메뉴 건너뛰기




Volumn 8, Issue 5, 2017, Pages 2505-2516

Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism

Author keywords

deep learning; deep learning based identification (DLBI) scheme; False data injection (FDI) attacks; state vector estimator (SVE); supervisory control and data acquisition (SCADA)

Indexed keywords

DATA ACQUISITION; DEEP LEARNING; ELECTRIC POWER TRANSMISSION NETWORKS; NETWORK SECURITY; OPTIMIZATION; SECURITY OF DATA; SIGNAL DETECTION; SMART POWER GRIDS;

EID: 85029494690     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2017.2703842     Document Type: Article
Times cited : (680)

References (42)
  • 1
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • May
    • Y. Liu, P. Ning, M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " ACM Trans. Inf. Syst. Security, vol. 14, no. 1, pp. 1-33, May 2011.
    • (2011) ACM Trans. Inf. Syst. Security , vol.14 , Issue.1 , pp. 1-33
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 3
    • 84963812202 scopus 로고    scopus 로고
    • The determinants of electricity theft: An empirical analysis of Indian states
    • V. Gaur and E. Gupta, "The determinants of electricity theft: An empirical analysis of Indian states, " Energy Policy, vol. 93, pp. 127-136, 2016.
    • (2016) Energy Policy , vol.93 , pp. 127-136
    • Gaur, V.1    Gupta, E.2
  • 4
    • 84949537031 scopus 로고    scopus 로고
    • The causes of electricity theft: An econometric analysis of the case of Turkey
    • Dec.
    • Ç. Yurtseven, "The causes of electricity theft: An econometric analysis of the case of Turkey, " Utilities Policy, vol. 37, pp. 70-78, Dec. 2015.
    • (2015) Utilities Policy , vol.37 , pp. 70-78
    • Yurtseven, C.1
  • 5
    • 85029469381 scopus 로고    scopus 로고
    • Detection of power theft in HT consumer using SCADA interfacing with GIS system
    • Jul.
    • S. Mathankumar and P. Loganathan, "Detection of power theft in HT consumer using SCADA interfacing with GIS system, " Int. J. Res. Eng. Appl. Sci., vol. 5, no. 7, pp. 1-12, Jul. 2015.
    • (2015) Int. J. Res. Eng. Appl. Sci. , vol.5 , Issue.7 , pp. 1-12
    • Mathankumar, S.1    Loganathan, P.2
  • 6
    • 84894537318 scopus 로고    scopus 로고
    • On false data-injection attacks against power system state estimation: Modeling and countermeasures
    • Mar.
    • Q. Yang et al., "On false data-injection attacks against power system state estimation: Modeling and countermeasures, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 717-729, Mar. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.3 , pp. 717-729
    • Yang, Q.1
  • 8
    • 84896819685 scopus 로고    scopus 로고
    • Detecting false data injection attacks on power grid by sparse optimization
    • Mar.
    • L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, Z. Han, "Detecting false data injection attacks on power grid by sparse optimization, " IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 612-621, Mar. 2014.
    • (2014) IEEE Trans. Smart Grid , vol.5 , Issue.2 , pp. 612-621
    • Liu, L.1    Esmalifalak, M.2    Ding, Q.3    Emesih, V.A.4    Han, Z.5
  • 10
    • 63049100877 scopus 로고    scopus 로고
    • Detection of abnormalities and electricity theft using genetic support vector machines
    • Nov.
    • J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, A. M. Mohammad, "Detection of abnormalities and electricity theft using genetic support vector machines, " in Proc. IEEE Region Conf. TENCON, Nov. 2008, pp. 1-6.
    • (2008) Proc. IEEE Region Conf. TENCON , pp. 1-6
    • Nagi, J.1    Yap, K.S.2    Tiong, S.K.3    Ahmed, S.K.4    Mohammad, A.M.5
  • 11
    • 77950188492 scopus 로고    scopus 로고
    • Nontechnical loss detection for metered customers in power utility using support vector machines
    • Apr.
    • J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, M. Mohamad, "Nontechnical loss detection for metered customers in power utility using support vector machines, " IEEE Trans. Power Del., vol. 25, no. 2, pp. 1162-1171, Apr. 2010.
    • (2010) IEEE Trans. Power Del. , vol.25 , Issue.2 , pp. 1162-1171
    • Nagi, J.1    Yap, K.S.2    Tiong, S.K.3    Ahmed, S.K.4    Mohamad, M.5
  • 13
    • 79953193105 scopus 로고    scopus 로고
    • Improving SVM-based nontechnical loss detection in power utility using the fuzzy inference system
    • Apr.
    • J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, F. Nagi, "Improving SVM-based nontechnical loss detection in power utility using the fuzzy inference system, " IEEE Trans. Power Del., vol. 26, no. 2, pp. 1284-1285, Apr. 2011.
    • (2011) IEEE Trans. Power Del. , vol.26 , Issue.2 , pp. 1284-1285
    • Nagi, J.1    Yap, K.S.2    Tiong, S.K.3    Ahmed, S.K.4    Nagi, F.5
  • 15
    • 33745805403 scopus 로고    scopus 로고
    • A fast learning algorithm for deep belief nets
    • G. E. Hinton, S. Osindero, Y.-W. Teh, "A fast learning algorithm for deep belief nets, " Neural Comput., vol. 18, no. 7, pp. 1527-1554, 2006.
    • (2006) Neural Comput. , vol.18 , Issue.7 , pp. 1527-1554
    • Hinton, G.E.1    Osindero, S.2    Teh, Y.-W.3
  • 16
    • 84868322815 scopus 로고    scopus 로고
    • Robust generation of dynamical patterns in human motion by a deep belief nets
    • Nov.
    • S. Sukhbaatar, T. Makino, K. Aihara, T. Chikayama, "Robust generation of dynamical patterns in human motion by a deep belief nets, " J. Mach. Learn. Res., vol. 20, pp. 231-246, Nov. 2011.
    • (2011) J. Mach. Learn. Res. , vol.20 , pp. 231-246
    • Sukhbaatar, S.1    Makino, T.2    Aihara, K.3    Chikayama, T.4
  • 17
    • 84865595751 scopus 로고    scopus 로고
    • An introduction to restricted Boltzmann machines
    • in Proc. CIARP Buenos Aires, Argentina
    • A. Fischer and C. Igel, "An introduction to restricted Boltzmann machines, " in Proc. CIARP, vol. LNCS 7441. Buenos Aires, Argentina, 2012, pp. 14-36.
    • (2012) LNCS , vol.7441 , pp. 14-36
    • Fischer, A.1    Igel, C.2
  • 20
    • 84998882027 scopus 로고    scopus 로고
    • A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids
    • J. Wei and G. J. Mendis, "A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids, " in Proc. Cyber Phys. Syst. Week (CPS), Vienna, Austria, 2016, pp. 1-6.
    • (2016) Proc. Cyber Phys. Syst. Week (CPS), Vienna, Austria , pp. 1-6
    • Wei, J.1    Mendis, G.J.2
  • 25
    • 85048918165 scopus 로고    scopus 로고
    • Fixed pitch wind turbine-based permanent magnet synchronous machine model for wind energy conversion systems
    • J. Gupta and A. Kumar, "Fixed pitch wind turbine-based permanent magnet synchronous machine model for wind energy conversion systems, " J. Eng. Technol., vol. 2, no. 1, pp. 52-62, 2012.
    • (2012) J. Eng. Technol. , vol.2 , Issue.1 , pp. 52-62
    • Gupta, J.1    Kumar, A.2
  • 27
    • 84886459953 scopus 로고    scopus 로고
    • Modeling and analysis of gridconnected inverter for PV generation
    • Dürnten, Switzerland: Trans Tech
    • N. Cao, Y. J. Cao, J. Y. Liu, "Modeling and analysis of gridconnected inverter for PV generation, " in Advanced Materials Research, vol. 760. Dürnten, Switzerland: Trans Tech, 2013, pp. 451-456.
    • (2013) Advanced Materials Research , vol.760 , pp. 451-456
    • Cao, N.1    Cao, Y.J.2    Liu, J.Y.3
  • 29
    • 33244493104 scopus 로고    scopus 로고
    • Modeling of the wind turbine with a doubly fed induction generator for grid integration studies
    • Mar.
    • Y. Lei, A. Mullane, G. Lightbody, R. Yacamini, "Modeling of the wind turbine with a doubly fed induction generator for grid integration studies, " IEEE Trans. Energy Convers., vol. 21, no. 1, pp. 257-264, Mar. 2006.
    • (2006) IEEE Trans. Energy Convers. , vol.21 , Issue.1 , pp. 257-264
    • Lei, Y.1    Mullane, A.2    Lightbody, G.3    Yacamini, R.4
  • 32
  • 34
    • 84864299950 scopus 로고    scopus 로고
    • Brief introduction of back propagation (BP) neural network algorithm and its improvement
    • Heidelberg, Germany: Springer
    • J. Li, J.-H. Cheng, J.-Y. Shi, F. Huang, "Brief introduction of back propagation (BP) neural network algorithm and its improvement, " in Advances in Computer Science and Information Engineering, Heidelberg, Germany: Springer, 2012, pp. 553-558.
    • (2012) Advances in Computer Science and Information Engineering , pp. 553-558
    • Li, J.1    Cheng, J.-H.2    Shi, J.-Y.3    Huang, F.4
  • 37
    • 0034289986 scopus 로고    scopus 로고
    • STATCOM control for power system voltage control applications
    • Oct.
    • P. Rao, M. L. Crow, Z. Yang, "STATCOM control for power system voltage control applications, " IEEE Trans. Power Del., vol. 15, no. 4, pp. 1311-1317, Oct. 2000.
    • (2000) IEEE Trans. Power Del. , vol.15 , Issue.4 , pp. 1311-1317
    • Rao, P.1    Crow, M.L.2    Yang, Z.3
  • 41
    • 0032592961 scopus 로고    scopus 로고
    • The IEEE reliability test system-1996. A report prepared by the reliability test system task force of the application of probability methods subcommittee
    • Aug.
    • C. Grigg et al., "The IEEE reliability test system-1996. A report prepared by the reliability test system task force of the application of probability methods subcommittee, " IEEE Trans. Power Syst., vol. 14, no. 3, pp. 1010-1020, Aug. 1999.
    • (1999) IEEE Trans. Power Syst. , vol.14 , Issue.3 , pp. 1010-1020
    • Grigg, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.