kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-9988-9545
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-4876-0223
2022 (English)In: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 13, no 4, p. 3241-3254Article in journal (Refereed) Published
Abstract [en]

Time Synchronization Attacks (TSAs) against Phasor Measurement Units (PMUs) constitute a major threat to modern smart grid applications. By compromising the time reference of a set of PMUs, an attacker can change the phase angle of their measured phasors, with potentially detrimental impact on grid operation and control. Going beyond traditional residual-based techniques in detecting TSAs, in this paper we propose the use of Graph Signal Processing (GSP) to model the power grid so as to facilitate the detection and localization of TSAs. We analytically show that modeling the state of the power system as a low-pass graph signal can significantly improve the resilience of the grid against TSAs. We propose TSA detection and localization methods based on GSP, leveraging state-of-the-art machine learning algorithms. We provide empirical evidence for the efficiency of the proposed methods based on extensive simulations on five IEEE benchmark systems. In fact, our methods can detect at least 77% more TSAs of significant impact and localize an additional 70% of the attacked PMUs compared to state-of-the-art techniques.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2022. Vol. 13, no 4, p. 3241-3254
Keywords [en]
Phasor measurement units, Transmission line measurements, Synchronization, Location awareness, Time measurement, Global Positioning System, Voltage measurement, Time synchronization attack, phasor measurement unit, graph signal processing, power system state estimation, attack detection and identification, machine learning
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:kth:diva-315544DOI: 10.1109/TSG.2022.3150954ISI: 000814692300064Scopus ID: 2-s2.0-85124723419OAI: oai:DiVA.org:kth-315544DiVA, id: diva2:1682032
Note

Not duplicate with DiVA 1607173

QC 20220708

Available from: 2022-07-08 Created: 2022-07-08 Last updated: 2022-07-08Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Shereen, EzzeldinRamakrishna, RakshaDán, György

Search in DiVA

By author/editor
Shereen, EzzeldinRamakrishna, RakshaDán, György
By organisation
Network and Systems Engineering
In the same journal
IEEE Transactions on Smart Grid
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 65 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf