PMU-based Line Differential Protection under GPS Spoofing Attack
نویسندگان
چکیده
Many power grid applications rely on the time synchronized measurement data collected by phasor units (PMUs) and or Merging Units (MUs)). The synchronization of from multiple PMUs MUs relies global positioning system (GPS) to provide reference. civilian GPS receivers used in PMU operate according publicly available mechanism. Therefore, attackers can easily generate false signals with low-cost portable devices. During spoofing attacks, signal received is arbitrarily modified attacker without being detected, leading malfunction other including transmission line protection. In this paper, we investigate effect attack differential protection schemes based PMUs, percentage method alpha-plane method. mis-operation these relays observed during attacks. addition, propose a quasi-dynamic state-estimation-based detect identify affected correct compromised data, enable continuous reliable operation relays. Numerical results show that proposed detects successfully recovered eliminate misoperation
منابع مشابه
Face Recognition Systems under Spoofing Attack
Face recognition system is one of the most successful application of computer vision, which has been deployed largely in recent years. In last decade, several algorithms for face recognition have been proposed in the literature. To increase reliability of face recognition systems, the systems must be able to differentiate between real genuine faces and fake faces (spoofed faces). In this paper,...
متن کاملA Robust PMU Placement Method Against Spoofing Attacks; Spoofing Detection and Data Refinement
In some recent articles, the spoofing of Phasor measurement unit (PMU) GPS receiver has been highlighted as a threat to power grid protection system. Having spoofed PMU GPS signals, one can manipulate the measurements and inject bad data to power grid protection system. The previous anti spoofing methods are all based on GPS signal analysis. The mentioned methods are just able to detect spoofin...
متن کاملMultiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack
Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel t...
متن کاملAttack Class: Address Spoofing
We present an analysis of a class of attacks we call address spoofing. Fundamentals of internetwork routing and communication are presented, followed by a discussion of the address spoofing class. The attack class is made concrete with a discussion of a well known incident. We conclude by dispelling several myths of purported security solutions including the security provided by one-time passwo...
متن کاملPrinciple of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
Man-in-the-middle attack is used wildly as a method of attacking the network. To discover how this type of attack works, this paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes a method of preventing such attacks.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ... Annual Hawaii International Conference on System Sciences
سال: 2021
ISSN: ['2572-6862', '1530-1605']
DOI: https://doi.org/10.24251/hicss.2021.407