Detection and Prevention of False Data Injection Attack in Cyber Physical Power System

Sayyada Fahmeeda, Bhagyashree B K
{"title":"Detection and Prevention of False Data Injection Attack in Cyber Physical Power System","authors":"Sayyada Fahmeeda, Bhagyashree B K","doi":"10.1109/ICMNWC52512.2021.9688471","DOIUrl":null,"url":null,"abstract":"In the current generation power system need to be more advanced and due to the various efforts power system has made a lot of advancements in the measurements, computer and communication networks. Safety has also become the most important for the Power System. Successful False Data Injection Attack (FDIA) involves an attacker compromising power system measurement such that undetected mistakes are included in state variable calculation. FDIAs may significantly harm security by skipping detection via widely used residue-based bad data identification techniques. Study on FDIA-based cyber-attacks has indeed been widespread since the first FDIA research was published in 2009[8].CPS (Cyber Power System) is a very new form of designed system imported into a dynamic environment into computing and physical processes. CPS is helpful in technological fields like cybernetics, mechatronics, design, and built-in systems, the Internet of Things (IOT), big data, artificial intelligence (AI) and much more False Data Injection Attack (FDIA) this is termed as Fake Data Injection Attack when compromised measures create events that do not exist. How can these False Data Injection Attacks be identified It indicates that we observe whether request is coming from real users or from fraudulent users will verify if they match in our central database it will allow that request if does not match it will block that request. The project provides a summary of the theoretical foundations for Cyber-Physical Power System FDIAs with Cyber Power System FDIA Identifications.","PeriodicalId":186283,"journal":{"name":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMNWC52512.2021.9688471","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the current generation power system need to be more advanced and due to the various efforts power system has made a lot of advancements in the measurements, computer and communication networks. Safety has also become the most important for the Power System. Successful False Data Injection Attack (FDIA) involves an attacker compromising power system measurement such that undetected mistakes are included in state variable calculation. FDIAs may significantly harm security by skipping detection via widely used residue-based bad data identification techniques. Study on FDIA-based cyber-attacks has indeed been widespread since the first FDIA research was published in 2009[8].CPS (Cyber Power System) is a very new form of designed system imported into a dynamic environment into computing and physical processes. CPS is helpful in technological fields like cybernetics, mechatronics, design, and built-in systems, the Internet of Things (IOT), big data, artificial intelligence (AI) and much more False Data Injection Attack (FDIA) this is termed as Fake Data Injection Attack when compromised measures create events that do not exist. How can these False Data Injection Attacks be identified It indicates that we observe whether request is coming from real users or from fraudulent users will verify if they match in our central database it will allow that request if does not match it will block that request. The project provides a summary of the theoretical foundations for Cyber-Physical Power System FDIAs with Cyber Power System FDIA Identifications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络物理电力系统中虚假数据注入攻击的检测与防范
目前发电电力系统需要更加先进,由于各方的努力,电力系统在测量、计算机和通信网络方面取得了很大的进步。安全也成为电力系统最重要的问题。成功的虚假数据注入攻击(FDIA)涉及攻击者破坏电力系统测量,使未被检测到的错误包含在状态变量计算中。通过广泛使用的基于残留物的不良数据识别技术,fdi可能会跳过检测,从而严重危害安全性。自2009年首次发布FDIA研究报告以来,基于FDIA的网络攻击研究确实得到了广泛开展。CPS (Cyber Power System)是一种全新的设计系统,将其引入动态环境中进行计算和物理处理。CPS在控制论、机电一体化、设计和内置系统、物联网(IOT)、大数据、人工智能(AI)等技术领域很有帮助,更多的是虚假数据注入攻击(FDIA),当受损措施创建不存在的事件时,这被称为虚假数据注入攻击。如何识别这些虚假数据注入攻击它表明我们观察请求是来自真实用户还是来自欺诈用户将验证他们是否在我们的中央数据库中匹配,它将允许该请求,如果不匹配,它将阻止该请求。本项目概述了网络-物理电力系统FDIA的理论基础和网络电力系统FDIA辨识。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Off-Board Li-Ion Battery Fast Charger with Two-Stage Bidirectional Converter for Electric Vehicles Approaches Towards A Recommendation Engine For Life Insurance Products Design of Quad-Band Antenna of 3.8 GHz range for Wi-Max Applications AGROIoT - IoT Assisted Farming Fusion of Brain MR Images for Tumor Analysis using Bi-Level Stationary Wavelet Transform
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1