메뉴 건너뛰기




Volumn 5, Issue 3, 2014, Pages 1216-1227

Graphical methods for defense against false-data injection attacks on power system state estimation

Author keywords

False data injection attack; graph algorithms; power system state estimation; smart grid security

Indexed keywords

APPROXIMATION ALGORITHMS; ELECTRIC POWER SYSTEMS; FORESTRY; GRAPHIC METHODS; NETWORK SECURITY; OPTIMIZATION;

EID: 84899894964     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2013.2294966     Document Type: Article
Times cited : (213)

References (33)
  • 2
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA systems
    • C. W. Ten, C. C. Liu, and G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1836-1846, 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.4 , pp. 1836-1846
    • Ten, C.W.1    Liu, C.C.2    Manimaran, G.3
  • 3
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Chicago, IL, USA
    • Y. Liu, P. Ning, and M. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Security, Chicago, IL, USA, 2009, pp. 21-32.
    • (2009) Proc. 16th ACM Conf. Comput. Commun. Security , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.3
  • 4
    • 84866769548 scopus 로고    scopus 로고
    • Cyber security study of a scada energymanagement system: Stealthy deception attacks on the state estimator
    • Milan, Italy
    • A. Teixeira,G. Dan, H. Sandberg, andK. H. Johansson, "Cyber security study of a scada energymanagement system: Stealthy deception attacks on the state estimator," in Proc. IFAC World Congr.,Milan, Italy, 2011.
    • (2011) Proc. IFAC World Congr
    • Teixeira, A.1    Dan, G.2    Sandberg, H.3    Johansson, A.H.4
  • 5
    • 84857941849 scopus 로고    scopus 로고
    • Impacts of malicious sata on realtime price of electricity market operations
    • Jan. 4-7
    • L. Jia, R. J. Thomas, and L. Tong, "Impacts of malicious sata on realtime price of electricity market operations," in Proc. 45th HICSS, Jan. 4-7, 2012, pp. 1907-1914.
    • (2012) Proc. 45th HICSS , pp. 1907-1914
    • Jia, L.1    Thomas, R.J.2    Tong, L.3
  • 6
    • 82155175605 scopus 로고    scopus 로고
    • Integrity data attacks in power market operations
    • Dec.
    • L. Xie, Y. Mo, and B. Sinopoli, "Integrity data attacks in power market operations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 659-665, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 659-665
    • Xie, L.1    Mo, Y.2    Sinopoli, B.3
  • 7
    • 84876017888 scopus 로고    scopus 로고
    • Malicious ramp-induced temporal data attack in power market with look-ahead dispatch
    • Nov.
    • D. H. Choi and L. Xie, "Malicious ramp-induced temporal data attack in power market with look-ahead dispatch," in Proc. IEEE Int. Conf. Smart Grid Commun., Nov. 2012, pp. 330-335.
    • (2012) Proc. IEEE Int. Conf. Smart Grid Commun , pp. 330-335
    • Choi, D.H.1    Xie, L.2
  • 8
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • Jun.
    • Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 382-390
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 10
    • 84885756672 scopus 로고    scopus 로고
    • Stealth attacks and protection schemes for state estimators in power systems
    • Oct.
    • G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2010, pp. 214-219.
    • (2010) Proc. IEEE Int. Conf. Smart Grid Commun , pp. 214-219
    • Dan, G.1    Sandberg, H.2
  • 11
    • 85032751507 scopus 로고    scopus 로고
    • Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions
    • Sep.
    • S. Cui, Z. Han, S. Kar, T. T. Kim, H. V. Poor, and A. Tajer, "Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 106-115, Sep. 2012.
    • (2012) IEEE Signal Process. Mag. , vol.29 , Issue.5 , pp. 106-115
    • Cui, S.1    Han, Z.2    Kar, S.3    Kim, T.T.4    Poor, H.V.5    Tajer, A.6
  • 13
    • 84863506343 scopus 로고    scopus 로고
    • Network-aware mitigation of data integrity attacks on power system state estimation
    • Jul.
    • O. Vukovic, K. C. Sou, G. Dan, and H. Sandberg, "Network-aware mitigation of data integrity attacks on power system state estimation," IEEE J. Sel. Areas Commun., vol. 30, no. 6, pp. 1108-1118, Jul. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.6 , pp. 1108-1118
    • Vukovic, O.1    Sou, K.C.2    Dan, G.3    Sandberg, H.4
