Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/433838
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialImproved FDIA threat protection mechanisms in smart grid
dc.date.accessioned2022-12-29T13:15:35Z-
dc.date.available2022-12-29T13:15:35Z-
dc.identifier.urihttp://hdl.handle.net/10603/433838-
dc.description.abstractSmart grid uses various communication technologies to enhance the reliability and efficiency of the power grid. It allows bi-directional flow of electricity and information, about the current status of the grid and requirements of customers, among diverse groups in the grid, i.e., connect generation, distribution, transmission, and consumption subsystems. Thus, a smart grid reduces the power losses and increases the efficiency of electricity generation and distribution. Although the smart grid enhances the services of the grid, it endangers the grid to the cyber security threats that communication networks suffer from in addition to other novel threats because of the nature of the power grid. For instance, the electricity consumption messages sent from consumers to the utility company via the wireless network may be captured, modified, or replayed by adversaries. As a result, security and privacy concerns are major challenges in the smart grid. State estimation in the electric power system is the process that describes the condition of the grid by estimating the state variables using the data obtained by sensors placed in numerous parts of the grid. The continuous operation of the grid requires the state estimation to be done using the right data. To detect the existence of any bad data that may mislead state estimation, the renowned Bad Data Detection Test (BDD) is used. However, the false data injection attack (FDIA) bypasses the BDD test effortlessly. Several kinds of research have been conducted to detect the presence of FDIA. This paper presents two Convex Optimization-based Robust Principal Component Analysis (RPCA) algorithms that use and#119897;1 norm as convex surrogate replacing the non-convex lo norm, for solving this problem. The first technique uses a proximal gradient algorithm that is directly applied to the primal problem. The second technique uses a gradient algorithm applied to the conjugate transpose problem. newline
dc.format.extentxiv,154p.
dc.languageEnglish
dc.relationp.141-153
dc.rightsuniversity
dc.titleImproved FDIA threat protection mechanisms in smart grid
dc.title.alternative
dc.creator.researcherSheryl Arulini, A
dc.subject.keywordCyber security
dc.subject.keywordEngineering
dc.subject.keywordEngineering and Technology
dc.subject.keywordEngineering Electrical and Electronic
dc.subject.keywordSmart grid
dc.subject.keywordTransmission
dc.description.note
dc.contributor.guideJoseph Jawhar, S
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Electrical Engineering
dc.date.registered
dc.date.completed2021
dc.date.awarded2021
dc.format.dimensions21cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Electrical Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File29.36 kBAdobe PDFView/Open
02_prelim pages.pdf2.57 MBAdobe PDFView/Open
03_content.pdf24.02 kBAdobe PDFView/Open
04_abstract.pdf42 kBAdobe PDFView/Open
05_chapter 1.pdf487.11 kBAdobe PDFView/Open
06_chapter 2.pdf219.83 kBAdobe PDFView/Open
07_chapter 3.pdf217.12 kBAdobe PDFView/Open
08_chapter 4.pdf903.42 kBAdobe PDFView/Open
09_chapter 5.pdf919.7 kBAdobe PDFView/Open
10_chapter 6.pdf223.45 kBAdobe PDFView/Open
11_annexures.pdf318.65 kBAdobe PDFView/Open
80_recommendation.pdf363.84 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: