Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/433838
Title: | Improved FDIA threat protection mechanisms in smart grid |
Researcher: | Sheryl Arulini, A |
Guide(s): | Joseph Jawhar, S |
Keywords: | Cyber security Engineering Engineering and Technology Engineering Electrical and Electronic Smart grid Transmission |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Smart grid uses various communication technologies to enhance the reliability and efficiency of the power grid. It allows bi-directional flow of electricity and information, about the current status of the grid and requirements of customers, among diverse groups in the grid, i.e., connect generation, distribution, transmission, and consumption subsystems. Thus, a smart grid reduces the power losses and increases the efficiency of electricity generation and distribution. Although the smart grid enhances the services of the grid, it endangers the grid to the cyber security threats that communication networks suffer from in addition to other novel threats because of the nature of the power grid. For instance, the electricity consumption messages sent from consumers to the utility company via the wireless network may be captured, modified, or replayed by adversaries. As a result, security and privacy concerns are major challenges in the smart grid. State estimation in the electric power system is the process that describes the condition of the grid by estimating the state variables using the data obtained by sensors placed in numerous parts of the grid. The continuous operation of the grid requires the state estimation to be done using the right data. To detect the existence of any bad data that may mislead state estimation, the renowned Bad Data Detection Test (BDD) is used. However, the false data injection attack (FDIA) bypasses the BDD test effortlessly. Several kinds of research have been conducted to detect the presence of FDIA. This paper presents two Convex Optimization-based Robust Principal Component Analysis (RPCA) algorithms that use and#119897;1 norm as convex surrogate replacing the non-convex lo norm, for solving this problem. The first technique uses a proximal gradient algorithm that is directly applied to the primal problem. The second technique uses a gradient algorithm applied to the conjugate transpose problem. newline |
Pagination: | xiv,154p. |
URI: | http://hdl.handle.net/10603/433838 |
Appears in Departments: | Faculty of Electrical Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 29.36 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.57 MB | Adobe PDF | View/Open | |
03_content.pdf | 24.02 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 42 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 487.11 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 219.83 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 217.12 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 903.42 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 919.7 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 223.45 kB | Adobe PDF | View/Open | |
11_annexures.pdf | 318.65 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 363.84 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: