메뉴 건너뛰기




Volumn 3, Issue 4, 2012, Pages 1790-1799

SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures

Author keywords

Cyber physical systems; intrusion detection; maliciously corrupted data detection; security state estimation

Indexed keywords

BENCHMARK SYSTEM; CONTROL NETWORK; CORRUPTED DATA; CYBER PHYSICAL SYSTEMS (CPSS); DETECTION TECHNIQUE; DISTRIBUTED SENSOR; INTRUSION DETECTORS; MALICIOUS ACTIVITIES; POWER GRIDS; POWER SENSOR; UNCERTAIN INFORMATIONS;

EID: 84872095646     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2012.2217762     Document Type: Article
Times cited : (164)

References (48)
  • 1
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system se curity for the electric power grid
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system se curity for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 2
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. Inf. Syst. Security, vol. 14, pp. 13:1-13:33, 2011.
    • (2011) ACM Trans. Inf. Syst. Security , vol.14 , pp. 131-1333
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 3
    • 82155175605 scopus 로고    scopus 로고
    • Integrity data attacks in power market operations
    • L. Xie, Y. Mo, and B. Sinopoli, "Integrity data attacks in power market operations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 659-666, 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 659-666
    • Xie, L.1    Mo, Y.2    Sinopoli, B.3
  • 4
    • 84857941849 scopus 로고    scopus 로고
    • Impacts of malicious data on realtime price of electricity market operations
    • L. Jia, R. J. Thomas, and L. Tong, "Impacts of malicious data on realtime price of electricity market operations," in Proc. HICSS, 2012, pp. 1907-1914.
    • (2012) Proc. HICSS , pp. 1907-1914
    • Jia, L.1    Thomas, R.J.2    Tong, L.3
  • 7
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 11
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. Conf. Comput. Commun. Security, 2009, pp. 21-32.
    • (2009) Proc. Conf. Comput. Commun. Security , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 14
    • 84857926085 scopus 로고
    • Multiple bad data identification for state estimation by combinatorial optimization
    • A. Monticelli, F. F. Wu, and M. Yen, "Multiple bad data identification for state estimation by combinatorial optimization," IEEE Power Eng. Rev., vol. PER-6, no. 7, pp. 73-74, 1986.
    • (1986) IEEE Power Eng. Rev. , vol.6 , Issue.7 , pp. 73-74
    • Monticelli, A.1    Wu, F.F.2    Yen, M.3
  • 15
    • 84937995839 scopus 로고
    • Direct solutions of sparse network equations by optimally ordered triangular factorization
    • W. Tinney and J. Walker, "Direct solutions of sparse network equations by optimally ordered triangular factorization," Proc. IEEE, vol. 55, no. 11, pp. 1801-1809, 1967.
    • (1967) Proc. IEEE , vol.55 , Issue.11 , pp. 1801-1809
    • Tinney, W.1    Walker, J.2
  • 17
    • 0029332887 scopus 로고
    • Planning under time constraints in stochastic domains
    • T. Dean, L. Kaelbling, J. Kirman, and A. Nicholson, "Planning under time constraints in stochastic domains," Artif. Intell., vol. 76, pp. 35-74, 1995.
    • (1995) Artif. Intell. , vol.76 , pp. 35-74
    • Dean, T.1    Kaelbling, L.2    Kirman, J.3    Nicholson, A.4
  • 19
    • 58849130197 scopus 로고    scopus 로고
    • Usable global network access policy for process control systems
    • D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," IEEE Security Privacy, vol. 6, pp. 30-36, 2008.
    • (2008) IEEE Security Privacy , vol.6 , pp. 30-36
    • Nicol, D.M.1    Sanders, W.H.2    Singh, S.3    Seri, M.4
  • 20
    • 84872068545 scopus 로고    scopus 로고
    • UMDHMM Tool
    • UMDHMM Tool [Online]. Available: http://www.kanungo.com/soft-ware/ software.html
  • 22
    • 79151479984 scopus 로고    scopus 로고
    • MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education
    • R. Zimmerman, C. Murillo-Sanchez, and R. Thomas, "MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 12-19, 2011.
    • (2011) IEEE Trans. Power Syst. , vol.26 , Issue.1 , pp. 12-19
    • Zimmerman, R.1    Murillo-Sanchez, C.2    Thomas, R.3
  • 23
    • 84872079809 scopus 로고    scopus 로고
    • SimAuto Overview PowerWorld Corporation
    • SimAuto Overview PowerWorld Corporation [Online]. Available: http://www.powerworld.com
  • 24
    • 0018544097 scopus 로고
    • IEEE reliability test system
    • "IEEE reliability test system," IEEE Trans. Power App. Syst., vol. PAS-98, no. 6, pp. 2047-2054, 1979.
    • (1979) IEEE Trans. Power App. Syst. , vol.PAS-98 , Issue.6 , pp. 2047-2054
  • 25
    • 0014700838 scopus 로고
    • Power system static-state estimation, part i: Exact model
    • F. C. Schweppe and J. Wildes, "Power system static-state estimation, part i: Exact model," IEEE Trans. Power App. Syst., vol. PAS-89, no. 1, pp. 120-125, 1970.
