Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements
KTH, School of Electrical Engineering (EES), Automatic Control. Chalmers University of Technology.
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9940-5929
2014 (English)In: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 5, no 1, 14-28 p.Article in journal (Refereed) Published
Abstract [en]

In this paper a procedure to detect and isolate data attacks on power network power flow measurements is proposed. This method can be used in conjunction with available bad data detection (BDD) methods to isolate multiple bad data which are otherwise difficult to handle. The proposed procedure relies on secure measurements of bus voltage magnitudes to define a measurement residual using potentially compromised active and reactive power flow measurements on transmission lines. The proposed residual can be calculated in real-time. In addition, the component of the proposed residual on any particular line depends only locally on the component of the data attack on the same line. This makes the proposed residual well-suited for distributed data attack isolation in large-scale power networks. Furthermore, it can be shown that the proposed procedure becomes more effective when measurements from multiple time instances can be utilized. A detailed numerical case study on the IEEE 14-bus benchmark system demonstrates the effectiveness of the proposed procedure.

Place, publisher, year, edition, pages
2014. Vol. 5, no 1, 14-28 p.
Keyword [en]
Fault location, power network state estimation, security, wide-area protection
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-141069DOI: 10.1109/TSG.2013.2280658ISI: 000329517300002Scopus ID: 2-s2.0-84892599890OAI: oai:DiVA.org:kth-141069DiVA: diva2:695495
Funder
EU, European Research CouncilSwedish Research Council, 2007-6350 2009-4565Knut and Alice Wallenberg Foundation, TSG-00519-2012
Note

QC 20140211

Available from: 2014-02-11 Created: 2014-02-07 Last updated: 2017-12-06Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Authority records BETA

Sandberg, HenrikJohansson, Karl Henrik

Search in DiVA

By author/editor
Sou, Kin CheongSandberg, HenrikJohansson, Karl Henrik
By organisation
Automatic ControlACCESS Linnaeus Centre
In the same journal
IEEE Transactions on Smart Grid
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 319 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf