PMU-based Line Differential Protection under GPS Spoofing Attack

نویسندگان

چکیده

Many power grid applications rely on the time synchronized measurement data collected by phasor units (PMUs) and or Merging Units (MUs)). The synchronization of from multiple PMUs MUs relies global positioning system (GPS) to provide reference. civilian GPS receivers used in PMU operate according publicly available mechanism. Therefore, attackers can easily generate false signals with low-cost portable devices. During spoofing attacks, signal received is arbitrarily modified attacker without being detected, leading malfunction other including transmission line protection. In this paper, we investigate effect attack differential protection schemes based PMUs, percentage method alpha-plane method. mis-operation these relays observed during attacks. addition, propose a quasi-dynamic state-estimation-based detect identify affected correct compromised data, enable continuous reliable operation relays. Numerical results show that proposed detects successfully recovered eliminate misoperation

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Face Recognition Systems under Spoofing Attack

Face recognition system is one of the most successful application of computer vision, which has been deployed largely in recent years. In last decade, several algorithms for face recognition have been proposed in the literature. To increase reliability of face recognition systems, the systems must be able to differentiate between real genuine faces and fake faces (spoofed faces). In this paper,...

متن کامل

A Robust PMU Placement Method Against Spoofing Attacks; Spoofing Detection and Data Refinement

In some recent articles, the spoofing of Phasor measurement unit (PMU) GPS receiver has been highlighted as a threat to power grid protection system. Having spoofed PMU GPS signals, one can manipulate the measurements and inject bad data to power grid protection system. The previous anti spoofing methods are all based on GPS signal analysis. The mentioned methods are just able to detect spoofin...

متن کامل

Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack

Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel t...

متن کامل

Attack Class: Address Spoofing

We present an analysis of a class of attacks we call address spoofing. Fundamentals of internetwork routing and communication are presented, followed by a discussion of the address spoofing class. The attack class is made concrete with a discussion of a well known incident. We conclude by dispelling several myths of purported security solutions including the security provided by one-time passwo...

متن کامل

Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing

Man-in-the-middle attack is used wildly as a method of attacking the network. To discover how this type of attack works, this paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes a method of preventing such attacks.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the ... Annual Hawaii International Conference on System Sciences

سال: 2021

ISSN: ['2572-6862', '1530-1605']

DOI: https://doi.org/10.24251/hicss.2021.407