By Topic

Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Shuguang Cui ; Electrical and Computer Engineering, Texas A&M University, College Station, TX, USA ; Zhu Han ; Soummya Kar ; Tung T. Kim
more authors

A smart grid improves the efficiency of power grids via the aid of modern communication, signal processing, and control technologies. While smart grid integration enables power grid networks to be smarter, it also increases the risk of cyberattacks due to the strong dependence on the cyberinfrastructure in the overall system. In this article, the coordinated datainjection attack detection problem in the smart grid is considered. Specifically, the data-injection attack model is first introduced and a thorough survey of existing detection methods is then given. Afterward, three important efforts to enrich the detection solution are presented in detail: 1) attacker versus defender dynamics, where possible interactive attack and defense strategies are discussed in the context of secure phasor measurement unit (PMU) placement 2) distributed attack detection and state recovery, where the focus is how to achieve the optimal centralized performance with a distributed approach 3) quickest detection (QD), where the trade off between the detection speed and detection performance is studied. A list of associated key open problems in this area is then presented to conclude this article.

Published in:

IEEE Signal Processing Magazine  (Volume:29 ,  Issue: 5 )