scholarly journals Net Load Redistribution Attacks on Nodal Voltage Magnitude Estimation in AC Distribution Networks.pdf

Author(s):  
hang zhang ◽  
Bo Liu ◽  
Hongyu Wu

This paper presents a false data injection attack against AC state estimation in distribution system. Such attack is called net local load redistribution attacks (NRLA) which is aimed at misleading the distribution system operator to observe illusory under-voltage issues in the AC state estimation. The attack vector is constructed with only local network information.<br>

2020 ◽  
Author(s):  
hang zhang ◽  
Bo Liu ◽  
Hongyu Wu

This paper presents a false data injection attack against AC state estimation in distribution system. Such attack is called net local load redistribution attacks (NRLA) which is aimed at misleading the distribution system operator to observe illusory under-voltage issues in the AC state estimation. The attack vector is constructed with only local network information.<br>


Complexity ◽  
2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Huixin Zhong ◽  
Dajun Du ◽  
Chuanjiang Li ◽  
Xue Li

The paper investigates a novel sparse false data injection attack method in a smart grid (SG) with incomplete power network information. Most existing methods usually require the known complete power network information of SG. The main objective of this paper is to propose an effective sparse false data injection attack strategy under a more practical situation where attackers can only have incomplete power network information and limited attack resources to access the measurements. Firstly, according to the obtained measurements and power network information, some incomplete power network information is compensated by using the power flow equation approach. Then, the fault tolerance range of bad data detection (BDD) for the attack residual increment is estimated by calculating the detection threshold of the residual L2-norm test. Finally, an effective sparse imperfect strategy is proposed by converting the choice of measurements into a subset selection problem, which is solved by the locally regularized fast recursive (LRFR) algorithm to effectively improve the sparsity of attack vectors. Simulation results on an IEEE 30-bus system and a real distribution network system confirm the feasibility and effectiveness of the proposed new attack construction method.


Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1253
Author(s):  
Xiulan Song ◽  
Xiaoxin Lou ◽  
Junwei Zhu ◽  
Defeng He

This paper considers the state estimation problem of intelligent connected vehicle systems under the false data injection attack in wireless monitoring networks. We propose a new secure state estimation method to reconstruct the motion states of the connected vehicles equipped with cooperative adaptive cruise control (CACC) systems. First, the set of CACC models combined with Proportion-Differentiation (PD) controllers are used to represent the longitudinal dynamics of the intelligent connected vehicle systems. Then the notion of sparseness is employed to model the false data injection attack of the wireless networks of the monitoring platform. According to the corrupted data of the vehicles’ states, the compressed sensing principle is used to describe the secure state estimation problem of the connected vehicles. Moreover, the L1 norm optimization problem is solved to reconstruct the motion states of the vehicles based on the orthogonaldecomposition. Finally, the simulation experiments verify that the proposed method can effectively reconstruct the motion states of vehicles for remote monitoring of the intelligent connected vehicle system.


Sign in / Sign up

Export Citation Format

Share Document