Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter

By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical mo...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on control of network systems Vol. 1; no. 4; pp. 370 - 379
Main Authors Manandhar, Kebina, Xiaojun Cao, Fei Hu, Yao Liu
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.12.2014
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid. Our framework adopts the Kalman filter to estimate the variables of a wide range of state processes in the model. The estimates from the Kalman filter and the system readings are then fed into the χ 2 -detector or the proposed Euclidean detector. The χ 2 -detector is a proven effective exploratory method used with the Kalman filter for the measurement of the relationship between dependent variables and a series of predictor variables. The χ 2 -detector can detect system faults/attacks, such as DoS attack, short-term, and long-term random attacks. However, the studies show that the χ 2 -detector is unable to detect the statistically derived false data-injection attack. To overcome this limitation, we prove that the Euclidean detector can effectively detect such a sophisticated injection attack.
AbstractList By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid. Our framework adopts the Kalman filter to estimate the variables of a wide range of state processes in the model. The estimates from the Kalman filter and the system readings are then fed into the χ 2 -detector or the proposed Euclidean detector. The χ 2 -detector is a proven effective exploratory method used with the Kalman filter for the measurement of the relationship between dependent variables and a series of predictor variables. The χ 2 -detector can detect system faults/attacks, such as DoS attack, short-term, and long-term random attacks. However, the studies show that the χ 2 -detector is unable to detect the statistically derived false data-injection attack. To overcome this limitation, we prove that the Euclidean detector can effectively detect such a sophisticated injection attack.
By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid. Our framework adopts the Kalman filter to estimate the variables of a wide range of state processes in the model. The estimates from the Kalman filter and the system readings are then fed into the [Formula Omitted]-detector or the proposed Euclidean detector. The [Formula Omitted]-detector is a proven effective exploratory method used with the Kalman filter for the measurement of the relationship between dependent variables and a series of predictor variables. The [Formula Omitted]-detector can detect system faults/attacks, such as DoS attack, short-term, and long-term random attacks. However, the studies show that the [Formula Omitted]-detector is unable to detect the statistically derived false data-injection attack. To overcome this limitation, we prove that the Euclidean detector can effectively detect such a sophisticated injection attack.
Author Fei Hu
Xiaojun Cao
Yao Liu
Manandhar, Kebina
Author_xml – sequence: 1
  givenname: Kebina
  surname: Manandhar
  fullname: Manandhar, Kebina
  email: kmanandhar1@cs.gsu.edu
  organization: Dept. of Comput. Sci., Georgia State Univ., Atlanta, GA, USA
– sequence: 2
  surname: Xiaojun Cao
  fullname: Xiaojun Cao
  email: cao@cs.gsu.edu
  organization: Dept. of Comput. Sci., Georgia State Univ., Atlanta, GA, USA
– sequence: 3
  surname: Fei Hu
  fullname: Fei Hu
  email: fei@eng.ua.edu
  organization: Dept. of Electr. & Comput. Eng., Univ. of Alabama, Tuscaloosa, AL, USA
– sequence: 4
  surname: Yao Liu
  fullname: Yao Liu
  email: yliu@cse.usf.edu
  organization: Dept. of Comput. Sci. & Eng., Univ. of South Florida, Tampa, FL, USA
BookMark eNpNkM1OAjEURhuDiYg8gHHTxDXY32lnSUCQSHQBrJvS6ZDBoYNtZ-Hb28kQ4-r2tue7vTn3YOAaZwF4xGiKMcpfdvOP7ZQgzKaEcsEpvgFDQgmfcCnQ4N_5DoxDOCGEMOGpp0NwXNhoTawaB5sSLnVbxwC1K-AsRm2-Alw7U7dF5Y7psQ4WLnTU6fJ0DfUYrBzcnrWPcOWrAu5Dx7_r-qwdXFZ1tP4B3JZdfnytI7Bfvu7mb5PN52o9n20mhiERJzZHkuqDZIwSRIxGWXagGlnNDCqJ1bgQXBxyqktpiCGEMsZsIbmQmmQmL-gIPPdzL775bm2I6tS03qUvFRY8pyxZkInCPWV8E4K3pbr4Ku3_ozBSnVLVKVWdUnVVmjJPfaay1v7xmcxFnrb9Be3Acu4
CODEN ITCNAY
CitedBy_id crossref_primary_10_1049_stg2_12141
crossref_primary_10_1049_cth2_12172
crossref_primary_10_1109_TPEL_2020_3014258
crossref_primary_10_1109_JIOT_2020_2966221
crossref_primary_10_1016_j_ijepes_2020_105968
crossref_primary_10_1109_LSP_2024_3356823
crossref_primary_10_1016_j_automatica_2021_109869
crossref_primary_10_1016_j_jfranklin_2024_107000
crossref_primary_10_1049_iet_gtd_2018_5139
crossref_primary_10_1016_j_hspr_2022_12_001
crossref_primary_10_1186_s41601_023_00287_w
crossref_primary_10_1145_3584985
crossref_primary_10_1109_ACCESS_2021_3065268
crossref_primary_10_1016_j_scs_2021_103370
crossref_primary_10_1016_j_iotcps_2023_01_004
crossref_primary_10_1109_TAC_2019_2891405
crossref_primary_10_1016_j_jfranklin_2018_11_062
crossref_primary_10_1109_TSG_2021_3121009
crossref_primary_10_3390_electronics7120370
crossref_primary_10_1007_s40313_019_00452_3
crossref_primary_10_1109_TIE_2020_2972466
crossref_primary_10_1016_j_epsr_2020_106602
crossref_primary_10_1002_cpe_5956
crossref_primary_10_1002_rnc_4840
crossref_primary_10_1109_ACCESS_2021_3055229
crossref_primary_10_1016_j_nanoen_2020_105275
crossref_primary_10_1109_TSIPN_2021_3134097
crossref_primary_10_1109_TSG_2017_2679122
crossref_primary_10_1016_j_automatica_2024_111523
crossref_primary_10_1016_j_ins_2020_12_027
crossref_primary_10_1016_j_apenergy_2021_116432
crossref_primary_10_1016_j_epsr_2023_109834
crossref_primary_10_1109_MIE_2021_3059996
crossref_primary_10_1088_1742_6596_2788_1_012029
crossref_primary_10_1049_iet_cta_2017_0629
crossref_primary_10_1109_TIE_2023_3312433
crossref_primary_10_3390_app12136498
crossref_primary_10_1109_TCNS_2022_3141026
crossref_primary_10_1016_j_neucom_2018_04_037
crossref_primary_10_3390_app11125706
crossref_primary_10_1109_ACCESS_2022_3227076
crossref_primary_10_1049_gtd2_13057
crossref_primary_10_1016_j_sysconle_2021_104938
crossref_primary_10_1109_TSG_2021_3137835
crossref_primary_10_1016_j_jss_2018_12_006
crossref_primary_10_1109_TPWRS_2022_3221291
crossref_primary_10_1109_TCNS_2019_2935697
crossref_primary_10_1016_j_jnca_2019_02_020
crossref_primary_10_1016_j_ins_2023_119759
crossref_primary_10_1109_TIM_2022_3186360
crossref_primary_10_1109_TPEL_2021_3114990
crossref_primary_10_1002_acs_3674
crossref_primary_10_1109_TCNS_2020_3029165
crossref_primary_10_1177_01423312231171473
crossref_primary_10_1049_iet_ifs_2016_0203
crossref_primary_10_1109_JIOT_2020_2983911
crossref_primary_10_1109_TSG_2020_2971148
crossref_primary_10_3390_app10165649
crossref_primary_10_1049_iet_cta_2015_1147
crossref_primary_10_1109_TPEL_2021_3055215
crossref_primary_10_3390_electronics7060089
crossref_primary_10_1109_TSG_2018_2832544
crossref_primary_10_1109_JSEN_2017_2661247
crossref_primary_10_1016_j_ijepes_2022_108599
crossref_primary_10_1109_ACCESS_2018_2873615
crossref_primary_10_1109_TSG_2022_3147693
crossref_primary_10_1109_TII_2020_2999571
crossref_primary_10_1109_TNSE_2024_3370649
crossref_primary_10_1016_j_epsr_2020_106418
crossref_primary_10_1016_j_egyr_2024_02_010
crossref_primary_10_1007_s00500_020_05557_5
crossref_primary_10_1109_TCYB_2019_2912939
crossref_primary_10_1109_TPEL_2020_2995584
crossref_primary_10_1016_j_engappai_2020_104150
crossref_primary_10_1109_TII_2022_3151748
crossref_primary_10_1016_j_automatica_2018_09_003
crossref_primary_10_1016_j_jisa_2021_103054
crossref_primary_10_1109_TSG_2019_2961561
crossref_primary_10_1109_JIOT_2019_2931349
crossref_primary_10_1080_23335777_2018_1484818
crossref_primary_10_1016_j_compind_2022_103609
crossref_primary_10_1109_ACCESS_2021_3115819
crossref_primary_10_1109_TIE_2019_2944091
crossref_primary_10_1109_TSG_2016_2604120
crossref_primary_10_1016_j_energy_2022_125865
crossref_primary_10_1109_TII_2019_2941748
crossref_primary_10_1145_3592797
crossref_primary_10_1109_TAES_2021_3117664
crossref_primary_10_1007_s40031_023_00960_6
crossref_primary_10_1109_TSG_2018_2881562
crossref_primary_10_1109_TSG_2022_3204796
crossref_primary_10_1109_TIE_2016_2535119
crossref_primary_10_1155_2024_9257508
crossref_primary_10_1002_rnc_4945
crossref_primary_10_1109_JAS_2024_124257
crossref_primary_10_1002_asjc_2783
crossref_primary_10_1007_s00202_024_02277_z
crossref_primary_10_1109_ACCESS_2017_2728681
crossref_primary_10_1002_asjc_2543
crossref_primary_10_1016_j_apenergy_2019_113703
crossref_primary_10_1080_00207179_2023_2175409
crossref_primary_10_1109_TVT_2022_3170725
crossref_primary_10_1109_TRO_2023_3275875
crossref_primary_10_1109_TSG_2020_3017562
crossref_primary_10_1109_ACCESS_2024_3368876
crossref_primary_10_1109_TSG_2020_3005238
crossref_primary_10_1109_TSG_2019_2958014
crossref_primary_10_1109_ACCESS_2019_2902910
crossref_primary_10_1109_TSG_2020_2986704
crossref_primary_10_1016_j_cose_2021_102265
crossref_primary_10_1049_iet_cps_2017_0013
crossref_primary_10_1109_JIOT_2020_2966672
crossref_primary_10_1016_j_sysarc_2019_101705
crossref_primary_10_1049_iet_cps_2017_0017
crossref_primary_10_1109_JESTIE_2022_3227005
crossref_primary_10_1016_j_automatica_2018_11_048
crossref_primary_10_1016_j_simpat_2021_102272
crossref_primary_10_1109_JSTSP_2018_2840517
crossref_primary_10_1109_TSG_2017_2721382
crossref_primary_10_1155_2018_7204939
crossref_primary_10_1002_acs_3001
crossref_primary_10_1109_JPROC_2022_3161053
crossref_primary_10_1016_j_ijepes_2021_106819
crossref_primary_10_1038_s41598_021_96769_8
crossref_primary_10_3390_e24020154
crossref_primary_10_1109_TSMC_2022_3212391
crossref_primary_10_1109_TCYB_2021_3108884
crossref_primary_10_31127_tuje_640282
crossref_primary_10_1016_j_apenergy_2021_118425
crossref_primary_10_1049_iet_wss_2019_0134
crossref_primary_10_1109_TII_2022_3174159
crossref_primary_10_1109_TMECH_2022_3201875
crossref_primary_10_1109_TSG_2020_2979160
crossref_primary_10_1109_COMST_2020_3023963
crossref_primary_10_3390_s22072644
crossref_primary_10_1109_JESTPE_2019_2948216
crossref_primary_10_1016_j_neucom_2021_03_087
crossref_primary_10_1109_TSIPN_2021_3122289
crossref_primary_10_1109_TSMC_2018_2884952
crossref_primary_10_1016_j_apenergy_2023_122283
crossref_primary_10_1109_TIFS_2022_3146078
crossref_primary_10_1109_TSG_2020_2992118
crossref_primary_10_1016_j_ijepes_2023_109062
crossref_primary_10_1016_j_segan_2024_101335
crossref_primary_10_1016_j_isatra_2023_03_044
crossref_primary_10_1109_TPEL_2023_3263728
crossref_primary_10_1109_ACCESS_2021_3051155
crossref_primary_10_1016_j_compchemeng_2023_108359
crossref_primary_10_1109_TCYB_2019_2903411
crossref_primary_10_2139_ssrn_3871018
crossref_primary_10_1109_ACCESS_2019_2963502
crossref_primary_10_1109_TNNLS_2021_3061137
crossref_primary_10_1109_TCYB_2022_3225236
crossref_primary_10_1016_j_jfranklin_2018_04_001
crossref_primary_10_1109_JSEN_2020_3027778
crossref_primary_10_1002_acs_3032
crossref_primary_10_1109_ACCESS_2020_3047814
crossref_primary_10_1109_JIOT_2022_3181698
crossref_primary_10_1109_TCYB_2020_2969320
crossref_primary_10_1109_TSG_2019_2949998
crossref_primary_10_1016_j_ins_2024_121093
crossref_primary_10_1109_TSG_2020_3014311
crossref_primary_10_1016_j_jnca_2021_103178
crossref_primary_10_1109_TITS_2019_2934481
crossref_primary_10_1016_j_neucom_2017_10_009
crossref_primary_10_3390_en16186678
crossref_primary_10_1016_j_ijepes_2019_03_008
crossref_primary_10_3390_s19071542
crossref_primary_10_1109_TCNS_2016_2614099
crossref_primary_10_1016_j_jisa_2020_102518
crossref_primary_10_1016_j_jisa_2021_102802
crossref_primary_10_1049_cth2_12405
crossref_primary_10_1016_j_ijepes_2022_108083
crossref_primary_10_1016_j_epsr_2021_107510
crossref_primary_10_1109_TSIPN_2022_3230562
crossref_primary_10_1016_j_neucom_2018_09_094
crossref_primary_10_1002_rnc_4666
crossref_primary_10_1016_j_ins_2023_118971
crossref_primary_10_1080_00207721_2019_1597944
crossref_primary_10_1007_s42835_021_00923_1
crossref_primary_10_1049_iet_cta_2020_0867
crossref_primary_10_1016_j_net_2021_12_011
crossref_primary_10_1016_j_isatra_2021_01_036
crossref_primary_10_1109_TCNS_2021_3113265
crossref_primary_10_1109_ACCESS_2019_2929785
crossref_primary_10_1002_rnc_4790
crossref_primary_10_1016_j_jfranklin_2018_10_030
crossref_primary_10_1002_rnc_6717
crossref_primary_10_1109_TSMC_2023_3283414
crossref_primary_10_1016_j_ifacol_2018_12_036
crossref_primary_10_1109_TPWRS_2020_3008184
crossref_primary_10_1049_cps2_12000
crossref_primary_10_1109_ACCESS_2018_2888582
crossref_primary_10_1109_COMST_2022_3187531
crossref_primary_10_1016_j_cose_2022_103016
crossref_primary_10_1109_JESTPE_2020_2968243
crossref_primary_10_1155_2023_9071969
crossref_primary_10_1080_00207721_2023_2216274
crossref_primary_10_1109_TCNS_2019_2927594
crossref_primary_10_1049_gtd2_12178
crossref_primary_10_1109_JSYST_2017_2741483
crossref_primary_10_1109_JPROC_2020_3034595
crossref_primary_10_1016_j_measurement_2023_112565
crossref_primary_10_1016_j_dsp_2018_03_002
crossref_primary_10_1016_j_rser_2023_113752
crossref_primary_10_1109_TCNS_2021_3124887
crossref_primary_10_3390_en14164941
crossref_primary_10_1109_TSUSC_2019_2906657
crossref_primary_10_3390_electronics10161914
crossref_primary_10_1109_JAS_2023_123339
crossref_primary_10_3390_math10162852
crossref_primary_10_1109_JSYST_2020_2991258
crossref_primary_10_3390_en16135206
crossref_primary_10_1109_TITS_2021_3085196
crossref_primary_10_1002_asjc_3166
crossref_primary_10_1016_j_asoc_2021_107953
crossref_primary_10_1016_j_eng_2021_06_007
crossref_primary_10_1016_j_ifacol_2023_10_145
crossref_primary_10_1016_j_ijcip_2020_100377
crossref_primary_10_1016_j_ins_2020_08_055
crossref_primary_10_3389_fcteg_2021_734220
crossref_primary_10_1109_JIOT_2019_2916670
crossref_primary_10_3390_app122111073
crossref_primary_10_1109_ACCESS_2024_3403456
crossref_primary_10_1049_iet_stg_2019_0320
crossref_primary_10_1016_j_ijepes_2017_08_024
crossref_primary_10_1016_j_compeleceng_2024_109347
crossref_primary_10_1016_j_ins_2019_12_016
crossref_primary_10_1109_TSG_2019_2891852
crossref_primary_10_1016_j_ins_2017_08_057
crossref_primary_10_1109_ACCESS_2021_3051300
crossref_primary_10_1109_MSMC_2020_3049092
crossref_primary_10_3390_en12244625
crossref_primary_10_1109_ACCESS_2022_3194989
crossref_primary_10_1177_00202940231159115
crossref_primary_10_3390_en16052280
crossref_primary_10_1016_j_ins_2018_02_008
crossref_primary_10_4236_cn_2022_144009
crossref_primary_10_1049_iet_cps_2019_0010
crossref_primary_10_1016_j_tej_2017_04_001
crossref_primary_10_1109_TCNS_2021_3100411
crossref_primary_10_1186_s42400_023_00200_w
crossref_primary_10_1016_j_ress_2019_03_020
crossref_primary_10_1016_j_arcontrol_2019_08_002
crossref_primary_10_1016_j_pmcj_2017_04_005
crossref_primary_10_1109_JSYST_2020_2967126
crossref_primary_10_1109_TIE_2021_3080212
crossref_primary_10_1016_j_ifacol_2020_12_297
crossref_primary_10_1016_j_isatra_2020_10_002
crossref_primary_10_1109_ACCESS_2023_3279821
crossref_primary_10_1109_JSEN_2020_3039918
crossref_primary_10_1007_s40436_017_0189_2
crossref_primary_10_1016_j_jfranklin_2019_01_009
crossref_primary_10_3389_fenrg_2022_961488
crossref_primary_10_1109_TSG_2021_3069331
crossref_primary_10_3389_fenrg_2022_914132
crossref_primary_10_1016_j_segan_2022_100702
crossref_primary_10_33581_1561_4085_2020_23_3_270_279
crossref_primary_10_1109_TII_2021_3106009
crossref_primary_10_1002_rnc_6556
crossref_primary_10_1016_j_ijepes_2023_109682
crossref_primary_10_1109_ACCESS_2020_2993233
crossref_primary_10_1109_TSMC_2023_3258412
crossref_primary_10_1016_j_cosrev_2021_100452
crossref_primary_10_1016_j_heliyon_2020_e04799
crossref_primary_10_1109_TII_2018_2825243
crossref_primary_10_3390_pr10071299
crossref_primary_10_1109_JIOT_2021_3113900
crossref_primary_10_1002_2050_7038_12661
crossref_primary_10_3390_en14010027
crossref_primary_10_1049_iet_cps_2016_0019
crossref_primary_10_3390_en12244667
crossref_primary_10_1049_tje2_12324
crossref_primary_10_1109_TIM_2023_3331398
crossref_primary_10_1109_TSG_2022_3202926
crossref_primary_10_1109_TCNS_2021_3089146
crossref_primary_10_1080_00207721_2021_1931727
crossref_primary_10_1109_TIA_2023_3287152
crossref_primary_10_1007_s00202_024_02520_7
crossref_primary_10_1016_j_cose_2020_101899
crossref_primary_10_1109_JESTPE_2021_3111728
crossref_primary_10_1016_j_ins_2017_07_029
crossref_primary_10_1016_j_segan_2024_101374
crossref_primary_10_3390_sym15122104
crossref_primary_10_1109_ACCESS_2024_3353289
crossref_primary_10_1049_rpg2_12753
crossref_primary_10_1049_rpg2_12875
crossref_primary_10_3390_en13236269
crossref_primary_10_1049_iet_cta_2016_1313
crossref_primary_10_1109_TCNS_2022_3145285
crossref_primary_10_25130_tjes_30_2_11
crossref_primary_10_1109_JIOT_2020_3005926
crossref_primary_10_1016_j_ijcip_2018_06_001
crossref_primary_10_1109_TSG_2021_3109628
crossref_primary_10_1007_s11768_023_00141_2
crossref_primary_10_1155_2019_7280474
crossref_primary_10_1109_MIE_2019_2958039
crossref_primary_10_1016_j_segan_2024_101364
crossref_primary_10_1186_s43067_022_00042_5
crossref_primary_10_1109_TCYB_2020_2998333
crossref_primary_10_1109_TSMC_2020_2963888
crossref_primary_10_1016_j_cja_2021_06_010
crossref_primary_10_1109_JESTPE_2019_2937800
crossref_primary_10_3390_app11125458
crossref_primary_10_1109_JSEN_2019_2902357
crossref_primary_10_3390_en13071820
crossref_primary_10_1109_ACCESS_2023_3292059
crossref_primary_10_1109_TIA_2022_3159314
crossref_primary_10_3390_su14116407
crossref_primary_10_1109_TNSE_2023_3245214
crossref_primary_10_1016_j_jfranklin_2019_02_011
crossref_primary_10_1109_TII_2019_2952067
crossref_primary_10_1109_TIFS_2018_2854745
crossref_primary_10_3390_electronics13112177
crossref_primary_10_1109_ACCESS_2019_2922410
crossref_primary_10_1016_j_eswa_2016_04_006
crossref_primary_10_1177_01423312241239213
crossref_primary_10_1080_23307706_2022_2139299
crossref_primary_10_1109_JESTIE_2023_3327051
crossref_primary_10_3390_s20113092
crossref_primary_10_1016_j_ifacol_2017_08_556
crossref_primary_10_1109_TSG_2019_2892423
crossref_primary_10_1016_j_ejcon_2018_11_004
crossref_primary_10_1109_TSG_2015_2427380
crossref_primary_10_3390_electronics9091513
crossref_primary_10_1155_2023_6098519
crossref_primary_10_1002_rnc_3814
crossref_primary_10_1016_j_hspr_2023_01_004
crossref_primary_10_1109_LCSYS_2020_3048098
crossref_primary_10_1109_TSIPN_2020_3046220
crossref_primary_10_3390_jmse8050305
crossref_primary_10_1109_TIFS_2018_2800908
crossref_primary_10_1109_JIOT_2022_3200127
crossref_primary_10_1109_TNSE_2022_3199881
crossref_primary_10_1016_j_ijepes_2022_108506
crossref_primary_10_1109_ACCESS_2020_3037337
crossref_primary_10_1109_ACCESS_2019_2939089
crossref_primary_10_1371_journal_pone_0262463
crossref_primary_10_1016_j_egyr_2021_01_045
crossref_primary_10_1109_ACCESS_2020_2999585
crossref_primary_10_1016_j_jfranklin_2022_07_050
crossref_primary_10_1109_TCYB_2019_2944956
crossref_primary_10_1016_j_ijepes_2022_108877
crossref_primary_10_2139_ssrn_4102930
crossref_primary_10_1109_ACCESS_2020_3016826
crossref_primary_10_1109_JIOT_2017_2787962
crossref_primary_10_1016_j_ijcip_2022_100508
crossref_primary_10_1109_TPDS_2015_2388479
crossref_primary_10_1016_j_fraope_2024_100081
crossref_primary_10_1109_TSG_2023_3309530
crossref_primary_10_1049_iet_cta_2017_0249
crossref_primary_10_1109_TII_2020_2972809
crossref_primary_10_1109_TPWRS_2023_3325219
crossref_primary_10_1109_TCNS_2022_3229774
crossref_primary_10_1109_TPWRS_2023_3234202
crossref_primary_10_1007_s00202_021_01278_6
crossref_primary_10_1016_j_comcom_2022_02_022
crossref_primary_10_1109_JIOT_2020_3007155
crossref_primary_10_1016_j_automatica_2021_110091
crossref_primary_10_1109_TPEL_2022_3147466
crossref_primary_10_1016_j_eswa_2017_05_013
crossref_primary_10_1109_TPEL_2021_3053845
crossref_primary_10_1109_ACCESS_2020_2978113
crossref_primary_10_1109_TSG_2020_3010510
crossref_primary_10_1007_s12555_023_0769_9
crossref_primary_10_1109_TSG_2023_3256480
crossref_primary_10_1109_TCYB_2019_2915124
crossref_primary_10_1109_TSG_2020_2984266
crossref_primary_10_1109_TII_2017_2656905
crossref_primary_10_1016_j_cherd_2021_09_016
crossref_primary_10_3390_en14051380
crossref_primary_10_1016_j_isatra_2022_06_015
crossref_primary_10_1049_gtd2_12517
crossref_primary_10_1109_TNNLS_2022_3230056
crossref_primary_10_1109_OJCS_2022_3199755
crossref_primary_10_1109_TCNS_2016_2573039
crossref_primary_10_1016_j_apenergy_2024_122736
crossref_primary_10_1080_00207721_2024_2351056
crossref_primary_10_1109_TVT_2020_2980137
crossref_primary_10_1109_JETCAS_2020_3046781
crossref_primary_10_1109_TSC_2023_3331083
crossref_primary_10_1109_TDSC_2015_2427841
crossref_primary_10_1088_1674_1056_ad20d7
crossref_primary_10_1109_TCYB_2023_3305240
crossref_primary_10_1109_JIOT_2019_2919635
crossref_primary_10_3390_en15228692
crossref_primary_10_1016_j_ress_2021_108257
crossref_primary_10_1049_gtd2_12848
crossref_primary_10_1109_JESTIE_2021_3112919
crossref_primary_10_1016_j_micpro_2020_103121
crossref_primary_10_1109_TCSI_2023_3347080
crossref_primary_10_1109_TSG_2018_2878570
crossref_primary_10_1109_TAES_2022_3182936
crossref_primary_10_1016_j_ijcip_2021_100457
crossref_primary_10_1109_ACCESS_2023_3308052
crossref_primary_10_1109_TAC_2017_2751999
crossref_primary_10_1016_j_matpr_2020_10_622
crossref_primary_10_1109_TSG_2023_3261970
crossref_primary_10_36548_jeea_2021_1_003
crossref_primary_10_1109_TCYB_2018_2843358
crossref_primary_10_1109_TSG_2023_3268245
Cites_doi 10.1109/TSG.2011.2138172
10.1109/TAC.1987.1104658
10.1145/1952982.1952995
10.1109/EPEC.2009.5420809
10.1109/TSG.2011.2161498
10.1109/TSG.2011.2160297
10.1109/TSG.2011.2159406
10.1109/TSG.2011.2159818
10.1109/TSG.2011.2159819
10.1115/1.3662552
10.1109/CDC.2010.5718158
10.1109/45.283885
10.1109/TSG.2011.2165090
10.1007/978-3-642-00602-9_3
10.1109/TSG.2011.2167354
10.1109/TPWRS.2010.2051168
10.1109/TSG.2011.2160661
10.1109/TSG.2011.2159817
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2014
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2014
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCNS.2014.2357531
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2325-5870
2372-2533
EndPage 379
ExternalDocumentID 3931747001
10_1109_TCNS_2014_2357531
6897944
Genre orig-research
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AASAJ
ABQJQ
ABVLG
AKJIK
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
RIG
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c407t-e9083ab8443202ca066b3a0ea4c0f2ea1d757b93af8c2c223444ed8578a26c9d3
IEDL.DBID RIE
ISSN 2325-5870
IngestDate Fri Sep 13 07:37:45 EDT 2024
Fri Aug 23 03:10:00 EDT 2024
Wed Jun 26 19:28:18 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords security
Kalman filter smart grid
Cyber physical system
false data injection attack
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c407t-e9083ab8443202ca066b3a0ea4c0f2ea1d757b93af8c2c223444ed8578a26c9d3
PQID 1759348708
PQPubID 2040410
PageCount 10
ParticipantIDs proquest_journals_1759348708
crossref_primary_10_1109_TCNS_2014_2357531
ieee_primary_6897944
PublicationCentury 2000
PublicationDate 2014-12-01
PublicationDateYYYYMMDD 2014-12-01
PublicationDate_xml – month: 12
  year: 2014
  text: 2014-12-01
  day: 01
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on control of network systems
PublicationTitleAbbrev TCNS
PublicationYear 2014
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref24
ref12
ref15
dorf (ref20) 2010
ref11
ref10
djerf (ref18) 2012
ref21
ref2
bobba (ref14) 2010
ref1
ref17
ref16
ref19
ref8
bi (ref13) 0
ref7
dixon (ref23) 1969; 344
ref9
ref4
ref3
ref6
ref5
mo (ref22) 0
References_xml – ident: ref7
  doi: 10.1109/TSG.2011.2138172
– ident: ref16
  doi: 10.1109/TAC.1987.1104658
– ident: ref3
  doi: 10.1145/1952982.1952995
– ident: ref15
  doi: 10.1109/EPEC.2009.5420809
– year: 2010
  ident: ref14
  article-title: Detecting false data injection attacks on dc state estimation
  publication-title: 1st Workshop Secure Control Syst (CPSWEEK)
  contributor:
    fullname: bobba
– ident: ref10
  doi: 10.1109/TSG.2011.2161498
– ident: ref9
  doi: 10.1109/TSG.2011.2160297
– volume: 344
  year: 1969
  ident: ref23
  publication-title: Introduction to Statistical Analysis
  contributor:
    fullname: dixon
– ident: ref11
  doi: 10.1109/TSG.2011.2159406
– start-page: 55
  year: 2012
  ident: ref18
  article-title: Power grid integration using kalman filtering
  publication-title: Uppsala University Signals and Systems Group
  contributor:
    fullname: djerf
– ident: ref2
  doi: 10.1109/TSG.2011.2159818
– ident: ref12
  doi: 10.1109/TSG.2011.2159819
