A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Critical Infrastructure Cybersecurity Challenges: IoT In Perspective
[article]
2022
arXiv
pre-print
Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. ...
Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. ...
False data injection (FDI) and Denial of service (DOS) attacks have an impact on security constraint and economic dispatch (SCED), automatic generation control (AGC), and state estimation. ...
arXiv:2202.12970v1
fatcat:avdnq7su65b3ljfhbeyuf2s6cq
Model-Based Attack Detection and Mitigation for Automatic Generation Control
2014
IEEE Transactions on Smart Grid
We first demonstrate the impact of data integrity attacks on Automatic Generation Control (AGC) on power system frequency and electricity market operation. ...
We propose a general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation. ...
The rest of this paper discusses the impact of malicious data injection on AGC, and the design and implementation of attack detection and mitigation.
III. ...
doi:10.1109/tsg.2014.2298195
fatcat:4ehv3jqvc5bqvbvqrhzn2luzjm
Protection of Power System during Cyber-Attack using Artificial Neural Network
2019
Engineering International
Impacts of frequency and voltage disturbance on an isolated power system caused by cyber-attack have been discussed, and a neural network-based protective approach has been proposed in this research work ...
For load frequency control neural network tuned PID controller mitigate frequency disturbance 48% faster than manually tuned PID and for the automatic voltage regulator, neural network tuned PID controller ...
The authors Teixeira et al. (2014) , Isozaki et al. (2016) , and Cameron et al. (2018) have discussed the impacts of injecting false data and causing a denial of service attack on voltage control scheme ...
doi:10.18034/ei.v7i2.478
fatcat:ufytl4a2undrlk7yniw5igspsy
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
2021
Zenodo
Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. ...
Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. ...
False data injection (FDI) and Denial of service (DOS) attacks have an impact on security constraint and economic dispatch (SCED), automatic generation control (AGC), and state estimation. ...
doi:10.5281/zenodo.5253236
fatcat:awcnpa747vbo3br5hxouojfu2a
Optimized Predictive Control for AGC Cyber Resiliency
2021
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
Cyber-attacks such as time delay and false data injection on the tie-line power flow, frequency measurements, and Area Control Error (ACE) control signals can cause frequency excursion that can trigger ...
Automatic Generation Control (AGC) is used in smart grid systems to maintain the grid's frequency to a nominal value. ...
[6] derived an attack impact model consisting of a series of false data injections and developing an efficient algorithm to detect the attacks. ...
doi:10.1145/3460120.3485358
fatcat:4ijxrhes5bf37agiflzde57wvm
Distributed Resilient Mitigation Strategy for False Data Injection Attack in Cyber-Physical Microgrids
2022
Frontiers in Energy Research
Therefore, considering the control failure and even system results from the false data inject attack (FDIA) on the cooperative control of microgrids, this study investigates the synchronous mitigation ...
Simulations investigate the effectiveness of the proposed distributed resilient mitigation strategy under conditions of deception and disruption attacks. ...
of loads are shared proportionately: lim t→∞ v i v ref lim t→∞ u Q i 0 (4)
SYNCHRONOUS MITIGATION FRAMEWORK AGAINST FALSE DATA INJECT ATTACK 3.1 False Data Inject Attack Model and Local Detection Generally ...
doi:10.3389/fenrg.2022.845341
doaj:0d9e3d122def4e949d44cd9354e4d270
fatcat:mavzvlh6wje5vhwym5kx4bv344
A Taxonomy of Data Attacks in Power Systems
[article]
2020
arXiv
pre-print
The goal is to provide a theoretically balanced approach to cyber attacks and their impacts on the reliable functioning of the electric grid. ...
Nineteen different attack models against major operation and control blocks are classified into four areas: steady state control, transient and auxiliary control, substation control and load control. ...
Authors in [71] have studied the impacts of false data injection on two FACTS devices: thyristor controlled series compensator (TCSC) and static VAR compensator. ...
arXiv:2002.11011v1
fatcat:qnh3li5os5b4tn2iadhy7f24ze
A Novel Intrusion Mitigation Unit for Interconnected Power Systems in Frequency Regulation to Enhance Cybersecurity
2021
Energies
Since the parameters of the FPID controller can also be influenced by a CA, the proposed security unit, named the automatic intrusion mitigation unit (AIMU), guarantees control over such changes. ...
