http://iet.metastore.ingenta.com
1887

access icon openaccess Structural detectability analysis of cyber attacks for power grids via graph theory

  • PDF
    2.3320741653442383MB
  • HTML
    277.9931640625Kb
  • XML
    239.353515625Kb
Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/3/3/IET-CPS.2017.0070.html;jsessionid=7lceg2g7ra4q.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2017.0070&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Liu, L.C., Esmalifalak, M., Ding, Q.G., et al: ‘Detecting false data injection attacks on power grid by sparse optimization’, IEEE Trans. Smart Grid, 2014, 5, (2), pp. 612621.
    2. 2)
      • 2. Bai, H., Miao, S.H.: ‘Hybrid flow betweenness approach for identification of vulnerable line in power system’, IET Gener. Transm. Distrib., 2015, 9, (12), pp. 13241331.
    3. 3)
      • 3. Liu, N., Zhang, J.H., Zhang, H., et al: ‘Security assessment for communication networks of power control systems using attack graph and MCDM’, IEEE Trans. Power Deliv., 2010, 25, (3), pp. 14921500.
    4. 4)
      • 4. He, H., Yan, J.: ‘Cyber-physical attacks and defences in the smart grid: a survey’, IET Cyber-Phys. Syst.: Theory Appl., 2016, 1, (1), pp. 1327.
    5. 5)
      • 5. Jaeger, J., Krebs, R.: ‘Automated protection security assessment of today's and future power grids’. IEEE Power and Energy Society General Meeting, Minneapolis, USA, 25–29 July 2010, pp. 16.
    6. 6)
      • 6. Hashimoto, H., Hayakawa, T.: ‘Distributed cyber attack detection for power network systems’. 50th IEEE Conf. on Decision and Control and European Control Conf., Orlando, USA, 12–15 December 2011, pp. 58205824.
    7. 7)
      • 7. Tajer, A., Kar, S., Poor, H.V., et al: ‘Distributed joint cyber attack detection and state recovery in smart grids’. IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 17–20 October 2011, pp. 202207.
    8. 8)
      • 8. Yan, J., Liu, C.C., Vaidya, U.: ‘PMU-based monitoring of rotor angle dynamics’, IEEE Trans. Power Syst., 2011, 26, (4), pp. 21252133.
    9. 9)
      • 9. Dasgupta, S., Paramasivam, M., Vaidya, U., et al: ‘PMU-based model-free approach for real-time rotor angle monitoring’, IEEE Power Eng. Lett., 2014, 30, (5), pp. 28182819.
    10. 10)
      • 10. Pasqualetti, F., Dörfler, F., Bullo, F.: ‘Attack detection and identification in cyber-physical systems’, IEEE Trans. Autom. Control, 2012, 58, (11), pp. 27152729.
    11. 11)
      • 11. Yu, W.W., Wen, G.H., Lü, J.H., et al: ‘Pinning observability in complex networks’, IET Control Theory Appl., 2015, 8, (18), pp. 21362144.
    12. 12)
      • 12. Kim, J., Tong, L., Thomas, R.J.: ‘Data framing attack on state estimation’, IEEE J. Sel. Areas Commun., 2014, 32, (7), pp. 14601470.
    13. 13)
      • 13. Deka, D., Baldick, R., Vishwanath, S.: ‘Optimal data attacks on power grids: leveraging detection & measurement jamming’. IEEE Int. Conf. on Smart Grid Communications. IEEE, 2015, pp. 392–397.
    14. 14)
      • 14. Pequito, S., Kar, S., Aguiar, A.P.: ‘A structured systems approach for optimal actuator-sensor placement in linear time-invariant systems’. American Control Conference (ACC), Washington, DC, USA, 17–19 June 2013, pp. 61086113.
    15. 15)
      • 15. Pequito, S., Kar, S., Aguiar, A.P.: ‘A framework for structural input/output and control configuration selection in large-scale systems’, IEEE Trans. Autom. Control, 2016, 61, (2), pp. 303318.
    16. 16)
      • 16. Pequito, S., Kar, S., Aguiar, A.P.: ‘Minimum number of information gatherers to ensure full observability of a dynamic social network: A structural systems approach’. IEEE Global Conf. on Signal and Information Processing (GlobalSIP), Network Theory, Atlanta, USA, December 3–5 2014, pp. 750753.
    17. 17)
      • 17. Parlangeli, G., Notarstefano, G.: ‘On the reachability and observability of path and cycle graphs’, IEEE Trans. Autom. Control, 2012, 57, (3), pp. 743748.
    18. 18)
      • 18. Hong, S., Lee, M.H., Chun, H.H., et al: ‘Observability of error states in GPS/INS integration’, IEEE Trans. Veh. Technol., 2005, 54, (2), pp. 731743.
    19. 19)
      • 19. Sundaram, S., Hadjicostis, C.N.: ‘Structural controllability and observability of linear systems over finite fields with applications to multi-agent systems’, IEEE Trans. Autom. Control, 2013, 58, (1), pp. 6073.
    20. 20)
      • 20. Ramos, G., Pequito, S., Aguiar, A.P., et al: ‘A model checking framework for linear time invariant switching systems using structural systems analysis’. 51st Annual Allerton Conf. on Communication, Control, and Computing (Allerton), Monticello, USA, 2–4 October 2013, pp. 973980.
    21. 21)
      • 21. Boukhobza, T., Hamelin, F., Sauter, D.: ‘Observability of structured linear systems in descriptor form: a graph-theoretic approach’, Automatica, 2006, 42, (4), pp. 629635.
    22. 22)
      • 22. Pasqualetti, F., Dorfler, F., Bullo, F.: ‘Cyber-physical security via geometric control: distributed monitoring and malicious attacks’. IEEE 51st Annual Conf. on Decision and Control (CDC), Maui, HI, USA, December 10–13 2012, pp. 34183425.
    23. 23)
      • 23. Scholtz, E.: ‘Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems’. PhD dissertation, Massachusetts Institute of Technology, 2004.
    24. 24)
      • 24. Zufiria, P.J., Luis, U.M., Carlos, H.Y., et al: ‘Mathematical foundations for efficient structural controllability and observability analysis of complex systems’, Math. Probl. Eng., 2014, p. 12, Article ID 676313.
    25. 25)
      • 25. Pasqualetti, F., Bicchi, A, Bullo, F.: ‘A graph-theoretical characterization of power network vulnerabilities’. American Control Conf. (ACC), IEEE, San Francisco, CA, June 29 2011-July 1 2011, pp. 39183923.
    26. 26)
      • 26. Dion, J.M., Commault, C., van der Woude, J.: ‘Generic properties and control of linear structured systems: a survey’, Automatica, 2003, 39, (7), pp. 11251144.
    27. 27)
      • 27. Lin, C.: ‘Structural controllability’, IEEE Trans. Autom. Control, 1974, 19, (3), pp. 201208.
    28. 28)
      • 28. Quiros-Tortos, J., Terzija, V.: ‘A graph theory based new approach for power system restoration’. IEEE Grenoble PowerTech (POWERTECH), Grenoble, June 16–20 2013, pp. 16.
    29. 29)
      • 29. Cormen, T.H., Stein, C., Rivest, R.L., et al: ‘Introduction to algorithms’ (McGraw-Hill Higher Education, 2001, 2nd edn.).
    30. 30)
      • 30. Xiao, Y.D., Lao, S.Y., Hou, L.L., et al: ‘Network controllability based on node overloaded failure’, Acta Phys. Sin., 2013, 62, (18), pp. 18.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0070
Loading

Related content

content/journals/10.1049/iet-cps.2017.0070
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address