Detection and identification of data attacks in power system
2012 (English)In: American Control Conference (ACC), 2012, IEEE Computer Society, 2012, 3651-3656 p.Conference paper (Refereed)
In this paper a power system state estimator cyber-attack detection and identification scheme is presented. The proposed scheme considers the information from both the active power measurements and the reactive power measurements. Under the scenario that the network operator can take multiple different samples of measurements and the attackers can attack only once, the proposed scheme can detect the presence of what has been described as stealth (or unobservable) attacks. The detection is provably correct. Furthermore, if an attack is present, the proposed scheme can identify exactly the attacked transmission lines.
Place, publisher, year, edition, pages
IEEE Computer Society, 2012. 3651-3656 p.
, Proceedings of the American Control Conference, ISSN 0743-1619
Active-power measurements, Cyber-attacks, Data attacks, Identification scheme, Network operator, Unobservable, Control, Computer crime
IdentifiersURN: urn:nbn:se:kth:diva-107998ISI: 000310776203152ScopusID: 2-s2.0-84869392143ISBN: 978-145771095-7OAI: oai:DiVA.org:kth-107998DiVA: diva2:580207
2012 American Control Conference, ACC 2012, 27 June 2012 through 29 June 2012, Montreal, QC
FunderICT - The Next Generation
QC 201212212012-12-212012-12-192013-04-11Bibliographically approved