메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 8183-8193

Low-Sparsity Unobservable Attacks Against Smart Grid: Attack Exposure Analysis and a Data-Driven Attack Scheme

Author keywords

attack exposure analysis; data driven; Low sparsity unobservable attacks; smart grid; system matrix

Indexed keywords

ELECTRIC POWER TRANSMISSION NETWORKS; SMART POWER GRIDS;

EID: 85028349374     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2680463     Document Type: Article
Times cited : (22)

References (35)
  • 4
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM Conf. Comput. Commun. Secur., 2009, pp. 21-32.
    • (2009) Proc. ACM Conf. Comput. Commun. Secur. , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 5
    • 82155162476 scopus 로고    scopus 로고
    • Malicious data attacks on the smart grid
    • Dec.
    • O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 645-658
    • Kosut, O.1    Jia, L.2    Thomas, R.J.3    Tong, L.4
  • 6
    • 84880239145 scopus 로고    scopus 로고
    • On topology attack of a smart grid: Undetectable attacks and countermeasures
    • Jul.
    • J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures, " IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1294-1305, Jul. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.7 , pp. 1294-1305
    • Kim, J.1    Tong, L.2
  • 10
    • 84877672644 scopus 로고    scopus 로고
    • False data injection attacks with incomplete information against smart power grids
    • Dec.
    • M. A. Rahman and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart power grids, " in Proc. IEEE Conf. Global Commun. (GlobeCom), Dec. 2012, pp. 3153-3158.
    • (2012) Proc. IEEE Conf. Global Commun. (GlobeCom) , pp. 3153-3158
    • Rahman, M.A.1    Mohsenian-Rad, H.2
  • 12
    • 84878284364 scopus 로고    scopus 로고
    • On the exact solution to a smart grid cyber-security analysis problem
    • Jun.
    • K. C. Sou, H. Sandberg, and K. H. Johansson, "On the exact solution to a smart grid cyber-security analysis problem, " IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 856-865, Jun. 2013.
    • (2013) IEEE Trans. Smart Grid , vol.4 , Issue.2 , pp. 856-865
    • Sou, K.C.1    Sandberg, H.2    Johansson, K.H.3
  • 13
    • 84902302956 scopus 로고    scopus 로고
    • Fundamental limits of cyberphysical security in smart power grids
    • Florence, Italy, Dec.
    • Y. Zhao, A. Goldsmith, and H. V. Poor, "Fundamental limits of cyberphysical security in smart power grids, " in Proc. 52nd IEEE Conf. Decision Control, Florence, Italy, Dec. 2013, pp. 200-205.
    • (2013) Proc. 52nd IEEE Conf. Decision Control , pp. 200-205
    • Zhao, Y.1    Goldsmith, A.2    Poor, H.V.3
  • 14
    • 84872133588 scopus 로고    scopus 로고
    • Bad data injection in smart grid: Attack and defense mechanisms
    • Jan.
    • Y. Huang et al., "Bad data injection in smart grid: Attack and defense mechanisms, " IEEE Commun. Mag., vol. 51, no. 1, pp. 27-33, Jan. 2013.
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.1 , pp. 27-33
    • Huang, Y.1
  • 16
    • 85027932768 scopus 로고    scopus 로고
    • Detecting false data injection attacks in AC state estimation
    • Sep.
    • G. Chaojun, P. Jirutitijaroen, and M. Motani, "Detecting false data injection attacks in AC state estimation, " IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2476-2483, Sep. 2015.
    • (2015) IEEE Trans. Smart Grid , vol.6 , Issue.5 , pp. 2476-2483
    • Chaojun, G.1    Jirutitijaroen, P.2    Motani, M.3
  • 17
    • 84960393299 scopus 로고    scopus 로고
    • Quickest detection of false data injection attack in wide-area smart grids
    • Nov.
    • S. Li, Y. Yilmaz, and X. Wang, "Quickest detection of false data injection attack in wide-area smart grids, " IEEE Trans. Smart Grid, vol. 6, no. 6, pp. 2725-2735, Nov. 2015.
    • (2015) IEEE Trans. Smart Grid , vol.6 , Issue.6 , pp. 2725-2735
    • Li, S.1    Yilmaz, Y.2    Wang, X.3
  • 18
    • 84896819685 scopus 로고    scopus 로고
    • Detecting false data injection attacks on power grid by sparse optimization
    • Mar.
    • L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, and Z. Han, "Detecting false data injection attacks on power grid by sparse optimization, " IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 612-621, Mar. 2014.
    • (2014) IEEE Trans. Smart Grid , vol.5 , Issue.2 , pp. 612-621
    • Liu, L.1    Esmalifalak, M.2    Ding, Q.3    Emesih, V.A.4    Han, Z.5
  • 19
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • Jun.
    • Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems, " IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.2 , pp. 382-390
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 20
    • 85027933146 scopus 로고    scopus 로고
    • Modeling of local false data injection attacks with reduced network information
    • Jul.
