kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure Control of Wide-Area Power Systems: Confidentiality and Integrity Threats
MIT, Dept Mech Engn, Cambridge, MA 02139 USA..
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
MIT, Dept Mech Engn, Cambridge, MA 02139 USA..
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0001-9940-5929
Show others and affiliations
2018 (English)In: 2018 IEEEĀ Conference on Decision and ControlĀ  (CDC), Institute of Electrical and Electronics Engineers (IEEE), 2018, p. 7269-7274, article id 8618862Conference paper, Published paper (Refereed)
Abstract [en]

A cyber-physical model for wide-area control of power systems is considered, where the state variables of each generator are measured and sent to the cyber-network and the corresponding control inputs are computed distributively. The secure control of such wide-area power systems is considered in the presence of cyber attacks that introduce threats that compromise their integrity and confidentiality. Detection, prevention, and resilience for these attacks and algorithms for accomplishing these goals are proposed. In particular, an algorithm to overcome confidentiality attacks of the underlying control gains is presented. Also proposed is an algorithm for defense against integrity attacks that might take place on the cyber-network. For this purpose, a resilient information retrieval approach is leveraged which recovers the true state variables despite the malicious attacks on both virtual machines and communication links. The retrieved states are then used to detect possible attacks on phasor measurement units (PMU) in the next time-step. Simulation studies are included to validate our proposed approaches.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018. p. 7269-7274, article id 8618862
Series
IEEE Conference on Decision and Control, ISSN 0743-1546
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-245118DOI: 10.1109/CDC.2018.8618862ISI: 000458114806110Scopus ID: 2-s2.0-85062183510ISBN: 978-1-5386-1395-5 (print)OAI: oai:DiVA.org:kth-245118DiVA, id: diva2:1294076
Conference
57th IEEE Conference on Decision and Control, CDC 2018; Centre of the Fontainebleau in Miami Beach Miami; United States; 17 December 2018 through 19 December 2018
Note

QC 20190306

Available from: 2019-03-06 Created: 2019-03-06 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Pirani, MohammadJohansson, Karl Henrik

Search in DiVA

By author/editor
Pirani, MohammadJohansson, Karl Henrik
By organisation
Decision and Control Systems (Automatic Control)
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 118 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf