Blog
About

285
views
0
recommends
+1 Recommend
1 collections
    9
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Data Integrity Attacks in Smart Grid Wide Area Monitoring

      , ,

      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR)

      Cyber Security Research

      23 - 25 August 2016

      Cybersecurity, Data Integrity Attacks, Failure Scenarios, Wide Area Monitoring System

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A smart grid requires the implementation of ICT technologies in order to incorporate new functions into electricity grid monitoring and control. Wide Area Monitoring Systems (WAMSs) are used to measure synchrophasor data at different locations and give operators a near-real-time picture of what is happening in the system. The measurement data is periodically collected via communication channels to monitor, predict and control the power consumption, and detect any problems in the power grid. Attacks on WAMSs can trigger wrong decisions and create dangerous failures in the smart grid system. In this paper, we investigate data integrity attacks at different attack entry points of a WAMS, their impacts on the smart grid system, and existing mitigation strategies. We conclude from our study that the existing techniques, methodologies and mechanisms are not effective enough to detect or mitigate some attacks.

          Related collections

          Most cited references 23

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          False data injection attacks against state estimation in electric power grids

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Strategic Protection Against Data Injection Attacks on Power Grids

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Coordinated Data-Injection Attack and Detection in the Smart Grid: A Detailed Look at Enriching Detection Solutions

               S. Kar,  H. Poor,  T. T. Kim (2012)
                Bookmark

                Author and article information

                Contributors
                Conference
                August 2016
                August 2016
                : 74-83
                Affiliations
                AIT Austrian Institute of Technology

                Vienna, Austria
                TU Wien

                Vienna, Austria
                Article
                10.14236/ewic/ICS2016.9
                © Paudel et al. Published by BCS Learning & Development Ltd. Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                4th International Symposium for ICS & SCADA Cyber Security Research 2016
                ICS-CSR
                4
                Queen’s Belfast University, UK
                23 - 25 August 2016
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article