converter, smart grid, security attacks mitigation.  ...  Furthermore, appraisal of the CPS threats attacks mitigation approaches, and encounters along the smart grid applications are discussed.  ...  recognized when the attacker injects false data on the control center's communication line and the field sensors.  ... 
doi:10.1109/access.2021.3063229 fatcat:fz35iccypncdfpvr6j7ixs7zyu

Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions

Jianguo Ding, Attia Qammar, Zhimin Zhang, Ahmad Karim, Huansheng Ning
2022 Energies  
Similarly, we analyze the vulnerabilities of all components of the smart grid (hardware, software, and data communication), data management, services and applications, running environment, and evolving  ...  Then, we investigated the the thematic taxonomy of cyberattacks on smart grids to highlight the attack strategies, consequences, and related studies analyzed.  ...  In a physical topology attack, the attacker trips the transmission line, whereas in a cyber topology attack, the attacker misleads the control center, masks the outage signal of tripped line in the cyber  ... 
doi:10.3390/en15186799 fatcat:wug4ifj2f5hz3fj322vnsodquu

Security Challenges in Smart Grid Implementation [chapter]

Sanjay Goel, Yuan Hong
2015 SpringerBriefs in Cybersecurity  
from multiple sources during power outages.  ...  These optical fibres in the newer installation of transmission lines facilitate the deployment of smart grid without any need for additional communication capacity.  ...  Most importantly, attacks in a substation can include missing or corrupted sensor data as well as false-command injection and delay in data transmission.  ... 
doi:10.1007/978-1-4471-6663-4_1 fatcat:ahwbvbahkff6ljhex5poab4hkm

Enhanced cyber‐physical security using attack‐resistant cyber nodes and event‐triggered moving target defence

Martin Higgins, Keith Mayes, Fei Teng
2021 IET Cyber-Physical Systems  
A cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined.  ...  This protocol applies a distributed anomaly detection scheme based on Holt-Winters seasonal forecasting in combination with MTD implemented via inductance perturbation.  ...  transmission outages.  ... 
doi:10.1049/cps2.12002 fatcat:jeinjefjlrfwvjsu7lgabpbfge

Implication of Unobservable State-and-topology Cyber-physical Attacks [article]

Jiazi Zhang, Lalitha Sankar
2015 arXiv   pre-print
attacker to mask a physical attack.  ...  It is shown that unobservable state-and-topology cyber-physical attacks as studied in this paper can make the system operation more vulnerable to line outages and failures.  ...  Such an attack consists of a physical attack to first trip a transmission line, followed by a cyber attack that masks the physical attack.  ... 
arXiv:1509.00520v1 fatcat:ocre6peaj5fdzftgmqwjp2mhry
« Previous Showing results 1 — 15 out of 321 results