Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








9,104 Hits in 7.5 sec

Critical Infrastructure Cybersecurity Challenges: IoT In Perspective [article]

Henry Matey Akwetey, Paul Danquah, Godfred Yaw Koi-Akrofi, Isaac Asampana
2022 arXiv   pre-print
Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc.  ...  Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure.  ...  False data injection (FDI) and Denial of service (DOS) attacks have an impact on security constraint and economic dispatch (SCED), automatic generation control (AGC), and state estimation.  ... 
arXiv:2202.12970v1 fatcat:avdnq7su65b3ljfhbeyuf2s6cq

Model-Based Attack Detection and Mitigation for Automatic Generation Control

Siddharth Sridhar, Manimaran Govindarasu
2014 IEEE Transactions on Smart Grid  
We first demonstrate the impact of data integrity attacks on Automatic Generation Control (AGC) on power system frequency and electricity market operation.  ...  We propose a general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation.  ...  The rest of this paper discusses the impact of malicious data injection on AGC, and the design and implementation of attack detection and mitigation. III.  ... 
doi:10.1109/tsg.2014.2298195 fatcat:4ehv3jqvc5bqvbvqrhzn2luzjm

Protection of Power System during Cyber-Attack using Artificial Neural Network

Md. Shahidul Islam, RUET, Shafia Sultana, Md. Motakabbir Rahman
2019 Engineering International  
Impacts of frequency and voltage disturbance on an isolated power system caused by cyber-attack have been discussed, and a neural network-based protective approach has been proposed in this research work  ...  For load frequency control neural network tuned PID controller mitigate frequency disturbance 48% faster than manually tuned PID and for the automatic voltage regulator, neural network tuned PID controller  ...  The authors Teixeira et al. (2014) , Isozaki et al. (2016) , and Cameron et al. (2018) have discussed the impacts of injecting false data and causing a denial of service attack on voltage control scheme  ... 
doi:10.18034/ei.v7i2.478 fatcat:ufytl4a2undrlk7yniw5igspsy

CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE

Akwetey Henry Matey, Paul Danquah, Godfred Yaw Koi-Akrofi, Isaac Asampana
2021 Zenodo  
Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc.  ...  Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure.  ...  False data injection (FDI) and Denial of service (DOS) attacks have an impact on security constraint and economic dispatch (SCED), automatic generation control (AGC), and state estimation.  ... 
doi:10.5281/zenodo.5253236 fatcat:awcnpa747vbo3br5hxouojfu2a

Optimized Predictive Control for AGC Cyber Resiliency

Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap
2021 Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security  
Cyber-attacks such as time delay and false data injection on the tie-line power flow, frequency measurements, and Area Control Error (ACE) control signals can cause frequency excursion that can trigger  ...  Automatic Generation Control (AGC) is used in smart grid systems to maintain the grid's frequency to a nominal value.  ...  [6] derived an attack impact model consisting of a series of false data injections and developing an efficient algorithm to detect the attacks.  ... 
doi:10.1145/3460120.3485358 fatcat:4ijxrhes5bf37agiflzde57wvm

Distributed Resilient Mitigation Strategy for False Data Injection Attack in Cyber-Physical Microgrids

Ge Cao, Ge Cao, Rong Jia, Rong Jia, Jian Dang, Jian Dang
2022 Frontiers in Energy Research  
Therefore, considering the control failure and even system results from the false data inject attack (FDIA) on the cooperative control of microgrids, this study investigates the synchronous mitigation  ...  Simulations investigate the effectiveness of the proposed distributed resilient mitigation strategy under conditions of deception and disruption attacks.  ...  of loads are shared proportionately: lim t→∞ v i v ref lim t→∞ u Q i 0 (4) SYNCHRONOUS MITIGATION FRAMEWORK AGAINST FALSE DATA INJECT ATTACK 3.1 False Data Inject Attack Model and Local Detection Generally  ... 
doi:10.3389/fenrg.2022.845341 doaj:0d9e3d122def4e949d44cd9354e4d270 fatcat:mavzvlh6wje5vhwym5kx4bv344

A Taxonomy of Data Attacks in Power Systems [article]

Sagnik Basumallik
2020 arXiv   pre-print
The goal is to provide a theoretically balanced approach to cyber attacks and their impacts on the reliable functioning of the electric grid.  ...  Nineteen different attack models against major operation and control blocks are classified into four areas: steady state control, transient and auxiliary control, substation control and load control.  ...  Authors in [71] have studied the impacts of false data injection on two FACTS devices: thyristor controlled series compensator (TCSC) and static VAR compensator.  ... 
arXiv:2002.11011v1 fatcat:qnh3li5os5b4tn2iadhy7f24ze

A Novel Intrusion Mitigation Unit for Interconnected Power Systems in Frequency Regulation to Enhance Cybersecurity

