4.8 Article

A Remedial Action Scheme Against False Data Injection Cyberattacks in Smart Transmission Systems: Application of Thyristor-Controlled Series Capacitor (TCSC)

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 18, 期 4, 页码 2297-2309

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2021.3092341

关键词

Thyristors; Power capacitors; Computer crime; Power system stability; Power transmission lines; Phasor measurement units; Planning; Congestion; false data injection (FDI) cyberattack; remedial action scheme (RAS); remote terminal unit (RTU); thyristor-controlled series capacitor (TCSC)

向作者/读者索取更多资源

This article proposes a remedial action scheme (RAS) based on thyristor-controlled series capacitors (TCSCs) to address tie-line congestions caused by false data injection (FDI) cyberattacks in transmission systems. A three-level framework is designed to develop the RAS, incorporating strategic planning, operation challenges, and rapid congestion alleviation using preinstalled TCSCs. The effectiveness of the framework is verified on two IEEE test systems.
This article proposes a remedial action scheme (RAS) based on thyristor-controlled series capacitors (TCSCs) to cope with false data injection (FDI) cyberattacks leading to tie-line congestions in transmission systems. To develop such a RAS, a three-level framework is designed. The first level of the framework is associated with the planning phase, where strategic locations of TCSCs are determined. The second level, which is related to the operation phase, challenges the upgraded system via FDI attacks, resulting in tie-line congestions. This necessitates the third level of the framework, where system operator takes advantage of a RAS based on the preinstalled TCSCs to rapidly alleviate the congestions caused by FDIs. The effectiveness of the developed framework is verified on two IEEE test systems, where it is assumed that a higher budget is spent on securing remote terminal units of TCSCs; hence, phasor measurement units are more prone to cyberattacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据