220
Views
6
CrossRef citations to date
0
Altmetric
Articles

Detection and isolation of false data injection attack via adaptive Kalman filter bank

, , ORCID Icon &
Pages 60-72 | Received 13 Jan 2022, Accepted 19 Oct 2022, Published online: 31 Oct 2022

References

  • An, N., & Weber, S. (2017). Impact of sample size on false alarm and missed detection rates in PCA-based anomaly detection. 51st Annual Conference on Information Sciences and Systems (CISS), 1(1), 22–24. https://doi.org/10.1109/CISS.2017.7926160
  • Deng, R., Xiao, G., Lu, R., & Liang, H. (2017). False data injection on state estimation in power systems – Attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics, 13(2), 411–423. https://doi.org/10.1109/TII.2016.2614396
  • Douligeris, C., & Mitrokotsa, A. (2003). DDoS attacks and defense mechanisms: A classification. The Third IEEE International Symposium on Signal Processing and Information Technology, 1(1), 190–193. https://doi.org/10.1109/ISSPIT.2003.1341092
  • Esmalifalak, M., Liu, L., Nguyen, N., Zheng, R., & Han, Z. (2017). Detecting stealthy false data injection using machine learning in smart grid. IEEE System Journal, 11(3), 1644–1652. https://doi.org/10.1109/JSYST.2014.2341597
  • Gu, Y., Liu, T., Wang, D., Guan, X., & Xu, Z. (2013). Bad data detection method for smart grids based on distributed state estimation. IEEE International Conference on Communications, 1(1), 4483–4487. https://doi.org/10.1109/ICC.2013.6655273
  • Houiji, M., Hamdaoui, R., & Aoun, M. (2016). Robust fault detection performances for stochastic systems based on adaptive threshold. The 13th International Multi-conference on Systems, Signals & Devices, 1(1), 617–624. https://doi.org/10.1109/SSD.2016.7473701
  • Jindal, A., Dua, A., Kaur, K., Singh, M., Kumar, N., & Mishra, S. (2016). Decision tree and SVM-based data analytics for theft detection in smart grid. IEEE Transactions on Industrial Informatics, 12(3), 1005–1016. https://doi.org/10.1109/TII.2016.2543145
  • Khanna, K., Panigrahi, B. K., & Joshi, A. (2018). AI-based approach to identify compromised meters in data integrity attacks on smart grid. IET Generation, Transmission & Distribution, 12(5), 1052–1066. https://doi.org/10.1049/gtd2.v12.5
  • Kwon, C., & Hwang, I. (2018). Reachability analysis for safety assurance of cyber–physical systems against cyber attacks. IEEE Transactions on Automatic Control, 63(7), 2272–2279. https://doi.org/10.1109/TAC.2017.2761762
  • Li, W., Wei, G., Ding, D., Liu, Y., & Alsaadi, F. E. (2018). A new look at boundedness of error covariance of Kalman filtering. IEEE Transactions on Systems, Man & Cybernetics Systems, 48(2), 309–314. https://doi.org/10.1109/TSMC.2016.2598845
  • Liu, J., Chen, H., & Liu, N. (2017). Effective Sage-Husa Kalman filter for SINS/Doppler/Platform compass integrated navigation system. IEEE Chinese Guidance, Navigation and Control Conference, 1(1), 541–546. https://doi.org/10.1109/CGNCC.2016.7828843
  • Liu, Y., Wang, Z., He, X., & Zhou, D. H. (2016). Minimum-variance recursive filtering over sensor networks with stochastic sensor gain degradation: Algorithms and performance analysis. IEEE Transactions on Control of Network Systems, 3(3), 265–274. https://doi.org/10.1109/TCNS.2015.2459351
  • Lu, P., Zhao, L., & Chen, Z. (2007). Improved Sage-Husa adaptive filtering and its application. Journal of System Simulation, 19(15), 3503–3505. https://doi.org/10.16182/j.cnki.joss.2007.15.019
  • Luo, X. Y., Yao, Q., Wang, X. Y., & Guan, X. P. (2018). Observer-based cyber attack detection and isolation in smart grids. International Journal of Electrical Power & Energy Systems, 101(1), 127–138. https://doi.org/10.1016/j.ijepes.2018.02.039
  • Manandhar, K., Cao, X., Hu, F., & Liu, Y. (2014). Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Transactions on Control of Network Systems, 1(4), 370–379. https://doi.org/10.1109/TCNS.2014.2357531
