Data Security Defense: Modeling and Detection of Synchrophasor Data Spoofing Attack for Grid Edge

  • Wei Qiu
  • , He Yin
  • , Yuru Wu
  • , Chujie Zeng
  • , Chang Chen
  • , Yuqing Dong
  • , Yilu Liu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Data security and cyberattack have become critical issues in the distributed power system where adversaries can swap the source information of sensors or even spoof and alter measurements. However, the cyber security of the power system is challenged by the unpredictability and stealth of the spoofing attacks. To protect the data security at the grid edge, this paper developed a synchrophasor data spoofing attack detection framework based on the time-frequency feature extraction techniques including the short-Time Fourier transform (STFT) and object detection network for real-Time synchrophasor data categorization and spoofing attack localization. The proposed approach outperforms earlier work in terms of spoofing attack detection and offers a vital localization function employing distributed synchrophasor sensors.

Original languageEnglish
Title of host publication2024 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350313604
DOIs
StatePublished - 2024
Externally publishedYes
Event2024 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2024 - Washington, United States
Duration: Feb 19 2024Feb 22 2024

Publication series

Name2024 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2024

Conference

Conference2024 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2024
Country/TerritoryUnited States
CityWashington
Period02/19/2402/22/24

Keywords

  • Data security defense
  • grid edge
  • spoofing attack
  • synchrophasor data
  • time-frequency domain

Fingerprint

Dive into the research topics of 'Data Security Defense: Modeling and Detection of Synchrophasor Data Spoofing Attack for Grid Edge'. Together they form a unique fingerprint.

Cite this