Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.ORCID-id: 0000-0002-9988-9545
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.ORCID-id: 0000-0002-4876-0223
2022 (engelsk)Inngår i: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 13, nr 4, s. 3241-3254Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Time Synchronization Attacks (TSAs) against Phasor Measurement Units (PMUs) constitute a major threat to modern smart grid applications. By compromising the time reference of a set of PMUs, an attacker can change the phase angle of their measured phasors, with potentially detrimental impact on grid operation and control. Going beyond traditional residual-based techniques in detecting TSAs, in this paper we propose the use of Graph Signal Processing (GSP) to model the power grid so as to facilitate the detection and localization of TSAs. We analytically show that modeling the state of the power system as a low-pass graph signal can significantly improve the resilience of the grid against TSAs. We propose TSA detection and localization methods based on GSP, leveraging state-of-the-art machine learning algorithms. We provide empirical evidence for the efficiency of the proposed methods based on extensive simulations on five IEEE benchmark systems. In fact, our methods can detect at least 77% more TSAs of significant impact and localize an additional 70% of the attacked PMUs compared to state-of-the-art techniques.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers (IEEE) , 2022. Vol. 13, nr 4, s. 3241-3254
Emneord [en]
Phasor measurement units, Transmission line measurements, Synchronization, Location awareness, Time measurement, Global Positioning System, Voltage measurement, Time synchronization attack, phasor measurement unit, graph signal processing, power system state estimation, attack detection and identification, machine learning
HSV kategori
Identifikatorer
URN: urn:nbn:se:kth:diva-315544DOI: 10.1109/TSG.2022.3150954ISI: 000814692300064Scopus ID: 2-s2.0-85124723419OAI: oai:DiVA.org:kth-315544DiVA, id: diva2:1682032
Merknad

Not duplicate with DiVA 1607173

QC 20220708

Tilgjengelig fra: 2022-07-08 Laget: 2022-07-08 Sist oppdatert: 2022-07-08bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Andre lenker

Forlagets fulltekstScopus

Person

Shereen, EzzeldinRamakrishna, RakshaDán, György

Søk i DiVA

Av forfatter/redaktør
Shereen, EzzeldinRamakrishna, RakshaDán, György
Av organisasjonen
I samme tidsskrift
IEEE Transactions on Smart Grid

Søk utenfor DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric

doi
urn-nbn
Totalt: 116 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf