kth.sePublikationer KTH
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.ORCID-id: 0000-0002-9988-9545
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Nätverk och systemteknik.ORCID-id: 0000-0002-4876-0223
2022 (Engelska)Ingår i: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 13, nr 4, s. 3241-3254Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Time Synchronization Attacks (TSAs) against Phasor Measurement Units (PMUs) constitute a major threat to modern smart grid applications. By compromising the time reference of a set of PMUs, an attacker can change the phase angle of their measured phasors, with potentially detrimental impact on grid operation and control. Going beyond traditional residual-based techniques in detecting TSAs, in this paper we propose the use of Graph Signal Processing (GSP) to model the power grid so as to facilitate the detection and localization of TSAs. We analytically show that modeling the state of the power system as a low-pass graph signal can significantly improve the resilience of the grid against TSAs. We propose TSA detection and localization methods based on GSP, leveraging state-of-the-art machine learning algorithms. We provide empirical evidence for the efficiency of the proposed methods based on extensive simulations on five IEEE benchmark systems. In fact, our methods can detect at least 77% more TSAs of significant impact and localize an additional 70% of the attacked PMUs compared to state-of-the-art techniques.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE) , 2022. Vol. 13, nr 4, s. 3241-3254
Nyckelord [en]
Phasor measurement units, Transmission line measurements, Synchronization, Location awareness, Time measurement, Global Positioning System, Voltage measurement, Time synchronization attack, phasor measurement unit, graph signal processing, power system state estimation, attack detection and identification, machine learning
Nationell ämneskategori
Datorsystem
Identifikatorer
URN: urn:nbn:se:kth:diva-315544DOI: 10.1109/TSG.2022.3150954ISI: 000814692300064Scopus ID: 2-s2.0-85124723419OAI: oai:DiVA.org:kth-315544DiVA, id: diva2:1682032
Anmärkning

Not duplicate with DiVA 1607173

QC 20220708

Tillgänglig från: 2022-07-08 Skapad: 2022-07-08 Senast uppdaterad: 2022-07-08Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopus

Person

Shereen, EzzeldinRamakrishna, RakshaDán, György

Sök vidare i DiVA

Av författaren/redaktören
Shereen, EzzeldinRamakrishna, RakshaDán, György
Av organisationen
Nätverk och systemteknik
I samma tidskrift
IEEE Transactions on Smart Grid
Datorsystem

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 116 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf