kth.sePublikationer KTH
Ändra sökning
Länk till posten
Permanent länk

Direktlänk
Publikationer (10 of 18) Visa alla publikationer
Shereen, E., Kazari, K. & Dán, G. (2024). A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control. IEEE Transactions on Smart Grid, 15(1), 959-972
Öppna denna publikation i ny flik eller fönster >>A Reinforcement Learning Approach to Undetectable Attacks Against Automatic Generation Control
2024 (Engelska)Ingår i: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 15, nr 1, s. 959-972Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Automatic generation control (AGC) is an essential functionality for ensuring the stability of power systems, and its secure operation is thus of utmost importance to power system operators. In this paper, we investigate the vulnerability of AGC to false data injection attacks that could remain undetected by traditional detection methods based on the area control error (ACE) and the recently proposed unknown input observer (UIO). We formulate the problem of computing undetectable attacks as a multi-objective partially observable Markov decision process. We propose a flexible reward function that allows to explore the trade-off between attack impact and detectability, and use the proximal policy optimization (PPO) algorithm for learning efficient attack policies. Through extensive simulations of a 3-area power system, we show that the proposed attacks can drive the frequency beyond critical limits, while remaining undetectable by state-of-the-art algorithms employed for fault and attack detection in AGC. Our results also show that detectors trained using supervised and unsupervised machine learning can both significantly outperform existing detectors.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nyckelord
Automatic generation control, reinforcement learning, false data injection attack, power system security, unknown input observer, partially observable Markov decision process
Nationell ämneskategori
Reglerteknik
Identifikatorer
urn:nbn:se:kth:diva-345054 (URN)10.1109/TSG.2023.3288676 (DOI)001132788800056 ()2-s2.0-85181397483 (Scopus ID)
Anmärkning

QC 20240405

Tillgänglig från: 2024-04-05 Skapad: 2024-04-05 Senast uppdaterad: 2024-04-05Bibliografiskt granskad
Shereen, E. & Dán, G. (2024). Network Topology-Aware Mitigation of Undetectable PMU Time Synchronization Attacks. IEEE Transactions on Control of Network Systems, 11(4), 1899-1910
Öppna denna publikation i ny flik eller fönster >>Network Topology-Aware Mitigation of Undetectable PMU Time Synchronization Attacks
2024 (Engelska)Ingår i: IEEE Transactions on Control of Network Systems, E-ISSN 2325-5870, Vol. 11, nr 4, s. 1899-1910Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Time synchronization attacks constitute a major threat to phasor measurement unit-based smart grid applications, and their cost-efficient detection and mitigation is thus of utmost importance. In this article, we propose a mitigation approach based on authenticated network-based time synchronization. Our approach relies on the observation that a time synchronization attack can be undetectable if and only if it targets at least three time references in the power system, and such attacks need to be mitigated through appropriate security controls. We first provide a formal proof of this result, including a characterization of the degrees of freedom of the attacker in constructing an attack. We then formulate the problem of mitigating undetectable attacks at minimum cost as an integer linear program, and prove that it is NP-hard. To solve the problem, we propose two approximation algorithms based on computing shortest paths and solving a linear relaxation of the problem. Extensive simulations suggest the superiority of the proposed algorithms on IEEE benchmark power system graphs compared with baseline solutions. We report mitigation cost savings of at least 76% compared with a naive approach for mitigation and at least 30% compared with the state-of-the-art approach.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nyckelord
Phasor measurement units, Synchronization, Voltage measurement, Costs, Power systems, Current measurement, Global Positioning System, Cyber physical systems security, phasor measurement unit, power system state etimation, precision time protocol, time synchronization attack
Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-360032 (URN)10.1109/TCNS.2024.3368316 (DOI)001413492800001 ()2-s2.0-85186109672 (Scopus ID)
Anmärkning

QC 20250226

Tillgänglig från: 2025-02-17 Skapad: 2025-02-17 Senast uppdaterad: 2025-02-26Bibliografiskt granskad
Shereen, E., Kazari, K. & Dán, G. (2023). Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids. In: 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings: . Paper presented at 14th IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023, Glasgow, United Kingdom of Great Britain and Northern Ireland, Oct 31 2023 - Nov 3 2023. Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids
2023 (Engelska)Ingår i: 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2023Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Secondary control of voltage magnitude and frequency is essential to the stable and secure operation of microgrids (MGs). Recent years have witnessed an increasing interest in developing secondary controllers based on multi-agent reinforcement learning (MARL), in order to replace existing model-based controllers. Nonetheless, unlike the vulnerabilities of model-based controllers, the vulnerability of MARLbased MG secondary controllers has so far not been addressed. In this paper, we investigate the vulnerability of MARL controllers to false data injection attacks (FDIAs). Based on a formulation of MG secondary control as a partially observable stochastic game (POSG), we propose to formulate the problem of computing FDIAs as a partially observable Markov decision process (POMDP), and we use state-of-the-art RL algorithms for solving the resulting problem. Based on extensive simulations of a MG with 4 distributed generators (DGs), our results show that MARL-based secondary controllers are more resilient to FDIAs compared to state of the art model-based controllers, both in terms of attack impact and in terms of the effort needed for computing impactful attacks. Our results can serve as additional arguments for employing MARL in future MG control.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2023
Nationell ämneskategori
Reglerteknik
Identifikatorer
urn:nbn:se:kth:diva-342089 (URN)10.1109/SmartGridComm57358.2023.10333903 (DOI)2-s2.0-85180750753 (Scopus ID)
Konferens
14th IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023, Glasgow, United Kingdom of Great Britain and Northern Ireland, Oct 31 2023 - Nov 3 2023
Anmärkning

QC 20240112

Part of ISBN 978-166545554-1

Tillgänglig från: 2024-01-12 Skapad: 2024-01-12 Senast uppdaterad: 2024-01-12Bibliografiskt granskad
Kazari, K., Shereen, E. & Dán, G. (2023). Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning. In: Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023: . Paper presented at 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, Macao, China, Aug 19 2023 - Aug 25 2023 (pp. 162-170). International Joint Conferences on Artificial Intelligence
Öppna denna publikation i ny flik eller fönster >>Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning
2023 (Engelska)Ingår i: Proceedings of the 32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, International Joint Conferences on Artificial Intelligence , 2023, s. 162-170Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

We consider the problem of detecting adversarial attacks against cooperative multi-agent reinforcement learning. We propose a decentralized scheme that allows agents to detect the abnormal behavior of one compromised agent. Our approach is based on a recurrent neural network (RNN) trained during cooperative learning to predict the action distribution of other agents based on local observations. The predicted distribution is used for computing a normality score for the agents, which allows the detection of the misbehavior of other agents. To explore the robustness of the proposed detection scheme, we formulate the worst-case attack against our scheme as a constrained reinforcement learning problem. We propose to compute an attack policy via optimizing the corresponding dual function using reinforcement learning. Extensive simulations on various multi-agent benchmarks show the effectiveness of the proposed detection scheme in detecting state of the art attacks and in limiting the impact of undetectable attacks.

Ort, förlag, år, upplaga, sidor
International Joint Conferences on Artificial Intelligence, 2023
Nationell ämneskategori
Datavetenskap (datalogi) Reglerteknik Datorsystem
Identifikatorer
urn:nbn:se:kth:diva-337857 (URN)10.24963/ijcai.2023/19 (DOI)2-s2.0-85170355996 (Scopus ID)
Konferens
32nd International Joint Conference on Artificial Intelligence, IJCAI 2023, Macao, China, Aug 19 2023 - Aug 25 2023
Anmärkning

Part of ISBN 9781956792034

QC 20231010

Tillgänglig från: 2023-10-10 Skapad: 2023-10-10 Senast uppdaterad: 2025-05-27Bibliografiskt granskad
Shahrivar, P., Millar, S. & Shereen, E. (2023). Detecting Web Application DAST Attacks with Machine Learning. In: Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023: . Paper presented at 6th IEEE Conference on Dependable and Secure Computing, DSC 2023, Tampa, United States of America, Nov 7 2023 - Nov 9 2023. Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>Detecting Web Application DAST Attacks with Machine Learning
2023 (Engelska)Ingår i: Proceedings - 2023 IEEE Conference on Dependable and Secure Computing, DSC 2023, Institute of Electrical and Electronics Engineers (IEEE) , 2023Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Dynamic application security testing (DAST) scanning consists of automated requests to web applications with the goal of uncovering exploitable vulnerabilities. While the legitimate use of scanners aids development teams in improving security postures, they are often used by malicious actors in a brute-force manner for attack reconnaissance with a view to eventual compromise. Despite this threat from misuse of DAST to web applications and the critical data they handle, security mechanisms are lacking, with threshold-based classifiers suffering from being overly sensitive, causing excessive false positives. This paper demonstrates the first application of machine learning to specifically detect DAST attacks that augments a next-generation web application firewall implementing OWASP's AppSensor framework. Avoiding the brittle threshold approach and using tumbling windows of time to generate aggregated event features from source IPs, twelve random forest models are trained on millions of real-world events. Results show an optimal window size of 60 seconds achieves an F1 score of 0.94 and a miss rate of 6% on average across three production-grade web applications.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2023
Nyckelord
dynamic application security testing, machine learning, random forest, vulnerability scanning, web application firewall, web application security
Nationell ämneskategori
Datorsystem
Identifikatorer
urn:nbn:se:kth:diva-342650 (URN)10.1109/DSC61021.2023.10354106 (DOI)2-s2.0-85182274451 (Scopus ID)
Konferens
6th IEEE Conference on Dependable and Secure Computing, DSC 2023, Tampa, United States of America, Nov 7 2023 - Nov 9 2023
Anmärkning

Part of ISBN 9798350382112

QC 20240125

Tillgänglig från: 2024-01-25 Skapad: 2024-01-25 Senast uppdaterad: 2024-07-01Bibliografiskt granskad
Shereen, E., Ramakrishna, R. & Dán, G. (2022). Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing. IEEE Transactions on Smart Grid, 13(4), 3241-3254
Öppna denna publikation i ny flik eller fönster >>Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing
2022 (Engelska)Ingår i: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 13, nr 4, s. 3241-3254Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Time Synchronization Attacks (TSAs) against Phasor Measurement Units (PMUs) constitute a major threat to modern smart grid applications. By compromising the time reference of a set of PMUs, an attacker can change the phase angle of their measured phasors, with potentially detrimental impact on grid operation and control. Going beyond traditional residual-based techniques in detecting TSAs, in this paper we propose the use of Graph Signal Processing (GSP) to model the power grid so as to facilitate the detection and localization of TSAs. We analytically show that modeling the state of the power system as a low-pass graph signal can significantly improve the resilience of the grid against TSAs. We propose TSA detection and localization methods based on GSP, leveraging state-of-the-art machine learning algorithms. We provide empirical evidence for the efficiency of the proposed methods based on extensive simulations on five IEEE benchmark systems. In fact, our methods can detect at least 77% more TSAs of significant impact and localize an additional 70% of the attacked PMUs compared to state-of-the-art techniques.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2022
Nyckelord
Phasor measurement units, Transmission line measurements, Synchronization, Location awareness, Time measurement, Global Positioning System, Voltage measurement, Time synchronization attack, phasor measurement unit, graph signal processing, power system state estimation, attack detection and identification, machine learning
Nationell ämneskategori
Datorsystem
Identifikatorer
urn:nbn:se:kth:diva-315544 (URN)10.1109/TSG.2022.3150954 (DOI)000814692300064 ()2-s2.0-85124723419 (Scopus ID)
Anmärkning

Not duplicate with DiVA 1607173

QC 20220708

Tillgänglig från: 2022-07-08 Skapad: 2022-07-08 Senast uppdaterad: 2022-07-08Bibliografiskt granskad
Santas, S., Shereen, E., Sandberg, H. & Dán, G. (2021). Continuous authentication security games. In: Game Theory and Machine Learning for Cyber Security: (pp. 180-203). Wiley
Öppna denna publikation i ny flik eller fönster >>Continuous authentication security games
2021 (Engelska)Ingår i: Game Theory and Machine Learning for Cyber Security, Wiley , 2021, s. 180-203Kapitel i bok, del av antologi (Övrigt vetenskapligt)
Ort, förlag, år, upplaga, sidor
Wiley, 2021
Nationell ämneskategori
Datorsystem
Identifikatorer
urn:nbn:se:kth:diva-329151 (URN)2-s2.0-85136766068 (Scopus ID)
Anmärkning

Part of ISBN 9781119723950 9781119723943

QC 20230614

Tillgänglig från: 2023-06-15 Skapad: 2023-06-15 Senast uppdaterad: 2024-03-18Bibliografiskt granskad
Shereen, E. (2021). Security of Time Synchronization for PMU-based Power System State Estimation: Vulnerabilities and Countermeasures. (Doctoral dissertation). Stockholm, Sweden: KTH Royal Institute of Technology
Öppna denna publikation i ny flik eller fönster >>Security of Time Synchronization for PMU-based Power System State Estimation: Vulnerabilities and Countermeasures
2021 (Engelska)Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
Abstract [en]

Phasor Measurement Units (PMUs) constitute an emerging technology that is essential for various smart grid applications such as phase angle monitoring, power oscillation damping, fault localization, and linear state estimation. To obtain precise PMU measurements of voltage and current phasors, time synchronization in the order of 1 microsecond is typically required. Nevertheless, time synchronization sources for PMUs, such as GPS satellites and Precision Time Protocol (PTP), are vulnerable to Time Synchronization Attacks (TSAs). A TSA can disrupt time synchronization, resulting in malicious phase angle measurements, potentially leading to serious consequences to the stability of the power grid. Moreover, sophisticated attackers may be able to develop undetectable TSAs that would lead to incorrect but credible estimates of the system state, which will bypass traditional Bad Data Detection (BDD) algorithms employed in the grid. Therefore, the detection and mitigation of such undetectable TSAs is of utmost importance for power system operators.​

The first part of this thesis explores the threat of undetectable TSAs by investigating their practical feasibility. We provide necessary and sufficient conditions for a set of PMUs to be vulnerable to undetectable TSAs and provide an efficient algorithm to compute attacks against any number of vulnerable PMUs. Furthermore, we show that the set of undetectable TSAs forms a continuum if at least three vulnerable PMUs are targeted by the attack. This fact can be exploited by an attacker to develop low-rate attacks that would adapt to the clock servo that controls the PMU clock, and would bypass typical change detection-based security solutions. The feasibility of computing undetectable TSAs was demonstrated using realistic PMU data and a widely-used clock servo implementation.

The second part of this thesis considers the detection of TSAs. To this end, we proposed three detection approaches focusing on various aspects of PMU and power grid operations. The first proposed approach is decentralized, and attempts to detect TSAs at every PMU individually by leveraging the dependence between the PMU clock state and the measured phasor. The approach is based on the observation that a TSA changes the correlation between the PMU clock frequency adjustments and the change in the measured phase angle. We proposed model-based and data-driven machine learning-based TSA detectors exploiting the change in correlation. Using extensive simulations and realistic PMU clock models, the proposed detectors were shown to perform well even for relatively low-rate attacks. The second proposed approach is centralized and is based on performing state estimation using the complete three-phase model instead of the simpler and more widely-used direct-sequence equivalent model. Our analytical results and extensive simulations showed that three-phase state estimators are significantly more resilient to TSAs compared to single-phase state estimators in unbalanced three phase systems. The third proposed approach is based on the framework of Graph Signal Processing (GSP) in power systems. We showed that by regarding the system state as a graph signal, the low-dimensional structure of the PMU measurements and the system state can be exploited for TSA detection. Based on GSP, we proposed a high-pass graph filter as well as machine learning classifiers utilizing GSP features, both showing superior performance not only in detecting the presence of a TSA, but also in localizing the attacked PMUs.

The third and final part of the thesis considers the mitigation of TSAs, with special focus on PTP networks. In this regard, we investigated recently standardized authentication schemes in PTPv2.1 and their effect on both the synchronization accuracy and network latency in an experimental testbed. The results showed that the authentication schemes pose no significant overhead on the synchronization accuracy or the network latency. Moreover, the cost considerations of PTP authentication were investigated by considering the partial application of the authentication schemes to a PTP network only in the parts that are vulnerable to undetectable TSAs, thus combining TSA mitigation and detection. We showed that the problem of mitigating undetectable TSAs at minimum cost is NP-hard. We formulated the problem as an integer linear program and proposed two approximation algorithms based on linear relaxation and a greedy heuristic. Through extensive simulations on both synthetic graphs and realistic IEEE benchmark power system graphs, we showed that our proposed algorithms, combining both state estimation and PTP authentication, can dramatically reduce the cost of mitigating TSAs.

The TSA detection and mitigation approaches presented in this thesis constitute a step towards secure and reliable time synchronization for PMU applications and a more resilient smart grid infrastructure.

Ort, förlag, år, upplaga, sidor
Stockholm, Sweden: KTH Royal Institute of Technology, 2021. s. 237
Serie
TRITA-EECS-AVL ; 2021:66
Nyckelord
Phasor measurements unit, Time synchronization, Power system state estimation, Network Security, Time synchronization attacks, Precision time protocol, Machine learning
Nationell ämneskategori
Elektroteknik och elektronik
Forskningsämne
Elektro- och systemteknik
Identifikatorer
urn:nbn:se:kth:diva-304272 (URN)978-91-8040-035-0 (ISBN)
Disputation
2021-11-29, Kollegiesalen Zoom link: https://kth-se.zoom.us/j/66718887877?pwd=Vk93U0FiQjMvbzBWaVVsN3kyRTd0dz09, Brinellvägen 8, Stockholm, Sweden, 14:00 (Engelska)
Opponent
Handledare
Anmärkning

QC 20211101

Tillgänglig från: 2021-11-01 Skapad: 2021-10-29 Senast uppdaterad: 2022-06-25Bibliografiskt granskad
Delcourt, M., Shereen, E., Dán, G., Le Boudec, J.-Y. & Paolone, M. (2021). Time-Synchronization Attack Detection in Unbalanced Three-Phase Systems. IEEE Transactions on Smart Grid, 12(5), 4460-4470
Öppna denna publikation i ny flik eller fönster >>Time-Synchronization Attack Detection in Unbalanced Three-Phase Systems
Visa övriga...
2021 (Engelska)Ingår i: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 12, nr 5, s. 4460-4470Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Phasor measurement units (PMU) rely on an accurate time-synchronization to phase-align the phasors and timestamp the voltage and current phasor measurements. Among the symmetrical components computed from the phasors in three-phase systems, the standard practice only uses the direct-sequence component for state estimation and bad data detection (BDD). Time-synchronization attacks (TSAs) can compromise the measured phasors and can, thus, significantly alter the state estimate in a manner that is undetectable by widely used power-system BDD algorithms. In this paper we investigate the potential of utilizing the three-phase model instead of the direct-sequence model for mitigating the vulnerability of state estimation to undetectable TSAs. We show analytically that if the power system is unbalanced then the use of the three-phase model as input to BDD algorithms enables to detect attacks that would be undetectable if only the direct-sequence model was used. Simulations performed on the IEEE 39-bus benchmark using real load profiles recorded on the grid of the city of Lausanne confirm our analytical results. Our results provide a new argument for the adoption of three-phase models for BDD, as their use is a simple, yet effective measure for reducing the vulnerability of PMU measurements to TSAs.

Ort, förlag, år, upplaga, sidor
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2021
Nyckelord
Phasor measurement units, Transmission line measurements, State estimation, Synchronization, Power systems, Phase measurement, Measurement uncertainty, Phasor measurement unit (PMU), power system state estimation, threephase state estimation, time synchronization attack, cyber-security, false data injection attack, bad data detection (BDD)
Nationell ämneskategori
Annan elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-300820 (URN)10.1109/TSG.2021.3078104 (DOI)000686785700070 ()2-s2.0-85105880322 (Scopus ID)
Anmärkning

QC 20210929

Tillgänglig från: 2021-09-29 Skapad: 2021-09-29 Senast uppdaterad: 2022-06-25Bibliografiskt granskad
Shereen, E., Delcourt, M., Barreto, S., Dán, G., Le Boudec, J.-Y. & Paolone, M. (2020). Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation. IEEE Transactions on Instrumentation and Measurement, 69(6), 3412-3427
Öppna denna publikation i ny flik eller fönster >>Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation
Visa övriga...
2020 (Engelska)Ingår i: IEEE Transactions on Instrumentation and Measurement, ISSN 0018-9456, E-ISSN 1557-9662, Vol. 69, nr 6, s. 3412-3427Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The emerging measurement technology of phasor measurement units (PMUs) makes it possible to estimate the state of electrical grids in real time, thus opening the way to new protection and control applications. PMUs rely on precise time synchronization; therefore, they are vulnerable to time-synchronization attacks (TSAs), which alter the measured voltage and current phases. In particular, undetectable TSAs pose a significant threat as they lead to an incorrect but credible estimate of the system state. Prior work has shown that such attacks exist against pairs of PMUs, but they do not take into consideration the clock adjustment performed by the clock servo, which can modify the attack angles and make the attacks detectable. This cannot be easily addressed with the existing attacks, as the undetectable angle values form a discrete set and cannot be continuously adjusted as would be required to address the problems posed to the attacker by the clock servo. Going beyond prior work, this article first shows how to perform undetectable attacks against more than two PMUs, so that the set of undetectable attacks forms a continuum and supports small adjustments. Second, it shows how an attacker can anticipate the operation of the clock servo while achieving her attack goal and remaining undetectable. Third, this article shows how to identify vulnerable sets of PMUs. Numerical results on the 39-bus IEEE benchmark system illustrate the feasibility of the proposed attack strategies.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2020
Nyckelord
Clock servo, cyber-security, false data injection attack, phasor measurement unit (PMU), power system state estimation, time synchronization attack (TSA)
Nationell ämneskategori
Kommunikationssystem
Identifikatorer
urn:nbn:se:kth:diva-278778 (URN)10.1109/TIM.2019.2939942 (DOI)000546623300015 ()2-s2.0-85084928264 (Scopus ID)
Anmärkning

QC 20200729

Tillgänglig från: 2020-07-29 Skapad: 2020-07-29 Senast uppdaterad: 2022-06-26Bibliografiskt granskad
Organisationer
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-9988-9545

Sök vidare i DiVA

Visa alla publikationer