IDEAS home Printed from https://ideas.repec.org/a/eee/apmaco/v400y2021ics0096300321001041.html
   My bibliography  Save this article

Cyber attack estimation and detection for cyber-physical power systems

Author

Listed:
  • Li, Lei
  • Wang, Wenting
  • Ma, Qiang
  • Pan, Kunpeng
  • Liu, Xin
  • Lin, Lin
  • Li, Jian

Abstract

This paper mainly studies the problem of cyber attack estimation and detection in cyber-physical power systems (CPPS). Firstly, CPPS under cyber state attack and sensor attack are modeled through system characteristics. Secondly, to achieve attack estimation, two robust observers are designed for the CPPS under state attack and sensor attack respectively, which can guarantee the error systems are asymptotically stable with a prescribed H∞ performance. Next, to achieve attack detection, attack detection logic is introduced by comparing the threshold with the estimated attack. Finally, in order to show the feasibility of the state attack and sensor attack detection, taking power systems with three generators and six buses as an example, the simulation results are given.

Suggested Citation

  • Li, Lei & Wang, Wenting & Ma, Qiang & Pan, Kunpeng & Liu, Xin & Lin, Lin & Li, Jian, 2021. "Cyber attack estimation and detection for cyber-physical power systems," Applied Mathematics and Computation, Elsevier, vol. 400(C).
  • Handle: RePEc:eee:apmaco:v:400:y:2021:i:c:s0096300321001041
    DOI: 10.1016/j.amc.2021.126056
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0096300321001041
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.amc.2021.126056?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Liu, Cheng-Qian & Li, Xiao-Jian & Long, Yue & Sun, Jie, 2020. "Output feedback secure control for cyber-physical systems against sparse sensor attacks," Applied Mathematics and Computation, Elsevier, vol. 384(C).
    2. Feng, Zongying & Shao, Hanyong & Shao, Lin, 2020. "Further results on event-triggered H∞ networked control for neural networks with stochastic cyber-attacks," Applied Mathematics and Computation, Elsevier, vol. 386(C).
    3. Giani, Annarita & Bent, Russell & Pan, Feng, 2014. "Phasor measurement unit selection for unobservable electric power data integrity attack detection," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(3), pages 155-164.
    4. Huang, Xin & Dong, Jiuxiang, 2020. "A Robust Dynamic Compensation Approach for Cyber-Physical Systems Against Multiple Types of Actuator Attacks," Applied Mathematics and Computation, Elsevier, vol. 380(C).
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Oliveira, Pedro M. & Palma, Jonathan M. & Lacerda, Márcio J., 2022. "H2 state-feedback control for discrete-time cyber-physical uncertain systems under DoS attacks," Applied Mathematics and Computation, Elsevier, vol. 425(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Su, Qingyu & Wang, Handong & Sun, Chaowei & Li, Bo & Li, Jian, 2022. "Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy," Applied Mathematics and Computation, Elsevier, vol. 413(C).
    2. Song, Yunbo & Ye, Dan, 2021. "Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systems," Applied Mathematics and Computation, Elsevier, vol. 393(C).
    3. Solat, Amirhossein & Gharehpetian, G.B. & Naderi, Mehdi Salay & Anvari-Moghaddam, Amjad, 2024. "On the control of microgrids against cyber-attacks: A review of methods and applications," Applied Energy, Elsevier, vol. 353(PA).
    4. Gao, Rui & Yang, Guang-Hong, 2022. "Sampled-data distributed state estimation with multiple transmission channels under denial-of-service attacks," Applied Mathematics and Computation, Elsevier, vol. 429(C).
    5. Xie, Jiyang & Zhu, Shuqian & Zhang, Dawei, 2022. "A robust distributed secure interval observation approach for uncertain discrete-time positive systems under deception attacks," Applied Mathematics and Computation, Elsevier, vol. 413(C).
    6. Reda, Haftu Tasew & Anwar, Adnan & Mahmood, Abdun, 2022. "Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts," Renewable and Sustainable Energy Reviews, Elsevier, vol. 163(C).
    7. Genge, Béla & Kiss, István & Haller, Piroska, 2015. "A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 10(C), pages 3-17.
    8. Lü, Shao-Yu & Jin, Xiao-Zheng & Wang, Hai & Deng, Chao, 2021. "Robust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of service," Applied Mathematics and Computation, Elsevier, vol. 404(C).
    9. Haller, Piroska & Genge, Béla & Duka, Adrian-Vasile, 2019. "On the practical integration of anomaly detection techniques in industrial control applications," International Journal of Critical Infrastructure Protection, Elsevier, vol. 24(C), pages 48-68.
    10. Genge, Béla & Haller, Piroska & Kiss, István, 2016. "A framework for designing resilient distributed intrusion detection systems for critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 15(C), pages 3-11.
    11. Oliveira, Pedro M. & Palma, Jonathan M. & Lacerda, Márcio J., 2022. "H2 state-feedback control for discrete-time cyber-physical uncertain systems under DoS attacks," Applied Mathematics and Computation, Elsevier, vol. 425(C).
    12. Sun, Haibin & Cui, Yahui & Hou, Linlin & Shi, Kaibo, 2022. "Adaptive finite-time control for cyber-physical systems with injection and deception attacks," Applied Mathematics and Computation, Elsevier, vol. 430(C).
    13. Hou, Linlin & Li, Yao & Luo, Wende & Sun, Haibin, 2022. "Adaptive tracking control of switched cyber-physical systems with cyberattacks," Applied Mathematics and Computation, Elsevier, vol. 415(C).
    14. Dai, Shifang & Zha, Lijuan & Liu, Jinliang & Xie, Xiangpeng & Tian, Engang, 2022. "Fault detection filter design for networked systems with cyber attacks," Applied Mathematics and Computation, Elsevier, vol. 412(C).
    15. Ma, Yan & Zhang, Zhenzhen & Yang, Li & Chen, Hao & Zhang, Yihao, 2022. "A resilient optimized dynamic event-triggered mechanism on networked control system with switching behavior under mixed attacks," Applied Mathematics and Computation, Elsevier, vol. 430(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:apmaco:v:400:y:2021:i:c:s0096300321001041. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/applied-mathematics-and-computation .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.