  • 14
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attack on power grids
    • Jun.
    • T. T. Kim and H. V. Poor, "Strategic protection against data injection attack on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.T.1    Poor, H.V.2
  • 15
    • 84863349904 scopus 로고    scopus 로고
    • Defending mechanisms against false-data injection attacks in the power system state estimation
    • Houston, TX, USA, Dec.
    • S. Bi and Y. J. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," in Proc. IEEE Globecom SG-COMNETS, Houston, TX, USA, Dec. 2011.
    • (2011) Proc. IEEE Globecom SG-COMNETS
    • Bi, S.1    Zhang, Y.J.2
  • 16
    • 49249129032 scopus 로고    scopus 로고
    • Optimal placement of phasor measurement units for power system observability
    • S. Chakrabarti and E. Kyriakides, "Optimal placement of phasor measurement units for power system observability," IEEE Trans. Power Syst., vol. 23, no. 3, pp. 1433-1440, 2008.
    • (2008) IEEE Trans. Power Syst. , vol.23 , Issue.3 , pp. 1433-1440
    • Chakrabarti, S.1    Kyriakides, E.2
  • 19
  • 20
    • 84899982073 scopus 로고
    • Observability determination in power system state estimation using a network flow technique
    • May
    • A. Barglela, M. R. Irving, and M. J. H. Sterling, "Observability determination in power system state estimation using a network flow technique," IEEE Power Eng. Rev., vol. PER-6, no. 2, pp. 39-40, May 1986.
    • (1986) IEEE Power Eng. Rev. , vol.PER-6 , Issue.2 , pp. 39-40
    • Barglela, A.1    Irving, M.R.2    Sterling, M.J.H.3
  • 21
    • 82155162476 scopus 로고    scopus 로고
    • Malicious data attack on the smart grid
    • O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attack on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 645-658
    • Kosut, O.1    Jia, L.2    Thomas, R.J.3    Tong, L.4
  • 22
    • 84860701003 scopus 로고    scopus 로고
    • Electricity power network security analysis via minimum cut relaxation
    • Dec.
    • K. C. Sou, H. Sandberg, and K. H. Johansson, "Electricity power network security analysis via minimum cut relaxation," in Proc. 50th CDC-ECC, Dec. 2011, pp. 4054-4059.
    • (2011) Proc. 50th CDC-ECC , pp. 4054-4059
    • Sou, K.C.1    Sandberg, H.2    Johansson, K.H.3
  • 23
    • 84155170617 scopus 로고    scopus 로고
    • On security indices for state estimators in power networks
    • H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in CPSWEEK 2010.
    • (2010) CPSWEEK
    • Sandberg, H.1    Teixeira, A.2    Johansson, K.H.3
  • 24
    • 84864284962 scopus 로고    scopus 로고
    • Computing critical k-tuples in power networks
    • K. C. Sou, H. Sandberg, and K. H. Johansson, "Computing critical k-tuples in power networks," IEEE Trans. Power Syst., vol. 27, no. 3, pp. 1511-1520, 2012.
    • (2012) IEEE Trans. Power Syst. , vol.27 , Issue.3 , pp. 1511-1520
    • Sou, K.C.1    Sandberg, H.2    Johansson, K.H.3
  • 27
    • 0030313782 scopus 로고    scopus 로고
    • Implementation of PMU technology in state estimation: An overview
    • R. Zivanovic and C. Cairns, "Implementation of PMU technology in state estimation: An overview," in Proc. IEEE AFRICON 4th, 1996, vol. 2.
    • (1996) Proc. IEEE AFRICON 4th , vol.2
    • Zivanovic, R.1    Cairns, C.2
  • 29
    • 65749094394 scopus 로고    scopus 로고
    • A unified approach for the optimal PMU location for power system state estimation
    • May
    • N. H. Abbasy and H. M. Ismail, "A unified approach for the optimal PMU location for power system state estimation," IEEE Trans. Power Syst., vol. 24, no. 2, pp. 806-813, May 2009.
    • (2009) IEEE Trans. Power Syst. , vol.24 , Issue.2 , pp. 806-813
    • Abbasy, N.H.1    Ismail, H.M.2
  • 30
    • 84865517174 scopus 로고    scopus 로고
    • Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks
    • Sep.
    • G. Hug and J. A. Giampapa, "Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks," IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1362-1370, Sep. 2012.
    • (2012) IEEE Trans. Smart Grid , vol.3 , Issue.3 , pp. 1362-1370
    • Hug, G.1    Giampapa, J.A.2
  • 32
    • 84899943031 scopus 로고    scopus 로고
    • Gurobi [Online]. Available: http://www.gurobi. com/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.