    • X. Liu, Z. Bao, D. Lu, and Z. Li, "Modeling of local false data injection attacks with reduced network information, " IEEE Trans. Smart Grid, vol. 6, no. 4, pp. 1686-1696, Jul. 2015.
    • (2015) IEEE Trans. Smart Grid , vol.6 , Issue.4 , pp. 1686-1696
    • Liu, X.1    Bao, Z.2    Lu, D.3    Li, Z.4
  • 22
    • 85027935614 scopus 로고    scopus 로고
    • Blind false data injection attack using PCA approximation method in smart grid
    • May
    • Z. H. Yu and W. L. Chin, "Blind false data injection attack using PCA approximation method in smart grid, " IEEE Trans. Smart Grid, vol. 6, no. 3, pp. 1219-1226, May 2015.
    • (2015) IEEE Trans. Smart Grid , vol.6 , Issue.3 , pp. 1219-1226
    • Yu, Z.H.1    Chin, W.L.2
  • 23
    • 39749180953 scopus 로고    scopus 로고
    • Identification of interacting bad data in the framework of the weighted least square method
    • May
    • G. P. Granelli and M. Montagna, "Identification of interacting bad data in the framework of the weighted least square method, " Electr. Power Syst. Res., vol. 78, no. 5, pp. 806-814, May 2008.
    • (2008) Electr. Power Syst. Res. , vol.78 , Issue.5 , pp. 806-814
    • Granelli, G.P.1    Montagna, M.2
  • 24
    • 80052043780 scopus 로고    scopus 로고
    • Communication requirement for reliable and secure state estimation and control in smart grid
    • Sep.
    • H. Li, L. Lai, andW. Zhang, "Communication requirement for reliable and secure state estimation and control in smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 3, pp. 476-486, Sep. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.3 , pp. 476-486
    • Li, H.1    Lai, L.2    Zhang, W.3
  • 25
    • 68649096448 scopus 로고    scopus 로고
    • Tensor decompositions and applications
    • T. G. Kolda and B. W. Bader, "Tensor decompositions and applications, " SIAM Rev., vol. 51, no. 3, pp. 455-500, 2009.
    • (2009) SIAM Rev. , vol.51 , Issue.3 , pp. 455-500
    • Kolda, T.G.1    Bader, B.W.2
  • 26
    • 70349656252 scopus 로고    scopus 로고
    • Tensor decompositions, alternating least squares and other tales
    • P. Comon, X. Luciani, and A. L. F. de Almeida, "Tensor decompositions, alternating least squares and other tales, " J. Chemometrics, vol. 23, nos. 7-8, pp. 393-405, 2009.
    • (2009) J. Chemometrics , vol.23 , Issue.7-8 , pp. 393-405
    • Comon, P.1    Luciani, X.2    De Almeida, A.L.F.3
  • 27
    • 34249802620 scopus 로고    scopus 로고
    • Fourth-order cumulantbased blind Identification of underdetermined mixtures
    • Jun.
    • L. D. Lathauwer, J. Castaing, and J. F. Cardoso, "Fourth-order cumulantbased blind Identification of underdetermined mixtures, " IEEE Trans. Signal Process., vol. 55, no. 6, pp. 2965-2973, Jun. 2007.
    • (2007) IEEE Trans. Signal Process. , vol.55 , Issue.6 , pp. 2965-2973
    • Lathauwer, L.D.1    Castaing, J.2    Cardoso, J.F.3
  • 28
    • 0031102203 scopus 로고    scopus 로고
    • Sparse signal reconstruction from limited data using FOCUSS: A re-weighted minimum norm algorithm
    • Mar.
    • I. F. Gorodnitsky and B. D. Rao, "Sparse signal reconstruction from limited data using FOCUSS: A re-weighted minimum norm algorithm, " IEEE Trans. Signal Process., vol. 45, no. 3, pp. 600-616, Mar. 1997.
    • (1997) IEEE Trans. Signal Process. , vol.45 , Issue.3 , pp. 600-616
    • Gorodnitsky, I.F.1    Rao, B.D.2
  • 29
    • 58649101394 scopus 로고    scopus 로고
    • Improved FOCUSS method with conjugate gradient iterations
    • Jan.
    • Z. He et al., "Improved FOCUSS method with conjugate gradient iterations, " IEEE Trans. Signal Process., vol. 57, no. 1, pp. 399-404, Jan. 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.1 , pp. 399-404
    • He, Z.1
  • 30
    • 85027949137 scopus 로고    scopus 로고
    • Convergence analysis of the FOCUSS algorithm
    • Mar.
    • K. Xie, Z. He, and A. Cichocki, "Convergence analysis of the FOCUSS algorithm, " IEEE Trans. Neural Netw. Learn. Syst., vol. 26, no. 3, pp. 601-613, Mar. 2015.
    • (2015) IEEE Trans. Neural Netw. Learn. Syst. , vol.26 , Issue.3 , pp. 601-613
    • Xie, K.1    He, Z.2    Cichocki, A.3
  • 31
    • 84855772737 scopus 로고    scopus 로고
    • University ofWashington. Apr.
    • University ofWashington. (Apr. 2011). Power Systems Test Case Archives. [Online]. Available: http://www.ee. washington. edu/research/pstca/
    • (2011) Power Systems Test Case Archives
  • 33
    • 33750405289 scopus 로고    scopus 로고
    • Security issues in SCADAnetworks
    • Oct.
    • V. M. Igure, S. A. Laughter, and R. D. Williams, "Security issues in SCADAnetworks, " Comput. Secur., vol. 25, no. 7, pp. 498-506, Oct. 2006.
    • (2006) Comput. Secur. , vol.25 , Issue.7 , pp. 498-506
    • Igure, V.M.1    Laughter, S.A.2    Williams, R.D.3
  • 35
    • 85028297351 scopus 로고    scopus 로고
    • The N-Way Toolbox for MATLAB. [Online]. Available: http://www.models. life. ku. dk/source/nwaytoolbox/
    • The N-Way Toolbox for MATLAB


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.