scispace - formally typeset
Journal ArticleDOI

ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks

Reads0
Chats0
TLDR
An alternating direction method of multipliers-based distributed state estimation method is developed to overcome the limitation of conventional state estimation and performance analysis of smart grid against a single type of cyber attacks.
Abstract
Smart grid (SG) represents a large-scale network system with the tight integration of a physical power network and an information network, which makes it more vulnerable to hybrid cyber attacks against different regional subsystems. First, an alternating direction method of multipliers-based distributed state estimation method is developed to overcome the limitation of conventional state estimation and performance analysis of SG against a single type of cyber attacks. Regional subsystems are partitioned via the ${K}$ -means method. Second, a novel distributed state estimation method integrated with the characteristics of data deception attacks and denial of service (DoS) attacks is proposed to account for the simultaneous presence of different cyber attacks on individual regional subsystems. Third, the convergence of a distributed state estimation algorithm under hybrid cyber attacks is proved theoretically. Furthermore, the relationships between the convergence and algorithm parameters as well as the occurring probability of DoS attacks are established. Finally, the simulations on a modified IEEE 118-bus system are given to demonstrate the feasibility and effectiveness of the proposed method.

read more

Citations
More filters
Journal ArticleDOI

Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications

TL;DR: A comprehensive review of different modelling, simulation, and analysis methods and different types of cyber-attacks, cybersecurity measures for modern CPPS is explored in this paper.
Journal ArticleDOI

A survey on attack detection, estimation and control of industrial cyber-physical systems.

TL;DR: A survey on recent advances on security issues of industrial cyber-physical systems (ICPSs) is presented in this article, where two typical kinds of attacks, namely Denial-of-Service (DoS) attack and Deception attack, are discussed.
Journal ArticleDOI

A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid

TL;DR: A holistic and methodical presentation of the DoS attack taxonomies as well as a survey of potential solution techniques to help draw a more concerted and coordinated research into this area, lack of which may have profound consequences.
Journal ArticleDOI

Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks

TL;DR: In this article, a weighted Cauchy kernel-based maximum correntropy criterion instead of the traditional minimum variance is put forward to evaluate the filtering performance against non-Gaussian noises as well as cyber-attacks.
Journal ArticleDOI

Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks

- 01 Jan 2022 - 
TL;DR: In this paper , a weighted Cauchy kernel-based maximum correntropy criterion instead of the traditional minimum variance is put forward to evaluate the filtering performance against non-Gaussian noises as well as cyber-attacks.
References
More filters

Some methods for classification and analysis of multivariate observations

TL;DR: The k-means algorithm as mentioned in this paper partitions an N-dimensional population into k sets on the basis of a sample, which is a generalization of the ordinary sample mean, and it is shown to give partitions which are reasonably efficient in the sense of within-class variance.
Book

Distributed Optimization and Statistical Learning Via the Alternating Direction Method of Multipliers

TL;DR: It is argued that the alternating direction method of multipliers is well suited to distributed convex optimization, and in particular to large-scale problems arising in statistics, machine learning, and related areas.
Journal ArticleDOI

Clustering by fast search and find of density peaks

TL;DR: A method in which the cluster centers are recognized as local density maxima that are far away from any points of higher density, and the algorithm depends only on the relative densities rather than their absolute values.
Journal ArticleDOI

Input-to-State Stabilizing Control Under Denial-of-Service

TL;DR: This paper analyzes networked control systems in the presence of denial-of-service (DoS) attacks, namely attacks that prevent transmissions over the network, to characterize frequency and duration of the DoS attacks under which input-to-state stability (ISS) of the closed-loop system can be preserved.
Related Papers (5)