Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures The problem of constructing malicious data attack of smart grid state estimation is considered together with countermeasures that detect the presence of such attacks. For the adversary, using a graph theoretic app...
摘要: norm penalty on the strength of attack.关键词: mean square error methods power system state estimation smart power grids malicious data attack mean square error polynomial time complexity smart grid state estimation Detectors Mean square error methods Power transmission lines 会议名称: First IEEE...
The investigation was conducted in two steps: First, a vulnerability assessment was conducted on a fully operational electric power testbed. Next, the vulnerabilities discovered were exploited to perform different types of power supply interruption attacks and malicious power generation a...
In the smart grid, efficient power supplies require near-real-time users' electricity usage metering data, but these data might leak users' private information, e.g., living habits. To address this problem, a number of privacy-preserving data aggregation schemes have been proposed in the literat...
An intelligent grid malicious data injection attack and detection methods, belong to the smart grid information security data. 它是针对在智能电网量测数据若被黑客恶意数据注入攻击时,现有检测技术方法之不足提出的. It is for hackers if they are malicious data injection attacks, deficiencies in the ...
Please refer to the representative surveys [39], [40], [41] for more details. For the CPSs suffering the false data injection attacks, a receding-horizon Stackelberg control law is proposed in [42] to counteract the adversarial false data injection attackers. The smart grids under data ...
Smart Grid Commun. ... J Hao,RJ Piechocki,D Kaleshi,... - IEEE International Conference on Smart Grid Communications 被引量: 12发表: 0年 JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET Mobile ad hoc networks (MANETs) are vulnerable to various types of attacks ...
Protect the system against replay attacks., CC ID:04552 Define and assign roles and responsibilities for malicious code protection., CC ID:15474 Establish, implement, and maintain a malicious code outbreak recovery plan., CC ID:01310 Log and react to all malicious code activity., CC ID:07072 ...
The Underwater Sensor Network (UWSN) comprises sensor nodes with sensing, data processing, and communication capabilities. Due to the limitation of underwater radio wave propagation, nodes rely on acoustic signals to communicate. The data gathered by the
Since the operation of an UWSN is mostly done remotely and unsupervised, certain types of attacks that include node impersonation, packet spoofing as well as DoS can easily be executed to the UWSN. Current single-path routing hierarchies are even more susceptible, due to data drop or ...