Title | ||
---|---|---|
Stealthy false data injection attacks against state estimation in power systems: Switching network topologies |
Abstract | ||
---|---|---|
The stealthy false data injection attack against the state estimation in a power network is able to compromise the measurements and fool the system operator without being detected by the residue based detector. While the most of the existing articles assume the network topology to be fixed, we show the effects of unfixed topologies on such attacks. Motivated by such effects, we propose a new mechanism in which the system operator is trying to eliminate the possibility of such attacks via strategically shutting down some of the transmission lines by turns and therefore switching the network topologies. We give the conditions that have to be satisfied in order to achieve this elimination. The vulnerable measurements in the network are formulated in the case when this elimination is impossible. Some simulation analysis are shown as well. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/ACC.2014.6858904 | ACC |
Keywords | DocType | ISSN |
control of networks,power transmission lines,switching network topology,unfixed topologies,network topology,transmission lines,emerging control applications,power network,residue based detector,power systems,distribution networks,stealthy false data injection attacks,topology,switches | Conference | 0743-1619 |
Citations | PageRank | References |
2 | 0.42 | 4 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shao-Cheng Wang | 1 | 43 | 5.63 |
Wei Ren | 2 | 5238 | 250.63 |