The development of information and communication technology (ICT) has increased the possibility of unauthorized access to power system networks for data manipulation. ...
The detection of false data injection based on the measurement variation method is proposed in [42] . ...
doi:10.3390/en14051401
fatcat:bj2xf6gpbncflkabfu7ddr2jsu
Cyber–Physical System Security for the Electric Power Grid
2012
Proceedings of the IEEE
Control in power systems that may be vulnerable to security attacks is discussed in this paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations. ...
Estimating feasible attack impact requires an evaluation of the grid's dependency on its cyber infrastructure and its ability to tolerate potential failures. ...
The authors are with the Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 USA (e-mail: sridhar@iastate.edu). ...
doi:10.1109/jproc.2011.2165269
fatcat:nb32l26obffqnbebh3erzu52ai
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem
2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
We first build a generic model for different cross-platform applications to reduce their semantic and behavioral gaps. ...
We use this model to (1) study Xrce by comprehensively defining its attack scenarios, surfaces, and behaviors, (2) investigate and study the state-of-theart defenses, and verify their weakness against ...
Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of ONR or DARPA. ...
doi:10.1145/3548606.3559340
fatcat:j6yj457fincqtnivprof4rzvei
Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey
[article]
2023
arXiv
pre-print
Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis. ...
The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency ...
conditions, component failures, and false data injection (FDI) attacks in EVs and PV farms [131] , [132] . ...
arXiv:2305.05338v2
fatcat:gkrdbp4o6zdb3bgzqo4q2xmpga
Security Games and Risk Minimization for Automatic Generation Control in Smart Grid
[chapter]
2012
Lecture Notes in Computer Science
Specifically, the consequences of data injection attacks are quantified using a risk assessment process based on simulations. ...
Advanced monitoring technologies at the center of smart grid evolution increase its efficiency but also make it more susceptible to malicious attacks such as false data injection. ...
Our aim is to model and quantify the risks posed by an attacker whose intention is to inflict revenue loss on the electricity provider by injecting false data to the automatic generation controller in ...
doi:10.1007/978-3-642-34266-0_17
fatcat:2caua3zcjjeu5pm7oaua7mendq
Cyber Attack-Defense Analysis for Automatic Generation Control with Renewable Energy Sources
2018
2018 North American Power Symposium (NAPS)
✓
✓
Model-based attack detection and mitigation for
automatic generation control.
✓
✓
Data Integrity Attacks and their Impacts on SCADA
Control System. ...
Optimal False Data Injection Attack against Automatic Generation Control in Power Grids. ✓ ✓ A Hierarchical Transactive Control Architecture for Renewables Integration in Smart Grids: Analytical Modeling ...
doi:10.1109/naps.2018.8600589
fatcat:b2jvlx4rpzgepdpow2wl7moys4
Cyber Security of Smart Grid Infrastructure
[article]
2014
arXiv
pre-print
Due to the cyber-attack, power grid may face operational failures and loss of synchronization. ...
Although adoption of cyber system has made the grid more energy efficient and modernized, it has introduced cyber-attack issues which are critical for national infrastructure security and customer satisfaction ...
In [17] , the authors focus on the economic impact due to the false data injection attack on a real-time market operation of a power grid. ...
arXiv:1401.3936v2
fatcat:53bm4a5jdjezfel4nm2j4y3uxa
Cyber-Physical Security of Powertrain Systems in Modern Electric Vehicles: Vulnerabilities, Challenges and Future Visions
2020
IEEE Journal of Emerging and Selected Topics in Power Electronics
Finally, potential research opportunities are discussed in detail, including detection and migration for firmware security, model-based, and data-driven detection and mitigation. ...
Simulation results, including hardware-in-the-loop (HIL) results, are provided to further analyze the cyber-attack impacts on both converter (device) and vehicle (system) levels. ...
In general, these kinds of stealthy attacks are based on a linear control model. ...
doi:10.1109/jestpe.2020.3045667
fatcat:c3dzwsbtljeqng42zrjxq4b2ny
« Previous
Showing results 1 — 15 out of 9,104 results