Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Blockchain-Based Decentralized Replay Attack Detection for Large-Scale Power Systems

Journal Article · · IEEE Transactions on Systems, Man, and Cybernetics: Systems
 [1];  [2];  [3]
  1. School of Computational Science and Engineering and H. Milton Stewart School of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, GA, USA
  2. Department of Industrial Engineering, College of Engineering, Computing and Applied Sciences, Clemson University, Clemson, SC, USA
  3. H. Milton Stewart School of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, GA, USA

Not provided.

Research Organization:
Georgia Institute of Technology, Atlanta, GA (United States)
Sponsoring Organization:
USDOE Office of Fossil Energy (FE)
DOE Contract Number:
FE0031288
OSTI ID:
1980589
Journal Information:
IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 52, Issue 8; ISSN 2168-2216
Publisher:
IEEE
Country of Publication:
United States
Language:
English

References (42)

Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems journal April 2017
Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data journal June 2015
Detecting False Data Injection Attacks in AC State Estimation journal September 2015
Attacks against process control systems: risk assessment, detection, and response
  • Cárdenas, Alvaro A.; Amin, Saurabh; Lin, Zong-Syun
  • Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11 https://doi.org/10.1145/1966913.1966959
conference January 2011
Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid journal May 2015
Cyber security analysis of state estimators in electric power systems conference December 2010
Detecting integrity attacks on control systems using a moving target approach conference December 2015
Detection of covert attacks and zero dynamics attacks in cyber-physical systems conference July 2016
Sequential monitoring of SCADA systems against cyber/physical attacks ★ ★This work received financial support from the French National Research Agency (ANR). journal January 2015
An Online Detection Framework for Cyber Attacks on Automatic Generation Control journal November 2018
Taxonomy of attacks on industrial control protocols
  • Drias, Zakarya; Serhrouchni, Ahmed; Vogel, Olivier
  • 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS) https://doi.org/10.1109/NOTERE.2015.7293513
conference July 2015
Cyber threats and defence approaches in SCADA systems conference February 2014
Stealth Attacks and Protection Schemes for State Estimators in Power Systems conference October 2010
Modeling cascading failures in the North American power grid journal July 2005
Topological Vulnerability of the European Power grid Under Errors and Attacks journal July 2007
Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects journal July 2017
Malicious Data Attacks on the Smart Grid journal December 2011
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection conference May 2003
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
  • Urbina, David I.; Giraldo, Jairo A.; Cardenas, Alvaro A.
  • CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security https://doi.org/10.1145/2976749.2978388
conference October 2016
Robustness of the Markov-Chain Model for Cyber-Attack Detection journal March 2004
An overview on smart contracts: Challenges, advances and platforms journal April 2020
The role and use of the stochastic linear-quadratic-Gaussian problem in control system design journal December 1971
Detecting Integrity Attacks on SCADA Systems journal July 2014
A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems journal January 2011
A Model Inversion Based Watermark for Replay Attack Detection with Output Tracking conference July 2019
under dependency journal August 2001
Privacy Principles for Sharing Cyber Security Data conference May 2015
Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends journal November 2019
Randomized gossip algorithms journal June 2006
Broadcast Gossip Algorithms for Consensus journal July 2009
The industrial control system cyber defence triage process journal September 2017
The real story of stuxnet journal March 2013
False data injection attacks against state estimation in electric power grids journal May 2011
Cyber-Weapons journal February 2012
A Technical Approach to the Energy Blockchain in Microgrids journal November 2018
A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks journal August 2019
A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory journal June 2019
Blockchain: A path to grid modernization and cyber resiliency conference September 2017
Secure and Efficient Vehicle-to-Grid Energy Trading in Cyber Physical Systems: Integration of Blockchain and Edge Computing journal January 2020
Detecting Generalized Replay Attacks via Time-Varying Dynamic Watermarking journal August 2021
Detection of replay attack on smart grid with code signal and bargaining game conference May 2017
Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs journal February 2015

Similar Records

On the Blockchain-Based Decentralized Data Sharing for Event Based Encryption to Combat Adversarial Attacks
Journal Article · 2021 · IEEE Transactions on Network Science and Engineering · OSTI ID:1850422

Large-Scale Maintenance and Unit Commitment: A Decentralized Subgradient Approach
Journal Article · 2022 · IEEE Transactions on Power Systems · OSTI ID:1980571

A data-based private learning framework for enhanced security against replay attacks in cyber-physical systems
Journal Article · 2020 · International Journal of Robust and Nonlinear Control · OSTI ID:1848802