iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1186/S42162-020-00121-9
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T19:08:33Z","timestamp":1719774513570},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"vor","delay-in-days":27,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Energy Inform"],"published-print":{"date-parts":[[2020,10]]},"abstract":"Abstract<\/jats:title>\nModern power systems are cyber-physical systems with increasing relevance and influence of information and communication technology. This influence comprises all processes, functional, and non-functional aspects like functional correctness, safety, security, and reliability. An example of a process is the data acquisition process. Questions focused in this paper are, first, how one can trust in process data in a data acquisition process of a highly-complex cyber-physical power system. Second, how can the trust in process data be integrated into a state estimation to achieve estimated results in a way that it can reflect trustworthiness of that input?We present the concept of an anomaly-sensitive state estimation that tackles these questions. The concept is based on a multi-faceted trust model for power system network assessment. Furthermore, we provide a proof of concept by enriching measurements in the context of the IEEE 39-bus system with reasonable trust values. The proof of concept shows the benefits but also the limitations of the approach.<\/jats:p>","DOI":"10.1186\/s42162-020-00121-9","type":"journal-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T13:03:06Z","timestamp":1603890186000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Trust assessment of power system states"],"prefix":"10.1186","volume":"3","author":[{"given":"Michael","family":"Brand","sequence":"first","affiliation":[]},{"given":"Davood","family":"Babazadeh","sequence":"additional","affiliation":[]},{"given":"Carsten","family":"Kr\u00fcger","sequence":"additional","affiliation":[]},{"given":"Bj\u00f6rn","family":"Siemers","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Lehnhoff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,28]]},"reference":[{"key":"121_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9780203913673","volume-title":"Power System State Estimation: Theory and Implementation","author":"A Abur","year":"2004","unstructured":"Abur, A, Exposito AG (2004) Power System State Estimation: Theory and Implementation. Marcel Dekker, Inc., New York and Basel."},{"key":"121_CR2","first-page":"01008","volume-title":"EPJ Web of Conferences, vol. 217","author":"M Brand","year":"2019","unstructured":"Brand, M, Babazadeh D, Lehnhoff S, Engel D (2019) Trust in control: a trust model for power system network assessment In: EPJ Web of Conferences, vol. 217, 01008.. EDP Sciences, Les Ulis Cedex A, Irkutsk."},{"issue":"5","key":"121_CR3","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","volume":"29","author":"S Cui","year":"2012","unstructured":"Cui, S, Han Z, Kar S, Kim TT, Poor HV, Tajer A (2012) Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions. IEEE Signal Process Mag 29(5):106\u2013115.","journal-title":"IEEE Signal Process Mag"},{"key":"121_CR4","doi-asserted-by":"crossref","unstructured":"Greer, C, Wollman DA, Prochaska DE, Boynton PA, Mazer JA, Nguyen CT, FitzPatrick GJ, Nelson TL, Koepke GH, Hefner Jr AR, et al. (2014) NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0. Technical report, NIST.","DOI":"10.6028\/NIST.SP.1108r3"},{"key":"121_CR5","unstructured":"Lewis, A (2019) Understanding Linux CPU Load - when should you be worried?https:\/\/scoutapm.com\/blog\/understanding-load-averages. Accessed 28 May 2020."},{"issue":"4","key":"121_CR6","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1109\/TSG.2015.2495133","volume":"8","author":"G Liang","year":"2016","unstructured":"Liang, G, Zhao J, Luo F, Weller SR, Dong ZY (2016) A review of false data injection attacks against modern power systems. IEEE Trans Smart Grid 8(4):1630\u20131638.","journal-title":"IEEE Trans Smart Grid"},{"issue":"1","key":"121_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1952982.1952995","volume":"14","author":"Y Liu","year":"2011","unstructured":"Liu, Y, Ning P, Reiter MK (2011) False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Trans Inf Syst Secur (TISSEC) 14(1):1\u201333.","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"121_CR8","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.future.2014.10.002","volume":"49","author":"T Liu","year":"2015","unstructured":"Liu, T, Sun Y, Liu Y, Gui Y, Zhao Y, Wang D, Shen C (2015) Abnormal traffic-indexed state estimation: A cyber\u2013physical fusion approach for smart grid attack detection. Futur Gener Comput Syst 49:94\u2013103.","journal-title":"Futur Gener Comput Syst"},{"key":"121_CR9","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/MED.2012.6265722","volume-title":"2012 20th Mediterranean Conference on Control & Automation (MED)","author":"I Matei","year":"2012","unstructured":"Matei, I, Baras JS, Srinivasan V (2012) Trust-based multi-agent filtering for increased smart grid security In: 2012 20th Mediterranean Conference on Control & Automation (MED), 716\u2013721.. IEEE, Barcelona."},{"key":"121_CR10","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1016\/j.rser.2015.07.124","volume":"52","author":"M Nijhuis","year":"2015","unstructured":"Nijhuis, M, Gibescu M, Cobben J (2015) Assessment of the impacts of the renewable energy and ICT driven energy transition on distribution networks. Renew Sust Energ Rev 52:1003\u20131014.","journal-title":"Renew Sust Energ Rev"},{"key":"121_CR11","unstructured":"OFFIS (2017) Smart Grid Cyber-Resilience Laboratory. \nhttps:\/\/www.offis.de\/en\/offis\/project\/cybreslab.html\n\n. Accessed 08 June 2020."},{"key":"121_CR12","unstructured":"Pai, M, Athay T, Podmore R, Virmani S (1989) IEEE 39-Bus System."},{"key":"121_CR13","unstructured":"Pillitteri, VY, Brewer TL (2014) Guidelines for Smart Grid Cybersecurity. Technical report, NIST."},{"key":"121_CR14","first-page":"258","volume-title":"EnviroInfo","author":"C Rosinger","year":"2013","unstructured":"Rosinger, C, Uslar M, Sauer J (2013) Threat Scenarios to evaluate Trustworthiness of Multi-agents in the Energy Data Management In: EnviroInfo, 258\u2013264.. Shaker Verlag, Aachen."},{"key":"121_CR15","first-page":"373","volume-title":"EnviroInfo","author":"C Rosinger","year":"2014","unstructured":"Rosinger, C, Uslar M, Sauer J (2014) Using Information Security as a Facet of Trustworthiness for Self-Organizing Agents in Energy Coalition Formation Processes In: EnviroInfo, 373\u2013380.. BIS-Verlag, Oldenburg."},{"key":"121_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-16576-4_5","volume-title":"International Conference on Autonomic and Trusted Computing","author":"J-P Stegh\u00f6fer","year":"2010","unstructured":"Stegh\u00f6fer, J-P, Kiefhaber R, Leichtenstern K, Bernard Y, Klejnowski L, Reif W, Ungerer T, Andr\u00e9 E, H\u00e4hner J, M\u00fcller-Schloer C (2010) Trustworthy Organic Computing Systems: Challenges and Perspectives In: International Conference on Autonomic and Trusted Computing, 62\u201376.. Springer, Berlin."},{"key":"121_CR17","doi-asserted-by":"crossref","unstructured":"Zheng, S, Jiang T, Baras JS (2010) Trust-aware state estimation under false data injection in distributed sensor networks In: Proceedings of TECHCON, 1\u20134, Orlando.","DOI":"10.1109\/GLOCOM.2010.5685223"}],"container-title":["Energy Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-020-00121-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s42162-020-00121-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-020-00121-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T13:34:23Z","timestamp":1603892063000},"score":1,"resource":{"primary":{"URL":"https:\/\/energyinformatics.springeropen.com\/articles\/10.1186\/s42162-020-00121-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":17,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["121"],"URL":"https:\/\/doi.org\/10.1186\/s42162-020-00121-9","relation":{},"ISSN":["2520-8942"],"issn-type":[{"value":"2520-8942","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]},"assertion":[{"value":"28 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"18"}}