A Review of False Data Injection Attacks Against Modern Power Systems
Citations
816 citations
Cites background or methods from "A Review of False Data Injection At..."
...Research on FDIAs has been extensive [3]–[7], typically relying on three key assumptions [3], [4], namely that the attacker:...
[...]
...There are three approaches to manipulating meter measurements for FDIAs: (i) compromising meters locally; (ii) intercepting and forging data packets when transferring to the control center; and (iii) modifying control center database [4]....
[...]
451 citations
Cites background from "A Review of False Data Injection At..."
...For instance, lunching such attacks could mislead the state estimation process of a IoT device, causing dramatic economic impact or even loss of human life [169]....
[...]
362 citations
Cites background from "A Review of False Data Injection At..."
...Authors of [26] illustrate several possible cyber-based FDIA and the associated impacts in the power grid....
[...]
349 citations
312 citations
References
40,785 citations
"A Review of False Data Injection At..." refers background in this paper
...The problem is known to be NP-hard for arbitrary H, but is often solved using the mixed-integer linear programming (MILP) method [15], matching pursuit [16], or LASSO algorithm [17]....
[...]
9,380 citations
"A Review of False Data Injection At..." refers background in this paper
...The problem is known to be NP-hard for arbitrary H, but is often solved using the mixed-integer linear programming (MILP) method [15], matching pursuit [16], or LASSO algorithm [17]....
[...]
2,064 citations
1,012 citations
770 citations
"A Review of False Data Injection At..." refers background in this paper
...Moreover, weaknesses in cyber security can also threaten the physical security of the power systems due to the deep integration of the physical and cyber systems [1]–[6]....
[...]