Sensor Scheduling-Based Detection of False Data Injection Attacks in Power System State Estimation
-
- OBATA Sho
- Graduate School of Information Science and Technology, Hokkaido University
-
- KOBAYASHI Koichi
- Graduate School of Information Science and Technology, Hokkaido University
-
- YAMASHITA Yuh
- Graduate School of Information Science and Technology, Hokkaido University
Abstract
<p>In the state estimation of steady-state power networks, a cyber attack that cannot be detected from the residual (i.e., the estimation error) is called a false data injection (FDI) attack. In this letter, to enforce the security of power networks, we propose a method of detecting an FDI attack. In the proposed method, an FDI attack is detected by randomly choosing sensors used in the state estimation. The effectiveness of the proposed method is presented by two examples including the IEEE 14-bus system.</p>
Journal
-
- IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
-
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E105.A (6), 1015-1019, 2022-06-01
The Institute of Electronics, Information and Communication Engineers
- Tweet
Keywords
Details 詳細情報について
-
- CRID
- 1390573726315210624
-
- NII Article ID
- 130008128614
-
- ISSN
- 17451337
- 09168508
-
- HANDLE
- 2115/90183
-
- Text Lang
- en
-
- Data Source
-
- JaLC
- IRDB
- Crossref
- CiNii Articles
- KAKEN
-
- Abstract License Flag
- Disallowed