Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter
By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical mo...
Saved in:
Published in | IEEE transactions on control of network systems Vol. 1; no. 4; pp. 370 - 379 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.12.2014
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid. Our framework adopts the Kalman filter to estimate the variables of a wide range of state processes in the model. The estimates from the Kalman filter and the system readings are then fed into the χ 2 -detector or the proposed Euclidean detector. The χ 2 -detector is a proven effective exploratory method used with the Kalman filter for the measurement of the relationship between dependent variables and a series of predictor variables. The χ 2 -detector can detect system faults/attacks, such as DoS attack, short-term, and long-term random attacks. However, the studies show that the χ 2 -detector is unable to detect the statistically derived false data-injection attack. To overcome this limitation, we prove that the Euclidean detector can effectively detect such a sophisticated injection attack. |
---|---|
AbstractList | By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid. Our framework adopts the Kalman filter to estimate the variables of a wide range of state processes in the model. The estimates from the Kalman filter and the system readings are then fed into the χ 2 -detector or the proposed Euclidean detector. The χ 2 -detector is a proven effective exploratory method used with the Kalman filter for the measurement of the relationship between dependent variables and a series of predictor variables. The χ 2 -detector can detect system faults/attacks, such as DoS attack, short-term, and long-term random attacks. However, the studies show that the χ 2 -detector is unable to detect the statistically derived false data-injection attack. To overcome this limitation, we prove that the Euclidean detector can effectively detect such a sophisticated injection attack. By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid. Our framework adopts the Kalman filter to estimate the variables of a wide range of state processes in the model. The estimates from the Kalman filter and the system readings are then fed into the [Formula Omitted]-detector or the proposed Euclidean detector. The [Formula Omitted]-detector is a proven effective exploratory method used with the Kalman filter for the measurement of the relationship between dependent variables and a series of predictor variables. The [Formula Omitted]-detector can detect system faults/attacks, such as DoS attack, short-term, and long-term random attacks. However, the studies show that the [Formula Omitted]-detector is unable to detect the statistically derived false data-injection attack. To overcome this limitation, we prove that the Euclidean detector can effectively detect such a sophisticated injection attack. |
Author | Fei Hu Xiaojun Cao Yao Liu Manandhar, Kebina |
Author_xml | – sequence: 1 givenname: Kebina surname: Manandhar fullname: Manandhar, Kebina email: kmanandhar1@cs.gsu.edu organization: Dept. of Comput. Sci., Georgia State Univ., Atlanta, GA, USA – sequence: 2 surname: Xiaojun Cao fullname: Xiaojun Cao email: cao@cs.gsu.edu organization: Dept. of Comput. Sci., Georgia State Univ., Atlanta, GA, USA – sequence: 3 surname: Fei Hu fullname: Fei Hu email: fei@eng.ua.edu organization: Dept. of Electr. & Comput. Eng., Univ. of Alabama, Tuscaloosa, AL, USA – sequence: 4 surname: Yao Liu fullname: Yao Liu email: yliu@cse.usf.edu organization: Dept. of Comput. Sci. & Eng., Univ. of South Florida, Tampa, FL, USA |
BookMark | eNpNkM1OAjEURhuDiYg8gHHTxDXY32lnSUCQSHQBrJvS6ZDBoYNtZ-Hb28kQ4-r2tue7vTn3YOAaZwF4xGiKMcpfdvOP7ZQgzKaEcsEpvgFDQgmfcCnQ4N_5DoxDOCGEMOGpp0NwXNhoTawaB5sSLnVbxwC1K-AsRm2-Alw7U7dF5Y7psQ4WLnTU6fJ0DfUYrBzcnrWPcOWrAu5Dx7_r-qwdXFZ1tP4B3JZdfnytI7Bfvu7mb5PN52o9n20mhiERJzZHkuqDZIwSRIxGWXagGlnNDCqJ1bgQXBxyqktpiCGEMsZsIbmQmmQmL-gIPPdzL775bm2I6tS03qUvFRY8pyxZkInCPWV8E4K3pbr4Ku3_ozBSnVLVKVWdUnVVmjJPfaay1v7xmcxFnrb9Be3Acu4 |
CODEN | ITCNAY |
CitedBy_id | crossref_primary_10_1049_stg2_12141 crossref_primary_10_1049_cth2_12172 crossref_primary_10_1109_TPEL_2020_3014258 crossref_primary_10_1109_JIOT_2020_2966221 crossref_primary_10_1016_j_ijepes_2020_105968 crossref_primary_10_1109_LSP_2024_3356823 crossref_primary_10_1016_j_automatica_2021_109869 crossref_primary_10_1016_j_jfranklin_2024_107000 crossref_primary_10_1049_iet_gtd_2018_5139 crossref_primary_10_1016_j_hspr_2022_12_001 crossref_primary_10_1186_s41601_023_00287_w crossref_primary_10_1145_3584985 crossref_primary_10_1109_ACCESS_2021_3065268 crossref_primary_10_1016_j_scs_2021_103370 crossref_primary_10_1016_j_iotcps_2023_01_004 crossref_primary_10_1109_TAC_2019_2891405 crossref_primary_10_1016_j_jfranklin_2018_11_062 crossref_primary_10_1109_TSG_2021_3121009 crossref_primary_10_3390_electronics7120370 crossref_primary_10_1007_s40313_019_00452_3 crossref_primary_10_1109_TIE_2020_2972466 crossref_primary_10_1016_j_epsr_2020_106602 crossref_primary_10_1002_cpe_5956 crossref_primary_10_1002_rnc_4840 crossref_primary_10_1109_ACCESS_2021_3055229 crossref_primary_10_1016_j_nanoen_2020_105275 crossref_primary_10_1109_TSIPN_2021_3134097 crossref_primary_10_1109_TSG_2017_2679122 crossref_primary_10_1016_j_automatica_2024_111523 crossref_primary_10_1016_j_ins_2020_12_027 crossref_primary_10_1016_j_apenergy_2021_116432 crossref_primary_10_1016_j_epsr_2023_109834 crossref_primary_10_1109_MIE_2021_3059996 crossref_primary_10_1088_1742_6596_2788_1_012029 crossref_primary_10_1049_iet_cta_2017_0629 crossref_primary_10_1109_TIE_2023_3312433 crossref_primary_10_3390_app12136498 crossref_primary_10_1109_TCNS_2022_3141026 crossref_primary_10_1016_j_neucom_2018_04_037 crossref_primary_10_3390_app11125706 crossref_primary_10_1109_ACCESS_2022_3227076 crossref_primary_10_1049_gtd2_13057 crossref_primary_10_1016_j_sysconle_2021_104938 crossref_primary_10_1109_TSG_2021_3137835 crossref_primary_10_1016_j_jss_2018_12_006 crossref_primary_10_1109_TPWRS_2022_3221291 crossref_primary_10_1109_TCNS_2019_2935697 crossref_primary_10_1016_j_jnca_2019_02_020 crossref_primary_10_1016_j_ins_2023_119759 crossref_primary_10_1109_TIM_2022_3186360 crossref_primary_10_1109_TPEL_2021_3114990 crossref_primary_10_1002_acs_3674 crossref_primary_10_1109_TCNS_2020_3029165 crossref_primary_10_1177_01423312231171473 crossref_primary_10_1049_iet_ifs_2016_0203 crossref_primary_10_1109_JIOT_2020_2983911 crossref_primary_10_1109_TSG_2020_2971148 crossref_primary_10_3390_app10165649 crossref_primary_10_1049_iet_cta_2015_1147 crossref_primary_10_1109_TPEL_2021_3055215 crossref_primary_10_3390_electronics7060089 crossref_primary_10_1109_TSG_2018_2832544 crossref_primary_10_1109_JSEN_2017_2661247 crossref_primary_10_1016_j_ijepes_2022_108599 crossref_primary_10_1109_ACCESS_2018_2873615 crossref_primary_10_1109_TSG_2022_3147693 crossref_primary_10_1109_TII_2020_2999571 crossref_primary_10_1109_TNSE_2024_3370649 crossref_primary_10_1016_j_epsr_2020_106418 crossref_primary_10_1016_j_egyr_2024_02_010 crossref_primary_10_1007_s00500_020_05557_5 crossref_primary_10_1109_TCYB_2019_2912939 crossref_primary_10_1109_TPEL_2020_2995584 crossref_primary_10_1016_j_engappai_2020_104150 crossref_primary_10_1109_TII_2022_3151748 crossref_primary_10_1016_j_automatica_2018_09_003 crossref_primary_10_1016_j_jisa_2021_103054 crossref_primary_10_1109_TSG_2019_2961561 crossref_primary_10_1109_JIOT_2019_2931349 crossref_primary_10_1080_23335777_2018_1484818 crossref_primary_10_1016_j_compind_2022_103609 crossref_primary_10_1109_ACCESS_2021_3115819 crossref_primary_10_1109_TIE_2019_2944091 crossref_primary_10_1109_TSG_2016_2604120 crossref_primary_10_1016_j_energy_2022_125865 crossref_primary_10_1109_TII_2019_2941748 crossref_primary_10_1145_3592797 crossref_primary_10_1109_TAES_2021_3117664 crossref_primary_10_1007_s40031_023_00960_6 crossref_primary_10_1109_TSG_2018_2881562 crossref_primary_10_1109_TSG_2022_3204796 crossref_primary_10_1109_TIE_2016_2535119 crossref_primary_10_1155_2024_9257508 crossref_primary_10_1002_rnc_4945 crossref_primary_10_1109_JAS_2024_124257 crossref_primary_10_1002_asjc_2783 crossref_primary_10_1007_s00202_024_02277_z crossref_primary_10_1109_ACCESS_2017_2728681 crossref_primary_10_1002_asjc_2543 crossref_primary_10_1016_j_apenergy_2019_113703 crossref_primary_10_1080_00207179_2023_2175409 crossref_primary_10_1109_TVT_2022_3170725 crossref_primary_10_1109_TRO_2023_3275875 crossref_primary_10_1109_TSG_2020_3017562 crossref_primary_10_1109_ACCESS_2024_3368876 crossref_primary_10_1109_TSG_2020_3005238 crossref_primary_10_1109_TSG_2019_2958014 crossref_primary_10_1109_ACCESS_2019_2902910 crossref_primary_10_1109_TSG_2020_2986704 crossref_primary_10_1016_j_cose_2021_102265 crossref_primary_10_1049_iet_cps_2017_0013 crossref_primary_10_1109_JIOT_2020_2966672 crossref_primary_10_1016_j_sysarc_2019_101705 crossref_primary_10_1049_iet_cps_2017_0017 crossref_primary_10_1109_JESTIE_2022_3227005 crossref_primary_10_1016_j_automatica_2018_11_048 crossref_primary_10_1016_j_simpat_2021_102272 crossref_primary_10_1109_JSTSP_2018_2840517 crossref_primary_10_1109_TSG_2017_2721382 crossref_primary_10_1155_2018_7204939 crossref_primary_10_1002_acs_3001 crossref_primary_10_1109_JPROC_2022_3161053 crossref_primary_10_1016_j_ijepes_2021_106819 crossref_primary_10_1038_s41598_021_96769_8 crossref_primary_10_3390_e24020154 crossref_primary_10_1109_TSMC_2022_3212391 crossref_primary_10_1109_TCYB_2021_3108884 crossref_primary_10_31127_tuje_640282 crossref_primary_10_1016_j_apenergy_2021_118425 crossref_primary_10_1049_iet_wss_2019_0134 crossref_primary_10_1109_TII_2022_3174159 crossref_primary_10_1109_TMECH_2022_3201875 crossref_primary_10_1109_TSG_2020_2979160 crossref_primary_10_1109_COMST_2020_3023963 crossref_primary_10_3390_s22072644 crossref_primary_10_1109_JESTPE_2019_2948216 crossref_primary_10_1016_j_neucom_2021_03_087 crossref_primary_10_1109_TSIPN_2021_3122289 crossref_primary_10_1109_TSMC_2018_2884952 crossref_primary_10_1016_j_apenergy_2023_122283 crossref_primary_10_1109_TIFS_2022_3146078 crossref_primary_10_1109_TSG_2020_2992118 crossref_primary_10_1016_j_ijepes_2023_109062 crossref_primary_10_1016_j_segan_2024_101335 crossref_primary_10_1016_j_isatra_2023_03_044 crossref_primary_10_1109_TPEL_2023_3263728 crossref_primary_10_1109_ACCESS_2021_3051155 crossref_primary_10_1016_j_compchemeng_2023_108359 crossref_primary_10_1109_TCYB_2019_2903411 crossref_primary_10_2139_ssrn_3871018 crossref_primary_10_1109_ACCESS_2019_2963502 crossref_primary_10_1109_TNNLS_2021_3061137 crossref_primary_10_1109_TCYB_2022_3225236 crossref_primary_10_1016_j_jfranklin_2018_04_001 crossref_primary_10_1109_JSEN_2020_3027778 crossref_primary_10_1002_acs_3032 crossref_primary_10_1109_ACCESS_2020_3047814 crossref_primary_10_1109_JIOT_2022_3181698 crossref_primary_10_1109_TCYB_2020_2969320 crossref_primary_10_1109_TSG_2019_2949998 crossref_primary_10_1016_j_ins_2024_121093 crossref_primary_10_1109_TSG_2020_3014311 crossref_primary_10_1016_j_jnca_2021_103178 crossref_primary_10_1109_TITS_2019_2934481 crossref_primary_10_1016_j_neucom_2017_10_009 crossref_primary_10_3390_en16186678 crossref_primary_10_1016_j_ijepes_2019_03_008 crossref_primary_10_3390_s19071542 crossref_primary_10_1109_TCNS_2016_2614099 crossref_primary_10_1016_j_jisa_2020_102518 crossref_primary_10_1016_j_jisa_2021_102802 crossref_primary_10_1049_cth2_12405 crossref_primary_10_1016_j_ijepes_2022_108083 crossref_primary_10_1016_j_epsr_2021_107510 crossref_primary_10_1109_TSIPN_2022_3230562 crossref_primary_10_1016_j_neucom_2018_09_094 crossref_primary_10_1002_rnc_4666 crossref_primary_10_1016_j_ins_2023_118971 crossref_primary_10_1080_00207721_2019_1597944 crossref_primary_10_1007_s42835_021_00923_1 crossref_primary_10_1049_iet_cta_2020_0867 crossref_primary_10_1016_j_net_2021_12_011 crossref_primary_10_1016_j_isatra_2021_01_036 crossref_primary_10_1109_TCNS_2021_3113265 crossref_primary_10_1109_ACCESS_2019_2929785 crossref_primary_10_1002_rnc_4790 crossref_primary_10_1016_j_jfranklin_2018_10_030 crossref_primary_10_1002_rnc_6717 crossref_primary_10_1109_TSMC_2023_3283414 crossref_primary_10_1016_j_ifacol_2018_12_036 crossref_primary_10_1109_TPWRS_2020_3008184 crossref_primary_10_1049_cps2_12000 crossref_primary_10_1109_ACCESS_2018_2888582 crossref_primary_10_1109_COMST_2022_3187531 crossref_primary_10_1016_j_cose_2022_103016 crossref_primary_10_1109_JESTPE_2020_2968243 crossref_primary_10_1155_2023_9071969 crossref_primary_10_1080_00207721_2023_2216274 crossref_primary_10_1109_TCNS_2019_2927594 crossref_primary_10_1049_gtd2_12178 crossref_primary_10_1109_JSYST_2017_2741483 crossref_primary_10_1109_JPROC_2020_3034595 crossref_primary_10_1016_j_measurement_2023_112565 crossref_primary_10_1016_j_dsp_2018_03_002 crossref_primary_10_1016_j_rser_2023_113752 crossref_primary_10_1109_TCNS_2021_3124887 crossref_primary_10_3390_en14164941 crossref_primary_10_1109_TSUSC_2019_2906657 crossref_primary_10_3390_electronics10161914 crossref_primary_10_1109_JAS_2023_123339 crossref_primary_10_3390_math10162852 crossref_primary_10_1109_JSYST_2020_2991258 crossref_primary_10_3390_en16135206 crossref_primary_10_1109_TITS_2021_3085196 crossref_primary_10_1002_asjc_3166 crossref_primary_10_1016_j_asoc_2021_107953 crossref_primary_10_1016_j_eng_2021_06_007 crossref_primary_10_1016_j_ifacol_2023_10_145 crossref_primary_10_1016_j_ijcip_2020_100377 crossref_primary_10_1016_j_ins_2020_08_055 crossref_primary_10_3389_fcteg_2021_734220 crossref_primary_10_1109_JIOT_2019_2916670 crossref_primary_10_3390_app122111073 crossref_primary_10_1109_ACCESS_2024_3403456 crossref_primary_10_1049_iet_stg_2019_0320 crossref_primary_10_1016_j_ijepes_2017_08_024 crossref_primary_10_1016_j_compeleceng_2024_109347 crossref_primary_10_1016_j_ins_2019_12_016 crossref_primary_10_1109_TSG_2019_2891852 crossref_primary_10_1016_j_ins_2017_08_057 crossref_primary_10_1109_ACCESS_2021_3051300 crossref_primary_10_1109_MSMC_2020_3049092 crossref_primary_10_3390_en12244625 crossref_primary_10_1109_ACCESS_2022_3194989 crossref_primary_10_1177_00202940231159115 crossref_primary_10_3390_en16052280 crossref_primary_10_1016_j_ins_2018_02_008 crossref_primary_10_4236_cn_2022_144009 crossref_primary_10_1049_iet_cps_2019_0010 crossref_primary_10_1016_j_tej_2017_04_001 crossref_primary_10_1109_TCNS_2021_3100411 crossref_primary_10_1186_s42400_023_00200_w crossref_primary_10_1016_j_ress_2019_03_020 crossref_primary_10_1016_j_arcontrol_2019_08_002 crossref_primary_10_1016_j_pmcj_2017_04_005 crossref_primary_10_1109_JSYST_2020_2967126 crossref_primary_10_1109_TIE_2021_3080212 crossref_primary_10_1016_j_ifacol_2020_12_297 crossref_primary_10_1016_j_isatra_2020_10_002 crossref_primary_10_1109_ACCESS_2023_3279821 crossref_primary_10_1109_JSEN_2020_3039918 crossref_primary_10_1007_s40436_017_0189_2 crossref_primary_10_1016_j_jfranklin_2019_01_009 crossref_primary_10_3389_fenrg_2022_961488 crossref_primary_10_1109_TSG_2021_3069331 crossref_primary_10_3389_fenrg_2022_914132 crossref_primary_10_1016_j_segan_2022_100702 crossref_primary_10_33581_1561_4085_2020_23_3_270_279 crossref_primary_10_1109_TII_2021_3106009 crossref_primary_10_1002_rnc_6556 crossref_primary_10_1016_j_ijepes_2023_109682 crossref_primary_10_1109_ACCESS_2020_2993233 crossref_primary_10_1109_TSMC_2023_3258412 crossref_primary_10_1016_j_cosrev_2021_100452 crossref_primary_10_1016_j_heliyon_2020_e04799 crossref_primary_10_1109_TII_2018_2825243 crossref_primary_10_3390_pr10071299 crossref_primary_10_1109_JIOT_2021_3113900 crossref_primary_10_1002_2050_7038_12661 crossref_primary_10_3390_en14010027 crossref_primary_10_1049_iet_cps_2016_0019 crossref_primary_10_3390_en12244667 crossref_primary_10_1049_tje2_12324 crossref_primary_10_1109_TIM_2023_3331398 crossref_primary_10_1109_TSG_2022_3202926 crossref_primary_10_1109_TCNS_2021_3089146 crossref_primary_10_1080_00207721_2021_1931727 crossref_primary_10_1109_TIA_2023_3287152 crossref_primary_10_1007_s00202_024_02520_7 crossref_primary_10_1016_j_cose_2020_101899 crossref_primary_10_1109_JESTPE_2021_3111728 crossref_primary_10_1016_j_ins_2017_07_029 crossref_primary_10_1016_j_segan_2024_101374 crossref_primary_10_3390_sym15122104 crossref_primary_10_1109_ACCESS_2024_3353289 crossref_primary_10_1049_rpg2_12753 crossref_primary_10_1049_rpg2_12875 crossref_primary_10_3390_en13236269 crossref_primary_10_1049_iet_cta_2016_1313 crossref_primary_10_1109_TCNS_2022_3145285 crossref_primary_10_25130_tjes_30_2_11 crossref_primary_10_1109_JIOT_2020_3005926 crossref_primary_10_1016_j_ijcip_2018_06_001 crossref_primary_10_1109_TSG_2021_3109628 crossref_primary_10_1007_s11768_023_00141_2 crossref_primary_10_1155_2019_7280474 crossref_primary_10_1109_MIE_2019_2958039 crossref_primary_10_1016_j_segan_2024_101364 crossref_primary_10_1186_s43067_022_00042_5 crossref_primary_10_1109_TCYB_2020_2998333 crossref_primary_10_1109_TSMC_2020_2963888 crossref_primary_10_1016_j_cja_2021_06_010 crossref_primary_10_1109_JESTPE_2019_2937800 crossref_primary_10_3390_app11125458 crossref_primary_10_1109_JSEN_2019_2902357 crossref_primary_10_3390_en13071820 crossref_primary_10_1109_ACCESS_2023_3292059 crossref_primary_10_1109_TIA_2022_3159314 crossref_primary_10_3390_su14116407 crossref_primary_10_1109_TNSE_2023_3245214 crossref_primary_10_1016_j_jfranklin_2019_02_011 crossref_primary_10_1109_TII_2019_2952067 crossref_primary_10_1109_TIFS_2018_2854745 crossref_primary_10_3390_electronics13112177 crossref_primary_10_1109_ACCESS_2019_2922410 crossref_primary_10_1016_j_eswa_2016_04_006 crossref_primary_10_1177_01423312241239213 crossref_primary_10_1080_23307706_2022_2139299 crossref_primary_10_1109_JESTIE_2023_3327051 crossref_primary_10_3390_s20113092 crossref_primary_10_1016_j_ifacol_2017_08_556 crossref_primary_10_1109_TSG_2019_2892423 crossref_primary_10_1016_j_ejcon_2018_11_004 crossref_primary_10_1109_TSG_2015_2427380 crossref_primary_10_3390_electronics9091513 crossref_primary_10_1155_2023_6098519 crossref_primary_10_1002_rnc_3814 crossref_primary_10_1016_j_hspr_2023_01_004 crossref_primary_10_1109_LCSYS_2020_3048098 crossref_primary_10_1109_TSIPN_2020_3046220 crossref_primary_10_3390_jmse8050305 crossref_primary_10_1109_TIFS_2018_2800908 crossref_primary_10_1109_JIOT_2022_3200127 crossref_primary_10_1109_TNSE_2022_3199881 crossref_primary_10_1016_j_ijepes_2022_108506 crossref_primary_10_1109_ACCESS_2020_3037337 crossref_primary_10_1109_ACCESS_2019_2939089 crossref_primary_10_1371_journal_pone_0262463 crossref_primary_10_1016_j_egyr_2021_01_045 crossref_primary_10_1109_ACCESS_2020_2999585 crossref_primary_10_1016_j_jfranklin_2022_07_050 crossref_primary_10_1109_TCYB_2019_2944956 crossref_primary_10_1016_j_ijepes_2022_108877 crossref_primary_10_2139_ssrn_4102930 crossref_primary_10_1109_ACCESS_2020_3016826 crossref_primary_10_1109_JIOT_2017_2787962 crossref_primary_10_1016_j_ijcip_2022_100508 crossref_primary_10_1109_TPDS_2015_2388479 crossref_primary_10_1016_j_fraope_2024_100081 crossref_primary_10_1109_TSG_2023_3309530 crossref_primary_10_1049_iet_cta_2017_0249 crossref_primary_10_1109_TII_2020_2972809 crossref_primary_10_1109_TPWRS_2023_3325219 crossref_primary_10_1109_TCNS_2022_3229774 crossref_primary_10_1109_TPWRS_2023_3234202 crossref_primary_10_1007_s00202_021_01278_6 crossref_primary_10_1016_j_comcom_2022_02_022 crossref_primary_10_1109_JIOT_2020_3007155 crossref_primary_10_1016_j_automatica_2021_110091 crossref_primary_10_1109_TPEL_2022_3147466 crossref_primary_10_1016_j_eswa_2017_05_013 crossref_primary_10_1109_TPEL_2021_3053845 crossref_primary_10_1109_ACCESS_2020_2978113 crossref_primary_10_1109_TSG_2020_3010510 crossref_primary_10_1007_s12555_023_0769_9 crossref_primary_10_1109_TSG_2023_3256480 crossref_primary_10_1109_TCYB_2019_2915124 crossref_primary_10_1109_TSG_2020_2984266 crossref_primary_10_1109_TII_2017_2656905 crossref_primary_10_1016_j_cherd_2021_09_016 crossref_primary_10_3390_en14051380 crossref_primary_10_1016_j_isatra_2022_06_015 crossref_primary_10_1049_gtd2_12517 crossref_primary_10_1109_TNNLS_2022_3230056 crossref_primary_10_1109_OJCS_2022_3199755 crossref_primary_10_1109_TCNS_2016_2573039 crossref_primary_10_1016_j_apenergy_2024_122736 crossref_primary_10_1080_00207721_2024_2351056 crossref_primary_10_1109_TVT_2020_2980137 crossref_primary_10_1109_JETCAS_2020_3046781 crossref_primary_10_1109_TSC_2023_3331083 crossref_primary_10_1109_TDSC_2015_2427841 crossref_primary_10_1088_1674_1056_ad20d7 crossref_primary_10_1109_TCYB_2023_3305240 crossref_primary_10_1109_JIOT_2019_2919635 crossref_primary_10_3390_en15228692 crossref_primary_10_1016_j_ress_2021_108257 crossref_primary_10_1049_gtd2_12848 crossref_primary_10_1109_JESTIE_2021_3112919 crossref_primary_10_1016_j_micpro_2020_103121 crossref_primary_10_1109_TCSI_2023_3347080 crossref_primary_10_1109_TSG_2018_2878570 crossref_primary_10_1109_TAES_2022_3182936 crossref_primary_10_1016_j_ijcip_2021_100457 crossref_primary_10_1109_ACCESS_2023_3308052 crossref_primary_10_1109_TAC_2017_2751999 crossref_primary_10_1016_j_matpr_2020_10_622 crossref_primary_10_1109_TSG_2023_3261970 crossref_primary_10_36548_jeea_2021_1_003 crossref_primary_10_1109_TCYB_2018_2843358 crossref_primary_10_1109_TSG_2023_3268245 |