Faisal R. Badal, Zannatun Nayem, Subrata K. Sarker, Dristi Datta, Shahriar Rahman Fahim, S. M. Muyeen, Md. Rafiqul Islam Sheikh, Sajal K. Das
2021 Energies  
Since the parameters of the FPID controller can also be influenced by a CA, the proposed security unit, named the automatic intrusion mitigation unit (AIMU), guarantees control over such changes.  ...  The development of information and communication technology (ICT) has increased the possibility of unauthorized access to power system networks for data manipulation.  ...  The detection of false data injection based on the measurement variation method is proposed in [42] .  ... 
doi:10.3390/en14051401 fatcat:bj2xf6gpbncflkabfu7ddr2jsu

Cyber–Physical System Security for the Electric Power Grid

Siddharth Sridhar, Adam Hahn, Manimaran Govindarasu
2012 Proceedings of the IEEE  
Control in power systems that may be vulnerable to security attacks is discussed in this paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations.  ...  Estimating feasible attack impact requires an evaluation of the grid's dependency on its cyber infrastructure and its ability to tolerate potential failures.  ...  The authors are with the Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 USA (e-mail: sridhar@iastate.edu).  ... 
doi:10.1109/jproc.2011.2165269 fatcat:nb32l26obffqnbebh3erzu52ai

Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem

Feng Xiao, Zheng Yang, Joey Allen, Guangliang Yang, Grant Williams, Wenke Lee
2022 Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security  
We first build a generic model for different cross-platform applications to reduce their semantic and behavioral gaps.  ...  We use this model to (1) study Xrce by comprehensively defining its attack scenarios, surfaces, and behaviors, (2) investigate and study the state-of-theart defenses, and verify their weakness against  ...  Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of ONR or DARPA.  ... 
doi:10.1145/3548606.3559340 fatcat:j6yj457fincqtnivprof4rzvei

Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey [article]

Mengxiang Liu, Fei Teng, Zhenyong Zhang, Pudong Ge, Ruilong Deng, Mingyang Sun, Jiming Chen
2023 arXiv   pre-print
Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis.  ...  The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency  ...  conditions, component failures, and false data injection (FDI) attacks in EVs and PV farms [131] , [132] .  ... 
arXiv:2305.05338v2 fatcat:gkrdbp4o6zdb3bgzqo4q2xmpga

Security Games and Risk Minimization for Automatic Generation Control in Smart Grid [chapter]

Yee Wei Law, Tansu Alpcan, Marimuthu Palaniswami, Subhrakanti Dey
2012 Lecture Notes in Computer Science  
Specifically, the consequences of data injection attacks are quantified using a risk assessment process based on simulations.  ...  Advanced monitoring technologies at the center of smart grid evolution increase its efficiency but also make it more susceptible to malicious attacks such as false data injection.  ...  Our aim is to model and quantify the risks posed by an attacker whose intention is to inflict revenue loss on the electricity provider by injecting false data to the automatic generation controller in  ... 
doi:10.1007/978-3-642-34266-0_17 fatcat:2caua3zcjjeu5pm7oaua7mendq

Cyber Attack-Defense Analysis for Automatic Generation Control with Renewable Energy Sources

Srikrishna Sarangan, Vivek Kumar Singh, Manimaran Govindarasu
2018 2018 North American Power Symposium (NAPS)  
✓ ✓  Model-based attack detection and mitigation for automatic generation control. ✓ ✓  Data Integrity Attacks and their Impacts on SCADA Control System.  ...  Optimal False Data Injection Attack against Automatic Generation Control in Power Grids. ✓ ✓  A Hierarchical Transactive Control Architecture for Renewables Integration in Smart Grids: Analytical Modeling  ... 
doi:10.1109/naps.2018.8600589 fatcat:b2jvlx4rpzgepdpow2wl7moys4

Cyber Security of Smart Grid Infrastructure [article]

Adnan Anwar, Abdun Naser Mahmood
2014 arXiv   pre-print
Due to the cyber-attack, power grid may face operational failures and loss of synchronization.  ...  Although adoption of cyber system has made the grid more energy efficient and modernized, it has introduced cyber-attack issues which are critical for national infrastructure security and customer satisfaction  ...  In [17] , the authors focus on the economic impact due to the false data injection attack on a real-time market operation of a power grid.  ... 
arXiv:1401.3936v2 fatcat:53bm4a5jdjezfel4nm2j4y3uxa

Cyber-Physical Security of Powertrain Systems in Modern Electric Vehicles: Vulnerabilities, Challenges and Future Visions

Jin Ye, Lulu Guo, Bowen Yang, Fangyu Li, Liang Du, Le Guan, Wenzhan Song
2020 IEEE Journal of Emerging and Selected Topics in Power Electronics  
Finally, potential research opportunities are discussed in detail, including detection and migration for firmware security, model-based, and data-driven detection and mitigation.  ...  Simulation results, including hardware-in-the-loop (HIL) results, are provided to further analyze the cyber-attack impacts on both converter (device) and vehicle (system) levels.  ...  In general, these kinds of stealthy attacks are based on a linear control model.  ... 
doi:10.1109/jestpe.2020.3045667 fatcat:c3dzwsbtljeqng42zrjxq4b2ny
« Previous Showing results 1 — 15 out of 9,104 results