– year: 2010
  ident: ref20
  publication-title: Introduction to Electric Circuits
  contributor:
    fullname: dorf
– ident: ref19
  doi: 10.1115/1.3662552
– ident: ref4
  doi: 10.1109/CDC.2010.5718158
– ident: ref17
  doi: 10.1109/45.283885
– ident: ref8
  doi: 10.1109/TSG.2011.2165090
– start-page: 1
  year: 0
  ident: ref22
  article-title: False data injection attacks in control systems
  publication-title: Proc 1st Workshop Secure Control Syst
  contributor:
    fullname: mo
– ident: ref21
  doi: 10.1007/978-3-642-00602-9_3
– start-page: 1162
  year: 0
  ident: ref13
  article-title: Defending mechanisms against false-data injection attacks in the power system state estimation
  publication-title: Proc IEEE GLOBECOM Workshops
  contributor:
    fullname: bi
– ident: ref1
  doi: 10.1109/TSG.2011.2167354
– ident: ref24
  doi: 10.1109/TPWRS.2010.2051168
– ident: ref6
  doi: 10.1109/TSG.2011.2160661
– ident: ref5
  doi: 10.1109/TSG.2011.2159817
SSID ssj0001255873
Score 2.5554667
Snippet By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems,...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Publisher
StartPage 370
SubjectTerms Detectors
Kalman filters
Mathematical model
Mathematical models
Network security
Security
Smart grids
Title Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter
URI https://ieeexplore.ieee.org/document/6897944
https://www.proquest.com/docview/1759348708/abstract/
Volume 1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T-QwEB4BFVfwRiwvuaBCZHESZ2OXCFgQCBpAoovGj5z22M0icBp-PeMki-CgoIsSO7L8jT0z9jczAAfCCmOFklGWO0kOCuaRRiwjjpabOBS7LUPs8M3t4PJBXD1mj3Nw9BEL45xryGeuHx6bu3w7NXU4KjseSEXiI-ZhXvKkjdX6dJ6SZTJPu4vLmKvj-9Pbu8DdEv2Q0iVL4y-qp6ml8m0DbrTKcBluZuNpySRP_drrvnn7L1Xjbwe8AkudeclOWnlYhTlXrcGfT0kH1-HvmfMN_6pi05INsR77V4aVZSfeh4B7RlvGuA4qjT6S4mRn6JFe_us6tc3YqGJ3E5I7dvEysqxhHrBrHE-wYsNRuILfgIfh-f3pZdSVW4gMeXU-corMMdRSiFBT3SAZIzpF7lAYXiYOY5tnuVYpltIkhswKIYSzkpY8JgOjbLoJC9W0clvAdKK1NtzFaWlJGqxMNVplhMGBFYRUDw5nSBTPbVaNovFGuCoCbEWArehg68F6mNmPht2k9mB3hl3RrbvXgowhlZIPxuX2z712YDH8uyWk7MKCf6ndHpkVXu838vQOtDPL9Q
link.rule.ids 315,786,790,802,27957,27958,55109
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LU9swEN4J6QE40PIaQtOiAycGByeWY-nIQNMUSC4JM9w8q4eZtMHpEPnSX9-V7WQocOjNo8dYo11pd7Xf7gKccsO14VIEcWIFGSiYBAoxC0I0oe76YreZjx0ejfvDe37zED804HwdC2OtLcFntuM_S1--WejCP5Vd9IUk9uEb8IHkfCiraK0XLypxLJKodl1S_8X0ajzx6C3e8Uld4qj7j_Apq6m8uYJLuTL4CKPViio4ya9O4VRH_3mVrPF_l_wJdmoFk11WHLELDZvvwfaLtIP78HhtXYnAytkiYwMs5m7JMDfs0jkfcs_o0pgXXqhRJ4lOdo0OqfFnPakaxmY5mzwR57HvzzPDSuwBu8X5E-ZsMPNO-AO4H3ybXg2DuuBCoMmuc4GVpJChEpz7quoaSR1REYYWuQ6znsWuSeJEyQgzoXuaFAvOuTWCDj32-lqa6BCa-SK3R8BUTymlQ9uNMkP8YESk0EjNNfYNJ0q14GxFifR3lVcjLe2RUKaebKknW1qTrQX7fmfXA-tNbUF7Rbu0PnnLlNQhGZEVForj92edwOZwOrpL736Mbz_Dlv9PBU9pQ9M9F_YLKRlOfS156y-hVc9L
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detection+of+Faults+and+Attacks+Including+False+Data+Injection+Attack+in+Smart+Grid+Using+Kalman+Filter&rft.jtitle=IEEE+transactions+on+control+of+network+systems&rft.au=Manandhar%2C+Kebina&rft.au=Cao%2C+Xiaojun&rft.au=Hu%2C+Fei&rft.au=Liu%2C+Yao&rft.date=2014-12-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2372-2533&rft.volume=1&rft.issue=4&rft.spage=370&rft_id=info:doi/10.1109%2FTCNS.2014.2357531&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3931747001
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2325-5870&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2325-5870&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2325-5870&client=summon