Cites_doi | 10.1109/TSG.2011.2138172 10.1109/TAC.1987.1104658 10.1145/1952982.1952995 10.1109/EPEC.2009.5420809 10.1109/TSG.2011.2161498 10.1109/TSG.2011.2160297 10.1109/TSG.2011.2159406 10.1109/TSG.2011.2159818 10.1109/TSG.2011.2159819 10.1115/1.3662552 10.1109/CDC.2010.5718158 10.1109/45.283885 10.1109/TSG.2011.2165090 10.1007/978-3-642-00602-9_3 10.1109/TSG.2011.2167354 10.1109/TPWRS.2010.2051168 10.1109/TSG.2011.2160661 10.1109/TSG.2011.2159817 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2014 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2014 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TCNS.2014.2357531 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2325-5870 2372-2533 |
EndPage | 379 |
ExternalDocumentID | 3931747001 10_1109_TCNS_2014_2357531 6897944 |
Genre | orig-research |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AASAJ ABQJQ ABVLG AKJIK ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE RIG AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c407t-e9083ab8443202ca066b3a0ea4c0f2ea1d757b93af8c2c223444ed8578a26c9d3 |
IEDL.DBID | RIE |
ISSN | 2325-5870 |
IngestDate | Fri Sep 13 07:37:45 EDT 2024 Fri Aug 23 03:10:00 EDT 2024 Wed Jun 26 19:28:18 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | security Kalman filter smart grid Cyber physical system false data injection attack |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c407t-e9083ab8443202ca066b3a0ea4c0f2ea1d757b93af8c2c223444ed8578a26c9d3 |
PQID | 1759348708 |
PQPubID | 2040410 |
PageCount | 10 |
ParticipantIDs | proquest_journals_1759348708 crossref_primary_10_1109_TCNS_2014_2357531 ieee_primary_6897944 |
PublicationCentury | 2000 |
PublicationDate | 2014-12-01 |
PublicationDateYYYYMMDD | 2014-12-01 |
PublicationDate_xml | – month: 12 year: 2014 text: 2014-12-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on control of network systems |
PublicationTitleAbbrev | TCNS |
PublicationYear | 2014 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref24 ref12 ref15 dorf (ref20) 2010 ref11 ref10 djerf (ref18) 2012 ref21 ref2 bobba (ref14) 2010 ref1 ref17 ref16 ref19 ref8 bi (ref13) 0 ref7 dixon (ref23) 1969; 344 ref9 ref4 ref3 ref6 ref5 mo (ref22) 0 |
References_xml | – ident: ref7 doi: 10.1109/TSG.2011.2138172 – ident: ref16 doi: 10.1109/TAC.1987.1104658 – ident: ref3 doi: 10.1145/1952982.1952995 – ident: ref15 doi: 10.1109/EPEC.2009.5420809 – year: 2010 ident: ref14 article-title: Detecting false data injection attacks on dc state estimation publication-title: 1st Workshop Secure Control Syst (CPSWEEK) contributor: fullname: bobba – ident: ref10 doi: 10.1109/TSG.2011.2161498 – ident: ref9 doi: 10.1109/TSG.2011.2160297 – volume: 344 year: 1969 ident: ref23 publication-title: Introduction to Statistical Analysis contributor: fullname: dixon – ident: ref11 doi: 10.1109/TSG.2011.2159406 – start-page: 55 year: 2012 ident: ref18 article-title: Power grid integration using kalman filtering publication-title: Uppsala University Signals and Systems Group contributor: fullname: djerf – ident: ref2 doi: 10.1109/TSG.2011.2159818 – ident: ref12 doi: 