Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/148624
DC Field | Value | |
---|---|---|
dc.title | A Stealth Cyber Attack Detection Strategy for DC Microgrids | |
dc.contributor.author | SUBHAM SWAROOP SAHOO | |
dc.contributor.author | Sukumar Mishra | |
dc.contributor.author | PENG CHIH-HSIEN JIMMY | |
dc.contributor.author | Tomislav Dragicevic | |
dc.date.accessioned | 2018-11-08T00:21:25Z | |
dc.date.available | 2018-11-08T00:21:25Z | |
dc.date.issued | 2018-11-01 | |
dc.identifier.citation | SUBHAM SWAROOP SAHOO, Sukumar Mishra, PENG CHIH-HSIEN JIMMY, Tomislav Dragicevic (2018-11-01). A Stealth Cyber Attack Detection Strategy for DC Microgrids. IEEE Transactions on Power Electronics. ScholarBank@NUS Repository. | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/148624 | |
dc.description.abstract | This paper proposes a cooperative mechanism for detecting potentially deceptive cyber attacks that attempt to disregard average voltage regulation & current sharing in cyberphysical DC microgrids. Considering a set of conventional cyber attacks, the detection becomes fairly easy for distributed observer based techniques. However, a well-planned set of balanced attacks, termed as the stealth attack, can bypass the conventional observer based detection theory as the control objectives are met without any physical error involved. In this paper, we discuss the formulation & associated scope of instability from stealth attacks to deceive distributed observers realizing the necessary & sufficient conditions to model such attacks. To address this issue, a novel cooperative vulnerability factor (CVF) framework for each agent is introduced, which accurately identifies the attacked agent(s) under various scenarios. To facilitate detection under worst cases, the CVFs from the secondary voltage control sublayer is strategically cross-coupled to the current sublayer, which ultimately disorients the control objectives in the presence of stealth attacks and provides a clear norm for triggering defense mechanisms. Finally, the performance of the proposed detection strategy is simulated in MATLAB/SIMULINK environment and experimentally validated for FDI & stealth attacks on sensors and communication links. | |
dc.publisher | IEEE | |
dc.subject | DC microgrid, stealth attack, false data injection, distributed control | |
dc.type | Article | |
dc.contributor.department | ELECTRICAL AND COMPUTER ENGINEERING | |
dc.description.sourcetitle | IEEE Transactions on Power Electronics | |
dc.published.state | Published | |
dc.grant.id | R-263-000-C27-133 | |
dc.grant.fundingagency | Ministry of Eduction Academic Research Grant Tier 1 | |
Appears in Collections: | Staff Publications Elements |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
FINAL VERSION.pdf | 34.54 MB | Adobe PDF | OPEN | Post-print | View/Download |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.