  • Metke, A. R., & Ekl, R. L. (2010). Security technology for smart grid networks. IEEE Transactions on Smart Grid, 1(1), 99–107. https://doi.org/10.1109/TSG.2010.2046347
  • Mo, Y., & Sinopoli, B. (2010). False data injection attacks in control systems. Proc. 1st Workshop Secure Control System, 1(1), 1–6. https://www.semanticscholar.org/paper/False-Data-Injection-Attacks-in-Control-Systems-Mo-Sinopoli/f44c3c65b572748dbad5fbcd2f93f1a364b661e2
  • Moslemi, R., Mesbahi, A., & Velni, J. M. (2018). A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids. IEEE Transactions on Smart Grid, 9(5), 4930–4941. https://doi.org/10.1109/TSG.5165411
  • Musleh, A. S., Chen, G., & Dong, Z. Y. (2020). A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Transactions on Smart Grid, 11(3), 2218–2234. https://doi.org/10.1109/TSG.5165411
  • Nagi, J., Yap, K. S., Tiong, S. K., Ahmed, S. K., & Nagi, F. (2011). Improving SVM-based nontechnical loss detection in power utility using the fuzzy inference system. IEEE Transactions on Power Delivery, 26(2), 1284–1285. https://doi.org/10.1109/TPWRD.2010.2055670
  • Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber–physical systems. IEEE Transactions on Automatic Control, 58(11), 2715–2729. https://doi.org/10.1109/TAC.2013.2266831
  • Reppa, V., Polycarpou, M. M., & Panayiotou, C. G. (2015). Decentralized isolation of multiple sensor faults in large-scale interconnected nonlinear systems. IEEE Transactions on Automatic Control, 60(6), 1582–1596. https://doi.org/10.1109/TAC.2014.2384371
  • Teixeira, A., Sandberg, H., & Johansson, K. H. (2010). Networked control systems under cyber attacks with applications to power networks. Proceedings of the 2010 American Control Conference, 1(1), 3690–3696. https://doi.org/10.1109/ACC.2010.5530638
  • Trinh, D. H., & Chafouk, H. (2011). Fault detection and isolation using Kalman filter bank for a wind turbine generator. Proceedings of the 19th Mediterranean Conference on Control Automation, 1(1), 144–149. https://doi.org/10.1109/MED.2011.5983155
  • Xie, L., Mo, Y., & Sinopoli, B. (2010). False data injection attacks in electricity markets. IEEE International Conference on Smart Grid Communications, 1(1), 226–231. https://doi.org/10.1109/SMARTGRID.2010.5622048
  • Xu, D., Wu, Z., & Huang, Y. (2019). A new adaptive Kalman filter with inaccurate noise statistics. Circuits Systems and Signal Processing, 38(1), 4380–4404. https://doi.org/10.1007/s00034-019-01053-w
  • Xue, H., Guo, X., & Zhou, Z. (2017). SINS initial alignment method based on adaptive multiple fading factors Kalman filter. Journal of Systems Engineering & Electronics, 39(3), 620–626. https://doi.org/10.3969/j.issn.1001-506X.2017.03.24
  • Yan, J., Guo, F., & Wen, C. (2020). Attack detection and isolation for distributed load shedding algorithm in microgrid systems. IEEE Journal of Emerging and Selected Topics in Industrial Electronics, 1(1), 102–110. https://doi.org/10.1109/JESTIE.8847244
  • Yu, W., Griffith, D., Ge, L., Bhattarai, S., & Golmie, N. (2015). An integrated detection system against false data injection attacks in the smart grid. Secur Commun Networks, 8(2), 3690–3696. https://doi.org/10.1002/sec.957
  • Yu, Z. H., & Chin, W. L. (2015). Blind false data injection attack using PCA approximation method in smart grid. IEEE Transactions on Smart Grid, 6(3), 1219–1226. https://doi.org/10.1109/TSG.2014.2382714
  • Zhong, M., Ding, S. X., Lam, J., & Wang, H. (2003). Brief an LMI approach to design robust fault detection filter for uncertain LTI systems. Automatica, 39(3), 543–550. https://doi.org/10.1016/S0005-1098(02)00269-8
  • Zhu, J., Zhang, G., Wang, T., & Zhao, J. (2016). Overview of fraudulent data attack on power system state estimation and defense mechanism. Power System Technology, 40(8), 2406–2415. https://doi.org/10.13335/j.1000-3673.pst.2016.08.023

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.