10.1109/TSG.2011.2159819 – year: 2010 ident: ref20 publication-title: Introduction to Electric Circuits contributor: fullname: dorf – ident: ref19 doi: 10.1115/1.3662552 – ident: ref4 doi: 10.1109/CDC.2010.5718158 – ident: ref17 doi: 10.1109/45.283885 – ident: ref8 doi: 10.1109/TSG.2011.2165090 – start-page: 1 year: 0 ident: ref22 article-title: False data injection attacks in control systems publication-title: Proc 1st Workshop Secure Control Syst contributor: fullname: mo – ident: ref21 doi: 10.1007/978-3-642-00602-9_3 – start-page: 1162 year: 0 ident: ref13 article-title: Defending mechanisms against false-data injection attacks in the power system state estimation publication-title: Proc IEEE GLOBECOM Workshops contributor: fullname: bi – ident: ref1 doi: 10.1109/TSG.2011.2167354 – ident: ref24 doi: 10.1109/TPWRS.2010.2051168 – ident: ref6 doi: 10.1109/TSG.2011.2160661 – ident: ref5 doi: 10.1109/TSG.2011.2159817 |
SSID | ssj0001255873 |
Score | 2.5554667 |
Snippet | By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems,... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Publisher |
StartPage | 370 |
SubjectTerms | Detectors Kalman filters Mathematical model Mathematical models Network security Security Smart grids |
Title | Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter |
URI | https://ieeexplore.ieee.org/document/6897944 https://www.proquest.com/docview/1759348708/abstract/ |
Volume | 1 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T-QwEB4BFVfwRiwvuaBCZHESZ2OXCFgQCBpAoovGj5z22M0icBp-PeMki-CgoIsSO7L8jT0z9jczAAfCCmOFklGWO0kOCuaRRiwjjpabOBS7LUPs8M3t4PJBXD1mj3Nw9BEL45xryGeuHx6bu3w7NXU4KjseSEXiI-ZhXvKkjdX6dJ6SZTJPu4vLmKvj-9Pbu8DdEv2Q0iVL4y-qp6ml8m0DbrTKcBluZuNpySRP_drrvnn7L1Xjbwe8AkudeclOWnlYhTlXrcGfT0kH1-HvmfMN_6pi05INsR77V4aVZSfeh4B7RlvGuA4qjT6S4mRn6JFe_us6tc3YqGJ3E5I7dvEysqxhHrBrHE-wYsNRuILfgIfh-f3pZdSVW4gMeXU-corMMdRSiFBT3SAZIzpF7lAYXiYOY5tnuVYpltIkhswKIYSzkpY8JgOjbLoJC9W0clvAdKK1NtzFaWlJGqxMNVplhMGBFYRUDw5nSBTPbVaNovFGuCoCbEWArehg68F6mNmPht2k9mB3hl3RrbvXgowhlZIPxuX2z712YDH8uyWk7MKCf6ndHpkVXu838vQOtDPL9Q |
link.rule.ids | 315,786,790,802,27957,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LU9swEN4J6QE40PIaQtOiAycGByeWY-nIQNMUSC4JM9w8q4eZtMHpEPnSX9-V7WQocOjNo8dYo11pd7Xf7gKccsO14VIEcWIFGSiYBAoxC0I0oe76YreZjx0ejfvDe37zED804HwdC2OtLcFntuM_S1--WejCP5Vd9IUk9uEb8IHkfCiraK0XLypxLJKodl1S_8X0ajzx6C3e8Uld4qj7j_Apq6m8uYJLuTL4CKPViio4ya9O4VRH_3mVrPF_l_wJdmoFk11WHLELDZvvwfaLtIP78HhtXYnAytkiYwMs5m7JMDfs0jkfcs_o0pgXXqhRJ4lOdo0OqfFnPakaxmY5mzwR57HvzzPDSuwBu8X5E-ZsMPNO-AO4H3ybXg2DuuBCoMmuc4GVpJChEpz7quoaSR1REYYWuQ6znsWuSeJEyQgzoXuaFAvOuTWCDj32-lqa6BCa-SK3R8BUTymlQ9uNMkP8YESk0EjNNfYNJ0q14GxFifR3lVcjLe2RUKaebKknW1qTrQX7fmfXA-tNbUF7Rbu0PnnLlNQhGZEVForj92edwOZwOrpL736Mbz_Dlv9PBU9pQ9M9F_YLKRlOfS156y-hVc9L |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detection+of+Faults+and+Attacks+Including+False+Data+Injection+Attack+in+Smart+Grid+Using+Kalman+Filter&rft.jtitle=IEEE+transactions+on+control+of+network+systems&rft.au=Manandhar%2C+Kebina&rft.au=Cao%2C+Xiaojun&rft.au=Hu%2C+Fei&rft.au=Liu%2C+Yao&rft.date=2014-12-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2372-2533&rft.volume=1&rft.issue=4&rft.spage=370&rft_id=info:doi/10.1109%2FTCNS.2014.2357531&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=3931747001 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2325-5870&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2325-5870&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2325-5870&client=summon |