State Estimation in Power System under Deterministic False Data Injection Attack Using Minimization of Nuclear Norm and ℓ<inf>1</inf>Norm with Noiseless Constraint Substitution
Issued Date
2024-01-01
Resource Type
Scopus ID
2-s2.0-85199436877
Journal Title
CIVEMSA 2024 - IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, Proceedings
Rights Holder(s)
SCOPUS
Bibliographic Citation
CIVEMSA 2024 - IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, Proceedings (2024)
Suggested Citation
Tausiesakul B., Asavaskulkiet K., Jeraputra C., Leevongwat I., Singhavilai T., Tiptipakorn S. State Estimation in Power System under Deterministic False Data Injection Attack Using Minimization of Nuclear Norm and ℓ<inf>1</inf>Norm with Noiseless Constraint Substitution. CIVEMSA 2024 - IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, Proceedings (2024). doi:10.1109/CIVEMSA58715.2024.10586660 Retrieved from: https://repository.li.mahidol.ac.th/handle/123456789/100068
Title
State Estimation in Power System under Deterministic False Data Injection Attack Using Minimization of Nuclear Norm and ℓ<inf>1</inf>Norm with Noiseless Constraint Substitution
Author's Affiliation
Corresponding Author(s)
Other Contributor(s)
Abstract
The use of digital technology causes the susceptibility to a malicious data attack. A careful mitigation of such unobservable false data injection (FDI) is vital for monitoring the electric power distribution health. This work considers a state estimation problem under a FDI stealth in modern power systems, e.g., a smart grid network. We propose an improved optimization technique for extracting the attack-free component from the attacked data derived from the measurement and a concept of estimating the power system state vector from the extracted signal component. Numerical simulation is conducted to demonstrate the possible operation of the proposed notion. Numerical results indicate that our proposed technique for extracting the attack-free signal component consumes less computational time than the former work.
