{"id":"https://openalex.org/W3118867125","doi":"https://doi.org/10.1109/jiot.2021.3049818","title":"Zero-Parameter-Information Data Integrity Attacks and Countermeasures in IoT-Based Smart Grid","display_name":"Zero-Parameter-Information Data Integrity Attacks and Countermeasures in IoT-Based Smart Grid","publication_year":2021,"publication_date":"2021-01-10","ids":{"openalex":"https://openalex.org/W3118867125","doi":"https://doi.org/10.1109/jiot.2021.3049818","mag":"3118867125"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3049818","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3049818","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035143434","display_name":"Zhenyong Zhang","orcid":"https://orcid.org/0000-0003-0950-1525"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenyong Zhang","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083185861","display_name":"Ruilong Deng","orcid":"https://orcid.org/0000-0002-8158-150X"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruilong Deng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063936654","display_name":"David K. Y. Yau","orcid":"https://orcid.org/0000-0001-9061-7423"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"David K. Y. Yau","raw_affiliation_strings":["Information Systems Technology and Design, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Information Systems Technology and Design, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051951845","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4221-2162"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035143434"],"corresponding_institution_ids":["https://openalex.org/I4391767838"],"apc_list":null,"apc_paid":null,"fwci":5.8242,"has_fulltext":false,"cited_by_count":52,"citation_normalized_percentile":{"value":0.96579627,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"8","issue":"8","first_page":"6608","last_page":"6623"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7872756719589233},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5753979086875916},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5464176535606384},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5338424444198608},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5203704237937927},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5073983073234558},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.4685339033603668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46252498030662537},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43431368470191956},{"id":"https://openalex.org/keywords/line","display_name":"Line (geometry)","score":0.41861265897750854},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3565674424171448},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20747160911560059},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11552315950393677},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.09143251180648804},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09129989147186279}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7872756719589233},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5753979086875916},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5464176535606384},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5338424444198608},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5203704237937927},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5073983073234558},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.4685339033603668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46252498030662537},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43431368470191956},{"id":"https://openalex.org/C198352243","wikidata":"https://www.wikidata.org/wiki/Q37105","display_name":"Line (geometry)","level":2,"score":0.41861265897750854},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3565674424171448},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20747160911560059},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11552315950393677},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.09143251180648804},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09129989147186279},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3049818","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3049818","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2803218167","display_name":null,"funder_award_id":"62073285","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3411890129","display_name":null,"funder_award_id":"62061130220","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G356442495","display_name":null,"funder_award_id":"61972345","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5065734402","display_name":null,"funder_award_id":"61833015","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7667242572","display_name":null,"funder_award_id":"LZ21F020006","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1571403844","https://openalex.org/W1598852905","https://openalex.org/W1992392795","https://openalex.org/W1992488456","https://openalex.org/W2001019870","https://openalex.org/W2005028112","https://openalex.org/W2022810949","https://openalex.org/W2031252608","https://openalex.org/W2033939184","https://openalex.org/W2035172813","https://openalex.org/W2038651258","https://openalex.org/W2039427951","https://openalex.org/W2043504176","https://openalex.org/W2056684756","https://openalex.org/W2064111006","https://openalex.org/W2106424475","https://openalex.org/W2121658841","https://openalex.org/W2122559297","https://openalex.org/W2161867681","https://openalex.org/W2164681195","https://openalex.org/W2230317998","https://openalex.org/W2319367234","https://openalex.org/W2331619935","https://openalex.org/W2433250951","https://openalex.org/W2525022545","https://openalex.org/W2550453031","https://openalex.org/W2551730448","https://openalex.org/W2604231120","https://openalex.org/W2619800344","https://openalex.org/W2730936454","https://openalex.org/W2765284446","https://openalex.org/W2791047555","https://openalex.org/W2796215551","https://openalex.org/W2890415503","https://openalex.org/W2896784560","https://openalex.org/W2896832338","https://openalex.org/W2914200181","https://openalex.org/W2921677088","https://openalex.org/W2946511455","https://openalex.org/W2959889059","https://openalex.org/W2962896174","https://openalex.org/W2963733297","https://openalex.org/W3045550132","https://openalex.org/W3104818482","https://openalex.org/W3146575127","https://openalex.org/W3184977117","https://openalex.org/W6799529252"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4238100021"],"abstract_inverted_index":{"Data":[0],"integrity":[1],"attack":[2],"(DIA)":[3],"is":[4,23,125,147,176,182],"one":[5],"class":[6,88],"of":[7,25,31,89,113,142,163,179],"threatening":[8],"cyber":[9],"attacks":[10,109],"against":[11,236],"the":[12,18,21,32,44,54,60,70,87,93,102,114,118,122,134,139,150,160,167,185,198,208,222,245,252],"Internet-of-Things":[13],"(IoT)-based":[14],"smart":[15,55],"grid.":[16],"With":[17],"assumption":[19],"that":[20,43,181],"attacker":[22,71,103,135],"capable":[24],"obtaining":[26],"complete":[27,86],"or":[28,67,78],"incomplete":[29],"information":[30,112,120],"system":[33],"topology":[34,119,223],"and":[35,52,158,203,228],"branch":[36,61,115,231],"parameters,":[37],"it":[38,99],"has":[39],"been":[40],"widely":[41],"recognized":[42],"highly":[45],"synthesized":[46],"DIA":[47,90,95],"can":[48,75,136],"evade":[49],"being":[50],"detected":[51],"undermine":[53],"grid":[56],"state":[57,140,161],"estimation.":[58],"However,":[59],"parameters":[62],"cannot":[63],"be":[64,76],"easily":[65],"obtained":[66],"inferred":[68],"by":[69,91,153,188,211,226],"in":[72,171],"practice.":[73],"They":[74],"changed":[77],"disturbed":[79],"with":[80,166,244],"time.":[81],"In":[82],"this":[83],"article,":[84],"we":[85,194,216,240],"designing":[92],"zero-parameter-information":[94],"(ZDIA),":[96],"which":[97,146,175],"makes":[98],"possible":[100],"for":[101],"to":[104,127,149,184,197,207,220,234,250],"execute":[105],"stealthy":[106],"data":[107],"tampering":[108],"without":[110],"any":[111],"parameters.":[116],"Only":[117],"about":[121],"cut":[123,156,191,213],"line":[124],"required":[126],"construct":[128],"such":[129],"attack.":[130],"We":[131],"prove":[132],"that,":[133],"arbitrarily":[137],"modify":[138,159],"estimate":[141],"a":[143,154,172,177,189,201,230],"one-degree":[144,173],"bus,":[145],"connected":[148,183,206],"outside":[151,186,209],"only":[152,187,210],"single":[155,190],"line;":[157],"estimates":[162],"all":[164],"buses,":[165],"same":[168],"arbitrary":[169],"bias,":[170],"super-bus,":[174],"group":[178],"buses":[180],"line.":[192],"Besides,":[193],"extend":[195],"ZDIA":[196],"cases":[199],"where":[200],"bus":[202],"super-bus":[204],"are":[205],"several":[212],"lines.":[214],"Moreover,":[215],"propose":[217],"two":[218],"countermeasures":[219],"address":[221],"vulnerability":[224],"exploited":[225],"ZDIA,":[227],"present":[229],"perturbation":[232],"strategy":[233],"defend":[235],"general":[237],"DIAs.":[238],"Finally,":[239],"conduct":[241],"extensive":[242],"simulations":[243],"IEEE":[246],"standard":[247],"power":[248],"systems":[249],"validate":[251],"theoretical":[253],"results.":[254]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":4}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
