Show/Hide Menu
Hide/Show Apps
anonymousUser
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Açık Bilim Politikası
Açık Bilim Politikası
Frequently Asked Questions
Frequently Asked Questions
Browse
Browse
By Issue Date
By Issue Date
Authors
Authors
Titles
Titles
Subjects
Subjects
Communities & Collections
Communities & Collections
Distributed Models for Sparse Attack Construction and State Vector Estimation in the Smart Grid
Date
2012-11-08
Author
Ozay, Mete
Esnaola, Inaki
Yarman Vural, Fatoş Tunay
Kulkarni, Sanjeev R.
Poor, H. Vincent
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
0
views
0
downloads
Two distributed attack models and two distributed state vector estimation methods are introduced to handle the sparsity of smart grid networks in order to employ unobservable false data injection attacks and estimate state vectors. First, Distributed Sparse Attacks in which attackers process local measurements in order to achieve consensus for an attack vector are introduced. In the second attack model, called Collective Sparse Attacks, it is assumed that the topological information of the network and the measurements is available to attackers. However, attackers employ attacks to the groups of state vectors. The first distributed state vector estimation method, called Distributed State Vector Estimation, assumes that observed measurements are distributed in groups or clusters in the network. The second method, called Collaborative Sparse State Vector Estimation, consists of different operators estimating subsets of state variables. Therefore, state variables are assumed to be distributed in groups and accessed by the network operators locally. The network operators compute their local estimates and send the estimated values to a centralized network operator in order to update the estimated values.
Subject Keywords
Smart grid security
,
Distributed optimization
,
Sparse models
,
Attack detection
URI
https://hdl.handle.net/11511/54506
Collections
Department of Computer Engineering, Conference / Seminar