Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models
Download
index.pdf
Date
2013-07-01
Author
Ozay, Mete
Esnaola, Inaki
Yarman Vural, Fatoş Tunay
Kulkarni, Sanjeev R.
Poor, H. Vincent
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
199
views
88
downloads
Cite This
New methods that exploit sparse structures arising in smart grid networks are proposed for the state estimation problem when data injection attacks are present. First, construction strategies for unobservable sparse data injection attacks on power grids are proposed for an attacker with access to all network information and nodes. Specifically, novel formulations for the optimization problem that provide a flexible design of the trade-off between performance and false alarm are proposed. In addition, the centralized case is extended to a distributed framework for both the estimation and attack problems. Different distributed scenarios are proposed depending on assumptions that lead to the spreading of the resources, network nodes and players. Consequently, for each of the presented frameworks a corresponding optimization problem is introduced jointly with an algorithm to solve it. The validity of the presented procedures in real settings is studied through extensive simulations in the IEEE test systems.
Subject Keywords
Computer Networks and Communications
,
Electrical and Electronic Engineering
URI
https://hdl.handle.net/11511/39213
Journal
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
DOI
https://doi.org/10.1109/jsac.2013.130713
Collections
Department of Computer Engineering, Article
Suggestions
OpenMETU
Core
Reliable Transmission of Short Packets Through Queues and Noisy Channels Under Latency and Peak-Age Violation Guarantees
Devassy, Rahul; Durisi, Giuseppe; Ferrante, Guido Carlo; Simeone, Osvaldo; Uysal, Elif (Institute of Electrical and Electronics Engineers (IEEE), 2019-04-01)
This paper investigates the probability that the delay and the peak-age of information exceed a desired threshold in a point-to-point communication system with short information packets. The packets are generated according to a stationary memoryless Bernoulli process, placed in a single-server queue and then transmitted over a wireless channel. A variable-length stop-feedback coding scheme-a general strategy that encompasses simple automatic repetition request (ARQ) and more sophisticated hybrid ARQ techniq...
Hierarchical parallelisation strategy for multilevel fast multipole algorithm in computational electromagnetics
Ergül, Özgür Salih (Institution of Engineering and Technology (IET), 2008-01-03)
A hierarchical parallelisation of the multilevel fast multipole algorithm (MLFMA) for the efficient solution of large-scale problems in computational electromagnetics is presented. The tree structure of MLFMA is distributed among the processors by partitioning both the clusters and the samples of the fields appropriately for each level. The parallelisation efficiency is significantly improved compared to previous approaches, where only the clusters or only the fields are partitioned in a level.
Robust Tracking in Cellular Networks Using HMM Filters and Cell-ID Measurements
Bshara, Mussa; Orguner, Umut; Gustafsson, Fredrik; Van Biesen, Leo (Institute of Electrical and Electronics Engineers (IEEE), 2011-03-01)
A localization algorithm based on cell identification (Cell-ID) information is proposed. Instead of building the localization decisions only on the serving base station, all the detected Cell-IDs (serving or nonserving) by the mobile station are utilized. The statistical modeling of user motion and the measurements are done via a hidden Markov model (HMM), and the localization decisions are made with maximum a posteriori estimation criterion using the posterior probabilities from an HMM filter. The results ...
Distributed restoration in optical networks using feed-forward neural networks
Karpat, Demeter Gokisik; Bilgen, Semih (Springer Science and Business Media LLC, 2006-07-01)
A new method is proposed for determining protection paths in an optical network where users have different characteristics in terms of reliability needs and security restrictions. Survivability is achieved by distributed mesh protection. Over the preplanned primary and backup capacity, optimal routing and wavelength assignment is carried out. In case of a network failure, protection routes and optimum flow values on these protection routes are extracted from a previously trained feed-forward neural network ...
Hybrid Fault Tolerant Peer to Peer Video Streaming Architecture
Oeztoprak, Kasim; Akar, Gözde (Institute of Electronics, Information and Communications Engineers (IEICE), 2008-11-01)
In this paper, we propose a fault tolerant hybrid p2p-CDN video streaming arhitecture to overcome the problems caused by peer behavior in peer-to-peer (P2P) video streaming systems. Although there are several studies modeling and analytically investigating peer behaviors in P2P video streaming systems, they do not COMe LIP with a solution to guarantee the required Quality of the Services (QoS). Therefore, in this study a hybrid geographical location-time and interest based clustering algorithm is proposed t...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
M. Ozay, I. Esnaola, F. T. Yarman Vural, S. R. Kulkarni, and H. V. Poor, “Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models,”
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
, pp. 1306–1318, 2013, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/39213.