Sorry, you need to enable JavaScript to visit this website.

Communications and Network Security

Detection of False Data Injection Attacks in Smart Grid Communication Systems


The transformation of traditional energy networks to smart grids can assist in revolutionizing the energy industry
in terms of reliability, performance and manageability. However, increased connectivity of power grid assets for bidirectional communications presents severe security vulnerabilities. In this paper, we investigate Chi-square detector and cosine similarity matching approaches for attack detection in smart grids where Kalman filter estimation is used to measure any deviation from actual measurements. The cosine similarity matching approach is

Paper Details

Authors:
Chandra Bajracharya
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

Attack Detection in Smart Grid @ GlobalSIP 2015.pdf

(75)

Subscribe

[1] Chandra Bajracharya, "Detection of False Data Injection Attacks in Smart Grid Communication Systems", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/538. Accessed: Apr. 24, 2019.
@article{538-15,
url = {http://sigport.org/538},
author = {Chandra Bajracharya },
publisher = {IEEE SigPort},
title = {Detection of False Data Injection Attacks in Smart Grid Communication Systems},
year = {2015} }
TY - EJOUR
T1 - Detection of False Data Injection Attacks in Smart Grid Communication Systems
AU - Chandra Bajracharya
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/538
ER -
Chandra Bajracharya. (2015). Detection of False Data Injection Attacks in Smart Grid Communication Systems. IEEE SigPort. http://sigport.org/538
Chandra Bajracharya, 2015. Detection of False Data Injection Attacks in Smart Grid Communication Systems. Available at: http://sigport.org/538.
Chandra Bajracharya. (2015). "Detection of False Data Injection Attacks in Smart Grid Communication Systems." Web.
1. Chandra Bajracharya. Detection of False Data Injection Attacks in Smart Grid Communication Systems [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/538

A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing


In wireless communication systems, spoofing attack significantly impact the information security, for this attack is not hard to launch with little effort. Although traditional cryptographic authentication can be utilized for node identification, it is not desirable in some low power requirements application scenarios such as Wireless Sensor Networks (WSNs). In this paper, we formulate this problem as one of sparse signal processing. In order to identify the existence of the spoofing attacker, we explore using the feature extraction and fusion

Paper Details

Authors:
Shichao Lv; Ting Jiang; Ge Zhou
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing.pdf

(86)

Subscribe

[1] Shichao Lv; Ting Jiang; Ge Zhou, "A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/290. Accessed: Apr. 24, 2019.
@article{290-15,
url = {http://sigport.org/290},
author = {Shichao Lv; Ting Jiang; Ge Zhou },
publisher = {IEEE SigPort},
title = {A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing},
year = {2015} }
TY - EJOUR
T1 - A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing
AU - Shichao Lv; Ting Jiang; Ge Zhou
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/290
ER -
Shichao Lv; Ting Jiang; Ge Zhou. (2015). A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing. IEEE SigPort. http://sigport.org/290
Shichao Lv; Ting Jiang; Ge Zhou, 2015. A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing. Available at: http://sigport.org/290.
Shichao Lv; Ting Jiang; Ge Zhou. (2015). "A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing." Web.
1. Shichao Lv; Ting Jiang; Ge Zhou. A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/290

Coordinated attacks against substations and transmission lines in power grids


This is an overview poster on recent research of investigating malicious attacks against power transmission systems with the assumption that attacks can happen on substations and transmission lines.

For more information, please check out the publication at IEEE Xplore:

Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun and Haibo He, "Coordinated attacks against substations and transmission lines in power grids," 2014 IEEE Global Communications Conference (GLOBECOM, pp.655-661, Dec. 8-12, 2014.
<10.1109/GLOCOM.2014.7036882>

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

GLOBECOM_2014.pdf

(567)

Subscribe

[1] , "Coordinated attacks against substations and transmission lines in power grids", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/145. Accessed: Apr. 24, 2019.
@article{145-15,
url = {http://sigport.org/145},
author = { },
publisher = {IEEE SigPort},
title = {Coordinated attacks against substations and transmission lines in power grids},
year = {2015} }
TY - EJOUR
T1 - Coordinated attacks against substations and transmission lines in power grids
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/145
ER -
. (2015). Coordinated attacks against substations and transmission lines in power grids. IEEE SigPort. http://sigport.org/145
, 2015. Coordinated attacks against substations and transmission lines in power grids. Available at: http://sigport.org/145.
. (2015). "Coordinated attacks against substations and transmission lines in power grids." Web.
1. . Coordinated attacks against substations and transmission lines in power grids [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/145

Pages