期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems 被引量:4
1
作者 Haibin Guo Jian Sun Zhong-Hua Pang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1181-1191,共11页
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas... This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis. 展开更多
关键词 Cyber-physical systems(CPSs) false data injection(fdi)attacks remote state estimation stealthy attacks
下载PDF
Game Theory based Optimal Defensive Resources Allocation with Incomplete Information in Cyber-physical Power Systems against False Data Injection Attacks
2
作者 Bingjing Yan Zhenze Jiang +3 位作者 Pengchao Yao Qiang Yang Wei Li Albert Y.Zomaya 《Protection and Control of Modern Power Systems》 SCIE EI 2024年第2期115-127,共13页
Modern power grid is fast emerging as a complex cyber-physical power system(CPPS)integrating physical current-carrying components and processes with cyber-embedded computing,which faces increasing cy-berspace security... Modern power grid is fast emerging as a complex cyber-physical power system(CPPS)integrating physical current-carrying components and processes with cyber-embedded computing,which faces increasing cy-berspace security threats and risks.In this paper,the state(i.e.,voltage)offsets resulting from false data injection(FDI)attacks and the bus safety characterization are applied to quantify the attack consequences.The state offsets are obtained by the state estimation method,and the bus safety characterization considers the power net-work topology as well as the vulnerability and connection relationship of buses.Considering the indeterminacy of attacker’s resource consumption and reward,a zero-sum game-theoretical model from the defender’s perspective with incomplete information is explored for the optimal allocation of limited defensive resources.The attacker aims to falsify measurements without triggering threshold alarms to break through the protection,leading to load shedding,over-voltage or under-voltage.The defender attempts to ensure the estimation results to be as close to the actual states as possible,and guarantee the system’s safety and efficient defensive resource utilization.The proposed solution is extensively evaluated through simu-lations using the IEEE 33-bus test network and real-time digital simulator(RTDS)based testbed experiments of the IEEE 14-bus network.The results demonstrate the effec-tiveness of the proposed game-theoretical approach for optimal defensive resource allocation in CPPS when lim-ited resources are available when under FDI attacks.Index Terms—Optimal strategy,game theory,Nash equilibrium,CPPS,FDI attack. 展开更多
关键词 Optimal strategy game theory Nash equilibrium CPPS fdi attack
原文传递
Adaptive security control of time-varying constraints nonlinear cyber-physical systems with false data injection attacks
3
作者 Yue-Ming Wang Yuan-Xin Li 《Journal of Control and Decision》 EI 2024年第1期50-59,共10页
In this article,an adaptive security control scheme is presented for cyber-physical systems(CPSs)suffering from false data injection(FDI)attacks and time-varying state constraints.Firstly,an adaptive bound estimation ... In this article,an adaptive security control scheme is presented for cyber-physical systems(CPSs)suffering from false data injection(FDI)attacks and time-varying state constraints.Firstly,an adaptive bound estimation mechanism is introduced in the backstepping control design to mitigate the effect of FDI attacks.Secondly,to solve the unknown sign time-varying statefeedback gains aroused by the FDI attacks,a type of Nussbaum function is employed in the adaptive security control.Then,by constructing a barrier Lyapunov function,it can be ensured that all signals of controlled system are bounded and the time-varying state constraints are not transgressed.Finally,the provided simulation examples demonstrate the effectiveness of the proposed controller. 展开更多
关键词 Neural networks backstepping technology false data injection(fdi)attacks nonlinear cyber-physical systems controls
原文传递
A Privacy-preserving Algorithm for AC Microgrid Cyber-physical System Against False Data Injection Attacks 被引量:1
4
作者 Jun Yang Yu Zhang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第5期1646-1658,共13页
A new privacy-preserving algorithm based on the Paillier cryptosystem including a new cooperative control strategy is proposed in this paper, which can resist the false data injection(FDI) attack based on the finite-t... A new privacy-preserving algorithm based on the Paillier cryptosystem including a new cooperative control strategy is proposed in this paper, which can resist the false data injection(FDI) attack based on the finite-time control theory and the data encryption strategy. Compared with the existing algorithms, the proposed privacy-preserving algorithm avoids the direct transmission of the ciphertext of frequency data in communication links while avoiding complex iterations and communications. It builds a secure data transmission environment that can ensure data security in the AC microgrid cyber-physical system(CPS). This algorithm provides effective protection for AC microgrid CPS in different cases of FDI attacks. At the same time, it can completely eliminate the adverse effects caused by the FDI attack. Finally, the effectiveness, security, and advantages of this algorithm are verified in the improved IEEE 34-node test microgrid system with six distributed generators(DGs) in different cases of FDI attacks. 展开更多
关键词 AC microgrid cyber-physical system(CPS) distributed cooperative control false data injection(fdi)attack Paillier cryptosystem
原文传递
Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems:A Stochastic Coding Scheme 被引量:3
5
作者 GUO Haibin PANG Zhonghua +1 位作者 SUN Jian LI Jun 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2022年第5期1668-1684,共17页
This paper,from the view of a defender,addresses the security problem of cyber-physical systems(CPSs)subject to stealthy false data injection(FDI)attacks that cannot be detected by a residual-based anomaly detector wi... This paper,from the view of a defender,addresses the security problem of cyber-physical systems(CPSs)subject to stealthy false data injection(FDI)attacks that cannot be detected by a residual-based anomaly detector without other defensive measures.To detect such a class of FDI attacks,a stochastic coding scheme,which codes the sensor measurement with a Gaussian stochastic signal at the sensor side,is proposed to assist an anomaly detector to expose the FDI attack.In order to ensure the system performance in the normal operational context,a decoder is adopted to decode the coded sensor measurement when received at the controller side.With this detection scheme,the residual under the attack can be significantly different from that in the normal situation,and thus trigger an alarm.The design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection rate.To minimize the trace of the coding signal covariance,the design problem of the coding signal is converted into a constraint non-convex optimization problem,and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance.A numerical example is given to verify the effectiveness of the proposed scheme. 展开更多
关键词 Attack detection cyber-physical systems(CPSs) stealthy fdi attacks stochastic coding
原文传递
Detection and Localization of Load Redistribution Attacks on Large-scale Systems 被引量:2
6
作者 Andrea Pinceti Lalitha Sankar Oliver Kosut 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第2期361-370,共10页
A nearest-neighbor-based detector against load redistribution attacks is presented.The detector is designed to scale from small-scale to very large-scale systems while guaranteeing consistent detection performance.Ext... A nearest-neighbor-based detector against load redistribution attacks is presented.The detector is designed to scale from small-scale to very large-scale systems while guaranteeing consistent detection performance.Extensive testing is performed on a realistic large-scale system to evaluate the perfor-mance of the proposed detector against a wide range of attacks,from simple random noise attacks to sophisticated load redistribution attacks.The detection capability is analyzed against different attack parameters to evaluate its sensitivity.A statistical test that leverages the proposed detector is introduced to identify which loads are likely to have been maliciously modified,thus,localizing the attack subgraph.This test is based on ascribing to each load a risk measure(probability of being attacked)and then computing the best posterior likelihood that minimizes log-loss. 展开更多
关键词 Attack detection cyber-security false data injection(fdi)attack load redistribution attack machine learning nearest neighbor
原文传递
Distributed Detection Mechanism and Resilient Consensus Strategy for Secure Voltage Control of AC Microgrids 被引量:1
7
作者 Lina Sheng Wei Gu Ge Cao 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第3期1066-1077,共12页
Distributed secondary control,depending on the sparse communication topology,excels for its flexibility and expandability in microgrids.The communication network plays an important role in microgrid control,but it is ... Distributed secondary control,depending on the sparse communication topology,excels for its flexibility and expandability in microgrids.The communication network plays an important role in microgrid control,but it is vulnerable to cyber-attacks.In this paper,the mathematical model for false data injection(FDI)attacks in AC microgrids is established,and the corresponding detection mechanism based on the morphological gradient is designed for the location of cyber-attacks in communication topology.Then,we propose a median-based resilient consensus voltage control strategy to mitigate the negative effects caused by malicious cyber-attacks and ensure the safe operation of the microgrid.Combining the detection method and resilient consensus control,a novel eventdriven mitigation scheme is derived to improve the resilience of microgrids under cyber-attacks.Finally,a tested microgrid model composed of five different distributed generation(DG)units is simulated in the MATLAB/Simulink environment.The feasibility and effectiveness of the presented detection mechanism and resilient consensus strategy are verified by simulation results applying different scenarios. 展开更多
关键词 Detection mechanism event-driven mitigation method fdi attacks microgrid voltage control resilient consensus control
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部