Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/148624
DC FieldValue
dc.titleA Stealth Cyber Attack Detection Strategy for DC Microgrids
dc.contributor.authorSUBHAM SWAROOP SAHOO
dc.contributor.authorSukumar Mishra
dc.contributor.authorPENG CHIH-HSIEN JIMMY
dc.contributor.authorTomislav Dragicevic
dc.date.accessioned2018-11-08T00:21:25Z
dc.date.available2018-11-08T00:21:25Z
dc.date.issued2018-11-01
dc.identifier.citationSUBHAM SWAROOP SAHOO, Sukumar Mishra, PENG CHIH-HSIEN JIMMY, Tomislav Dragicevic (2018-11-01). A Stealth Cyber Attack Detection Strategy for DC Microgrids. IEEE Transactions on Power Electronics. ScholarBank@NUS Repository.
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/148624
dc.description.abstractThis paper proposes a cooperative mechanism for detecting potentially deceptive cyber attacks that attempt to disregard average voltage regulation & current sharing in cyberphysical DC microgrids. Considering a set of conventional cyber attacks, the detection becomes fairly easy for distributed observer based techniques. However, a well-planned set of balanced attacks, termed as the stealth attack, can bypass the conventional observer based detection theory as the control objectives are met without any physical error involved. In this paper, we discuss the formulation & associated scope of instability from stealth attacks to deceive distributed observers realizing the necessary & sufficient conditions to model such attacks. To address this issue, a novel cooperative vulnerability factor (CVF) framework for each agent is introduced, which accurately identifies the attacked agent(s) under various scenarios. To facilitate detection under worst cases, the CVFs from the secondary voltage control sublayer is strategically cross-coupled to the current sublayer, which ultimately disorients the control objectives in the presence of stealth attacks and provides a clear norm for triggering defense mechanisms. Finally, the performance of the proposed detection strategy is simulated in MATLAB/SIMULINK environment and experimentally validated for FDI & stealth attacks on sensors and communication links.
dc.publisherIEEE
dc.subjectDC microgrid, stealth attack, false data injection, distributed control
dc.typeArticle
dc.contributor.departmentELECTRICAL AND COMPUTER ENGINEERING
dc.description.sourcetitleIEEE Transactions on Power Electronics
dc.published.statePublished
dc.grant.idR-263-000-C27-133
dc.grant.fundingagencyMinistry of Eduction Academic Research Grant Tier 1
Appears in Collections:Staff Publications
Elements

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
FINAL VERSION.pdf34.54 MBAdobe PDF

OPEN

Post-printView/Download

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.