Title | ||
---|---|---|
False-Data Injection Attack in Electricity Generation System Subject to Actuator Saturation: Analysis and Design |
Abstract | ||
---|---|---|
The secure operation of electricity generation system (EGS) is essential to the quality of electricity and the security of energy Internet. In order to design secure control strategy for EGS, the behavior and capacity of adversary and possible attack should be studied. From this point of view and considering the actuator saturation and the false-data injection attack in control input channel of EGS, we analyze the behavior and stealthiness of adversary and design stealthy attack strategies in this paper. First, we prove that the magnitude of effective attack signal is smaller than the magnitude of injected attack signal because of actuator saturation. Second, we find that smaller actuator saturation limit makes the adversary easier to be detected. Finally, two stealthy attack strategies are designed for EGS which incorporates a
<inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$\chi ^{2}$ </tex-math></inline-formula>
attack detector, and the effectiveness of them are illustrated through simulation. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/tsmc.2019.2915527 | IEEE Transactions on Systems, Man, and Cybernetics |
Keywords | Field | DocType |
Actuators,Detectors,Internet,Sun,Security,Production,Cyber-physical systems | Computer science,Electricity,Control theory,Communication channel,Cyber-physical system,Adversary,Detector,Electricity generation,Actuator,Actuator saturation | Journal |
Volume | Issue | ISSN |
49 | 8 | 2168-2216 |
Citations | PageRank | References |
2 | 0.36 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Liang Yu | 1 | 111 | 14.29 |
Xi-Ming Sun | 2 | 850 | 62.94 |
Tianju Sui | 3 | 23 | 5.14 |