All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Optimized cyber-attack detection method of power systems using sliding mode observer

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F49777513%3A23220%2F22%3A43963715" target="_blank" >RIV/49777513:23220/22:43963715 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.sciencedirect.com/science/article/pii/S0378779621007264?via%3Dihub" target="_blank" >https://www.sciencedirect.com/science/article/pii/S0378779621007264?via%3Dihub</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1016/j.epsr.2021.107745" target="_blank" >10.1016/j.epsr.2021.107745</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Optimized cyber-attack detection method of power systems using sliding mode observer

  • Original language description

    This paper investigates the problem of automatic detection of cyber-attacks in cyber-physical systems (CPSs), where some of the state variables are corrupted by an attacker. An attack detector based on a sliding mode observer (SMO) is used to estimate the state attacks. The parameter values of the SMO-based detector have a significant role in attack detection time and also in attack detection accuracy. An on-time attack detection gives the operator or the automatic attack defender enough time to react efficiently against attacks. Moreover, attacks should be detected accurately in each state variable to be handled well. Hence, a new SMO-based attack detector with parameter adjustment is addressed in this paper using an optimization algorithm. The differential evolutionary algorithm is used to optimize detection time and detection accuracy in the presence of unknown attack vectors and adjust parameters such that attacks are detected correctly and as quickly as possible. The comparison of the simulation results on the IEEE 39-bus test system based on the proposed method and those of other available methods illustrate the capability of the optimized attack detection scheme in terms of detection accuracy and detection time in the presence of unknown attack vectors.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    20201 - Electrical and electronic engineering

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2022

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    ELECTRIC POWER SYSTEMS RESEARCH

  • ISSN

    0378-7796

  • e-ISSN

    1873-2046

  • Volume of the periodical

    205

  • Issue of the periodical within the volume

    April 2022

  • Country of publishing house

    CH - SWITZERLAND

  • Number of pages

    12

  • Pages from-to

    1-12

  • UT code for WoS article

    000793762400012

  • EID of the result in the Scopus database

    2-s2.0-85122801553