    • (1970) IEEE Trans. Power App. Syst. , vol.PAS-89 , Issue.1 , pp. 120-125
    • Schweppe, F.C.1    Wildes, J.2
  • 27
    • 51449093591 scopus 로고    scopus 로고
    • A Kalman-based coordination for hierarchical state estimation: Algorithm and analysis
    • S. Zonouz and W. Sanders, "A Kalman-based coordination for hierarchical state estimation: Algorithm and analysis," in Proc. Hawaii Int. Conf. Syst. Sci., 2008, pp. 187-187.
    • (2008) Proc. Hawaii Int. Conf. Syst. Sci. , pp. 187-187
    • Zonouz, S.1    Sanders, W.2
  • 28
    • 79954575826 scopus 로고    scopus 로고
    • Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
    • O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in Proc. IEEE Int. Conf. Smart Grid Commun., 2010, pp. 220-225.
    • (2010) Proc. IEEE Int. Conf. Smart Grid Commun. , pp. 220-225
    • Kosut, O.1    Jia, L.2    Thomas, R.J.3    Tong, L.4
  • 29
    • 61349163558 scopus 로고    scopus 로고
    • Application of the fault tree analysis for assessment of power system reliability
    • A. Volkanovski, M. Cepin, and B. Mavko, "Application of the fault tree analysis for assessment of power system reliability," Rel. Eng. Syst. Safety, vol. 94, no. 6, pp. 1116-1127, 2009.
    • (2009) Rel. Eng. Syst. Safety , vol.94 , Issue.6 , pp. 1116-1127
    • Volkanovski, A.1    Cepin, M.2    Mavko, B.3
  • 30
    • 33847674499 scopus 로고    scopus 로고
    • An alternative for including phasor measurements in state estimators
    • DOI 10.1109/TPWRS.2006.881112
    • M. Zhou, V. Centeno, J. Thorp, and A. Phadke, "An alternative for including phasor measurements in state estimators," IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1930-1937, 2006. (Pubitemid 46357795)
    • (2006) IEEE Transactions on Power Systems , vol.21 , Issue.4 , pp. 1930-1937
    • Zhou, M.1    Centeno, V.A.2    Thorp, J.S.3    Phadke, A.G.4
  • 31
    • 0026927912 scopus 로고
    • New bad-data detection and identification technique based on rotation of measurement order for sequential state estimation
    • K. Lo, P. Zeng, E. Marchand, and A. Pinkerton, "New bad-data detection and identification technique based on rotation of measurement order for sequential state estimation," IEE Proc. C Gener., Transm., Distrib., vol. 139, no. 5, pp. 387-401, 1992. (Pubitemid 23558280)
    • (1992) IEE Proceedings C: Generation Transmission and Distribution , vol.139 , Issue.5 , pp. 387-401
    • Lo, K.L.1    Zeng, P.L.2    Marchand, E.3    Pinkerton, A.4
  • 32
    • 84857926085 scopus 로고
    • Multiple bad data identification for state estimation by combinatorial optimization
    • A. Monticelli, F. F. Wu, and M. Yen, "Multiple bad data identification for state estimation by combinatorial optimization," IEEE Power Eng. Rev., vol. PER-6, no. 7, pp. 73-74, 1986.
    • (1986) IEEE Power Eng. Rev. , vol.6 , Issue.7 , pp. 73-74
    • Monticelli, A.1    Wu, F.F.2    Yen, M.3
  • 35
    • 84885756672 scopus 로고    scopus 로고
    • Stealth attacks and protection schemes for state estimators in power systems
    • G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE SmartGridComm, 2010.
    • (2010) Proc. IEEE SmartGridComm
    • Dan, G.1    Sandberg, H.2
  • 39
    • 84947603083 scopus 로고    scopus 로고
    • Probabilistic Alert Correlation
    • Recent Advances in Intrusion Detection
    • A. Valdes and K. Skinner, "Probabilistic alert correlation," in Proc. Int. Symp. Recent Adv. Intrusion Detection, 2001, pp. 54-68. (Pubitemid 33352000)
    • (2001) Lecture Notes in Computer Science , Issue.2212 , pp. 54-68
    • Valdes, A.1    Skinner, K.2
  • 40
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA systems
    • C.-W. Ten, C.-C. Liu, and G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1836-1846, 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.4 , pp. 1836-1846
    • Ten, C.-W.1    Liu, C.-C.2    Manimaran, G.3
  • 42
    • 0031125761 scopus 로고    scopus 로고
    • Concurrent detection of software and hardware data-access faults
    • K. D. Wilken and T. Kong, "Concurrent detection of software and hardware data-access faults," IEEE Trans. Comput., vol. 46, pp. 412-424, 1997. (Pubitemid 127760469)
    • (1997) IEEE Transactions on Computers , vol.46 , Issue.4 , pp. 412-424
    • Wilken, K.D.1    Kong, T.2
  • 44
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
    • A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Comput. Netw., vol. 51, pp. 3448-3470, 2007. (Pubitemid 46921030)
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 47
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Comput. Security, vol. 29, no. 1, pp. 124-140, 2010.
    • (2010) Comput. Security , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.