基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set,then an alarm will be activated, and the potential threat is considered disclosed. The attack scenario used to assess the efficiency of the proposed anomaly detector concerns corrupted frequency sensor measurements transmitted to the automatic generation control unit of a compromised control area. Simulation studies highlight the ability of a set-theoretic approach to disclose persistent and intermittent attack patterns even when they occur at the same time with changes in the power load demand.
推荐文章
基于语义的Data Cube数字水印技术
数字水印
语义
数据立方体
版权
The morphological characteristics of gully systems and watersheds in Dry-Hot Valley, SW China
Morphological characteristics
Quantitative relationships
Gully system
Watershed
Dry-Hot Valley
Data Transfer Object模式探讨
Data Transfer Object 三层应用 DataSet
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 Set-theoretic detection of data corruption attacks on cyber physical power systems
来源期刊 现代电力系统与清洁能源学报(英文) 学科 工学
关键词 Power systems LOAD frequency control Cyber-attacks Set-theoretic methods
年,卷(期) 2018,(5) 所属期刊栏目
研究方向 页码范围 872-886
页数 15页 分类号 TM76
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2018(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
Power
systems
LOAD
frequency
control
Cyber-attacks
Set-theoretic
methods
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
现代电力系统与清洁能源学报(英文)
双月刊
2196-5625
32-1884/TK
No. 19 Chengxin Aven
出版文献量(篇)
386
总下载数(次)
0
总被引数(次)
0
论文1v1指导