Detection of cyber attack in smart grid

A Comparative Study

Conference Paper (2022)
Author(s)

Junjie Xiao (TU Delft - DC systems, Energy conversion & Storage)

Lu Wang (TU Delft - DC systems, Energy conversion & Storage)

Zian Qin (TU Delft - DC systems, Energy conversion & Storage)

P Bauera (TU Delft - DC systems, Energy conversion & Storage)

Research Group
DC systems, Energy conversion & Storage
Copyright
© 2022 J. Xiao, L. Wang, Z. Qin, P. Bauer
DOI related publication
https://doi.org/10.1109/PEMC51159.2022.9962902
More Info
expand_more
Publication Year
2022
Language
English
Copyright
© 2022 J. Xiao, L. Wang, Z. Qin, P. Bauer
Research Group
DC systems, Energy conversion & Storage
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. @en
Pages (from-to)
48-54
ISBN (electronic)
9781665496810
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Smart grid steady control relies heavily on the communication infrastructure among sensors, actuators, and control systems, which makes it vulnerable to cyber-attacks. Accurate acquisition of dynamic state information is deemed vital for efficient detection of these cyber-attacks on a smart grid. However, several popular state estimation methods at the present stage are restricted in practical use and require some assumptions. In this paper, we investigate the security of smart grid systems. We (1) identify and define the security problem in the smart grid, (2) compare the performance of several state estimate methods including Least Square, Kalman filter, Extend Kalman filter, in identifying smart grid dynamic information using measurements, and (3) investigate the Chi-square detector, Euclidean Distance, and Cosine similarity matching approaches for attack detection.

Files

A_Review_of_the_Key_Technical_... (pdf)
(pdf | 0.495 Mb)
- Embargo expired in 05-06-2023
License info not available