메뉴 건너뛰기




Volumn 63, Issue 5, 2015, Pages 1102-1114

Subspace methods for data attack on state estimation: A data driven approach

Author keywords

Cyber physical system; data framing attack; false data injection; state estimation; subspace method

Indexed keywords

EMBEDDED SYSTEMS; STATE ESTIMATION; VECTORS;

EID: 84922575918     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2014.2385670     Document Type: Article
Times cited : (192)

References (34)
  • 1
    • 70449466750 scopus 로고    scopus 로고
    • EECS Dept., Univ. of Calif., Berkeley, CA, USA, Tech. Rep. UCB/EECS-2008-8, Jan. [Online]. Available
    • E. A. Lee, "Cyber physical systems: Design challenges," EECS Dept., Univ. of Calif., Berkeley, CA, USA, Tech. Rep. UCB/EECS-2008-8, Jan. 2008 [Online]. Available: http://www.eecs.berkeley.edu/Pubs/ TechRpts/2008/EECS-2008-8.html
    • (2008) Cyber Physical Systems: Design Challenges
    • Lee, E.A.1
  • 2
    • 85032781120 scopus 로고    scopus 로고
    • State estimation in electric power grids: Meeting new challenges presented by the requirements of the future grid
    • Sep.
    • Y.-F. Huang, S. Werner, J. Huang, N. Kashyap, and V. Gupta, "State estimation in electric power grids: Meeting new challenges presented by the requirements of the future grid," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 33-43, Sep. 2012.
    • (2012) IEEE Signal Process. Mag. , vol.29 , Issue.5 , pp. 33-43
    • Huang, Y.-F.1    Werner, S.2    Huang, J.3    Kashyap, N.4    Gupta, V.5
  • 4
    • 84555196679 scopus 로고    scopus 로고
    • Staying in control: Cybersecurity and the modern electric grid
    • J. Hull, H. Khurana, T. Markham, and K. Staggs, "Staying in control: Cybersecurity and the modern electric grid," IEEE Power Energy Mag., vol. 10, no. 1, pp. 41-48, 2012.
    • (2012) IEEE Power Energy Mag. , vol.10 , Issue.1 , pp. 41-48
    • Hull, J.1    Khurana, H.2    Markham, T.3    Staggs, K.4
  • 6
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Secur., 2009, pp. 21-32.
    • (2009) Proc. 16th ACM Conf. Comput. Commun. Secur. , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 8
    • 82155162476 scopus 로고    scopus 로고
    • Malicious data attacks on the smart grid
    • Dec.
    • O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 645-658
    • Kosut, O.1    Jia, L.2    Thomas, R.J.3    Tong, L.4
  • 9
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • June
    • T. Kim and H. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, June 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.1    Poor, H.2
  • 10
    • 84863349904 scopus 로고    scopus 로고
    • Defending mechanisms against false-data injection attacks in the power system state estimation
    • Houston, TX, USA, Dec.
    • S. Bi and Y. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," in Proc. IEEE GLOBECOM Workshops, Houston, TX, USA, Dec. 2011.
    • (2011) Proc. IEEE GLOBECOM Workshops
    • Bi, S.1    Zhang, Y.2
  • 12
    • 84893535209 scopus 로고    scopus 로고
    • On phasor measurement unit placement against state and topology attacks
    • Oct.
    • J. Kim and L. Tong, "On phasor measurement unit placement against state and topology attacks," in IEEE Int. Conf. Smart Grid Commun., Oct. 2013.
    • (2013) IEEE Int. Conf. Smart Grid Commun.
    • Kim, J.1    Tong, L.2
  • 14
    • 84877672644 scopus 로고    scopus 로고
    • False data injection attacks with incomplete information against smart power grids
    • Dec.
    • M. Rahman and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart power grids," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2012.
    • (2012) Proc. IEEE Global Commun. Conf. (GLOBECOM)
    • Rahman, M.1    Mohsenian-Rad, H.2
  • 16
    • 64349119564 scopus 로고    scopus 로고
    • Eigenvalue beamforming using a multirank mvdr beamformer and subspace selection
    • A. Pezeshki, B. Van Veen, L. Scharf, H. Cox, and M. Nordenvaad, "Eigenvalue beamforming using a multirank mvdr beamformer and subspace selection," IEEE Trans. Signal Process., vol. 56, no. 5, pp. 1954-1967, 2008.
    • (2008) IEEE Trans. Signal Process. , vol.56 , Issue.5 , pp. 1954-1967
    • Pezeshki, A.1    Van Veen, B.2    Scharf, L.3    Cox, H.4    Nordenvaad, M.5
  • 17
    • 0029509295 scopus 로고
    • Subspace-based methods for the identification of linear time-invariant systems
    • M. Viberg, "Subspace-based methods for the identification of linear time-invariant systems," Automatica, vol. 31, no. 12, pp. 1835-1851, 1995.
    • (1995) Automatica , vol.31 , Issue.12 , pp. 1835-1851
    • Viberg, M.1
  • 18
    • 4344657727 scopus 로고    scopus 로고
    • [Online]. Available
    • Power Systems Test Case Archive [Online]. Available: http://www.ee. washington.edu/research/pstca/
    • Power Systems Test Case Archive
  • 19
    • 84899894964 scopus 로고    scopus 로고
    • Graphical methods for defense against falsedata injection attacks on power system state estimation
    • May
    • S. Bi and Y. J. Zhang, "Graphical methods for defense against falsedata injection attacks on power system state estimation," IEEE Trans. Smart Grid, vol. 5, no. 3, pp. 1216-1227, May 2014.
    • (2014) IEEE Trans. Smart Grid , vol.5 , Issue.3 , pp. 1216-1227
    • Bi, S.1    Zhang, Y.J.2
  • 20
    • 0019042727 scopus 로고
    • Power system observability: A practical algorithm using network topology
    • Jul.
    • G. R. Krumpholz, K. A. Clements, and P. W. Davis, "Power system observability: A practical algorithm using network topology," IEEE Trans. Power Apparat. Syst., vol. 99, no. 4, pp. 1534-1542, Jul. 1980.
    • (1980) IEEE Trans. Power Apparat. Syst. , vol.99 , Issue.4 , pp. 1534-1542
    • Krumpholz, G.R.1    Clements, K.A.2    Davis, P.W.3
  • 22
    • 84880239145 scopus 로고    scopus 로고
    • On topology attack of a smart grid: Undetectable attacks and countermeasures
    • Jul.
    • J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures," IEEE J. Sel. Areas Commun., vol. 31, no. 7, Jul. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.7
    • Kim, J.1    Tong, L.2
  • 24
    • 84906703168 scopus 로고    scopus 로고
    • Data framing attack on state estimation
    • Jul.
    • J. Kim, L. Tong, and R. J. Thomas, "Data framing attack on state estimation," IEEE J. Sel. Areas Commun., vol. 32, no. 7, pp. 1460-1470, Jul. 2014.
    • (2014) IEEE J. Sel. Areas Commun. , vol.32 , Issue.7 , pp. 1460-1470
    • Kim, J.1    Tong, L.2    Thomas, R.J.3
  • 26
    • 84887278643 scopus 로고    scopus 로고
    • Attack detection and identification in cyber-physical systems
    • Nov.
    • F. Pasqualetti, F. Dorfler, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Trans. Autom. Control, vol. 58, no. 11, pp. 2715-2729, Nov. 2013.
    • (2013) IEEE Trans. Autom. Control , vol.58 , Issue.11 , pp. 2715-2729
    • Pasqualetti, F.1    Dorfler, F.2    Bullo, F.3
  • 28
    • 84897621622 scopus 로고    scopus 로고
    • Impact of data quality on real-time locational marginal price
    • Mar.
    • L. Jia, J. Kim, R. Thomas, and L. Tong, "Impact of data quality on real-time locational marginal price," IEEE Trans. Power Syst., vol. 29, no. 2, pp. 627-636, Mar. 2014.
    • (2014) IEEE Trans. Power Syst. , vol.29 , Issue.2 , pp. 627-636
    • Jia, L.1    Kim, J.2    Thomas, R.3    Tong, L.4
  • 29
    • 0016480359 scopus 로고
    • Bad data analysis for power system state estimation
    • Mar./Apr.
    • E. Handschin, F. C. Schweppe, J. Kohlas, and A. Fiechter, "Bad data analysis for power system state estimation," IEEE Trans. Power App. Syst., vol. PAS-94, no. 2, pp. 329-337, Mar./Apr. 1975.
    • (1975) IEEE Trans. Power App. Syst. , vol.PAS-94 , Issue.2 , pp. 329-337
    • Handschin, E.1    Schweppe, F.C.2    Kohlas, J.3    Fiechter, A.4
  • 30
    • 0001697792 scopus 로고    scopus 로고
    • A Bayesian approach to geometric subspace estimation
    • May
    • A. Srivastava, "A Bayesian approach to geometric subspace estimation," IEEE Trans. Signal Process., vol. 48, no. 5, pp. 1390-1400, May 2000.
    • (2000) IEEE Trans. Signal Process. , vol.48 , Issue.5 , pp. 1390-1400
    • Srivastava, A.1
  • 31
    • 18844440455 scopus 로고    scopus 로고
    • Covariance, subspace, intrinsic Cramer Rao bounds
    • May
    • S. T. Smith, "Covariance, subspace, intrinsic Cramer Rao bounds," IEEE Trans. Signal Process., vol. 53, no. 5, pp. 1610-1630, May 2005.
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.5 , pp. 1610-1630
    • Smith, S.T.1
  • 32
    • 0001699986 scopus 로고
    • Asymptotic theory for principal component analysis
    • T. W. Anderson, "Asymptotic theory for principal component analysis," Ann. Math. Statist., vol. 34, no. 1, pp. 122-148, 1963.
    • (1963) Ann. Math. Statist. , vol.34 , Issue.1 , pp. 122-148
    • Anderson, T.W.1
  • 34
    • 0003885668 scopus 로고    scopus 로고
    • New York, NY, USA: Springer-Verlag
    • J. Shao, Mathematical Statistics. New York, NY, USA: Springer-Verlag, 2003.
    • (2003) Mathematical Statistics
    • Shao, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.