http://iet.metastore.ingenta.com
1887

Detection of PMU spoofing in power grid based on phasor measurement analysis

Detection of PMU spoofing in power grid based on phasor measurement analysis

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Generation, Transmission & Distribution — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In some recent articles, the vulnerability of phasor measurement unit (PMU) to the time synchronisation attack by spoofing its global positioning system (GPS) has been highlighted as a threat to power grid protection, control and monitoring system. Having spoofed PMU GPS signals, one can manipulate the measurements and inject bad data to power grid protection and monitoring system. The existing anti-spoofing methods are all based on GPS signal analysis. The mentioned methods are just able to detect spoofing without any data refinement as the data of power grid has not been practically used in calculations. Furthermore, some of these methods lose their certainty in noisy and harsh environments due to low power of GPS signals. A novel anti-spoofing algorithm has been proposed based on power grid infrastructures which can join to any of the existing anti-spoofing algorithm to empower spoofing detection process. The proposed algorithm adopts phasor measurement analysis and state estimation methods to detect spoofing. The composite of this algorithm with any of the existing algorithms will not only cover the probable malfunctioning in spoofing detection but also be able to refine counterfeit measurements.

http://iet.metastore.ingenta.com/content/journals/10.1049/iet-gtd.2017.1445
Loading

Related content

content/journals/10.1049/iet-gtd.2017.1445
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address