Details of Research Outputs

TitleThe 2015 Ukraine Blackout: Implications for False Data Injection Attacks
Author (Name in English or Pinyin)
Liang, Gaoqi1; Weller, Steven R.2; Zhao, Junhua3; Luo, Fengji4; Dong, Zhao Yang5
Date Issued2017-07-01
Source PublicationIEEE TRANSACTIONS ON POWER SYSTEMS
ISSN0885-8950
EISSN1558-0679
Volume32Issue:4Pages:3317-3318
AbstractIn a false data injection attack (FDIA), an adversary stealthily compromises measurements from electricity grid sensors in a coordinated fashion, with a view to evading detection by the power system bad data detection module. A successful FDIA can cause the system operator to perform control actions that compromise either the physical or economic operation of the power system. In this letter, we consider some implications for FDIAs arising from the late 2015 Ukraine Blackout event.
KeywordCyber-attacks false data injection attacks ukraine blackout
DOI10.1109/TPWRS.2016.2631891
Indexed BySCIE
language英语
Funding ProjectChina Southern Power Grid [WYKJ00000027]
WOS Research AreaEngineering
WOS SubjectEngineering, Electrical & Electronic
WOS IDWOS:000404046600082
PublisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Original Document TypeArticle
Firstlevel Discipline动力与电气工程
Education discipline科技类
Published range国外学术期刊
Volume Issue Pages卷: 32 期: 4 页: 3317-3318
References
[1] NCCIC/ICS-CERT, "Cyber-attack against Ukrainian critical infrastructure." [Online]. Available: https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01. Accessed Jun. 20, 2016.
[2] E-ISAC and SANS, "Analysis of the cyber attack on the Ukrainian power grid: Defense use case." [Online]. Available: https://ics.sans.org/duc5. Accessed Jun. 20, 2016.
[3] Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. Inf. Syst. Security, vol. 14, no. 1, May 2011, Art. no. 13.
[4] G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Dong, "A review of false data injection attacks against modern power systems," IEEE Trans. Smart Grid, to be published.
[5] Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
[6] X. Liu, Z. Bao, D. Lu, and Z. Li, "Modeling of local false data injection attacks with reduced network information," IEEE Trans. Smart Grid, vol. 6, no. 4, pp. 1686-1696, Jul. 2015.
[7] L. Jia, J. Kim, R.J. Thomas, and L. Tong, "Impact of data quality on realtime locational marginal price," IEEE Trans. Power Syst., vol. 29, no. 2, pp. 627-636, Mar. 2014.
[8] M. A. Rahman and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart power grids," in Proc. IEEE Global Commun. Conf., pp. 3153-3158, Anaheim, CA, USA, Dec. 2012.
Data SourceWOS
Citation statistics
Cited Times [WOS]:0   [WOS Record]     [Related Records in WOS]
Document TypeJournal article
Identifierhttps://irepository.cuhk.edu.cn/handle/3EPUXD0A/502
CollectionSchool of Science and Engineering
Corresponding AuthorLiang, Gaoqi
Affiliation
1.Univ Newcastle, Ctr Intelligent Elect Networks, Callaghan, NSW 2308, Australia
2.Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW 2308, Australia
3.Chinese Univ Hong Kong Shenzhen , Shenzhen 518172, Guangdong, Peoples R China
4.Univ Sydney, Sch Civil Engn, Sydney, NSW 2006, Australia
5.Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
Recommended Citation
GB/T 7714
Liang, Gaoqi,Weller, Steven R.,Zhao, Junhuaet al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks[J]. IEEE TRANSACTIONS ON POWER SYSTEMS,2017,32(4):3317-3318.
APA Liang, Gaoqi, Weller, Steven R., Zhao, Junhua, Luo, Fengji, & Dong, Zhao Yang. (2017). The 2015 Ukraine Blackout: Implications for False Data Injection Attacks. IEEE TRANSACTIONS ON POWER SYSTEMS, 32(4), 3317-3318.
MLA Liang, Gaoqi,et al."The 2015 Ukraine Blackout: Implications for False Data Injection Attacks".IEEE TRANSACTIONS ON POWER SYSTEMS 32.4(2017):3317-3318.
Files in This Item:
There are no files associated with this item.
Related Services
Usage statistics
Google Scholar
Similar articles in Google Scholar
[Liang, Gaoqi]'s Articles
[Weller, Steven R.]'s Articles
[Zhao, Junhua]'s Articles
Baidu academic
Similar articles in Baidu academic
[Liang, Gaoqi]'s Articles
[Weller, Steven R.]'s Articles
[Zhao, Junhua]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Liang, Gaoqi]'s Articles
[Weller, Steven R.]'s Articles
[Zhao, Junhua]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.