{"id":"https://openalex.org/W2810187563","doi":"https://doi.org/10.1109/pst.2018.8514197","title":"Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid","display_name":"Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2810187563","doi":"https://doi.org/10.1109/pst.2018.8514197","mag":"2810187563"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2018.8514197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2018.8514197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.qub.ac.uk/files/154491533/2018_Demonstrating_Cyber_Physical_Attacks_and_Defense_for_Synchrophasor_Technology_in_Smart_Grid.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102871982","display_name":"Rafiullah Khan","orcid":"https://orcid.org/0000-0003-1478-1568"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Rafiullah Khan","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027789250","display_name":"Kieran McLaughlin","orcid":"https://orcid.org/0000-0002-1299-2364"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kieran McLaughlin","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002744648","display_name":"David Laverty","orcid":"https://orcid.org/0000-0002-5697-0546"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"John Hastings David Laverty","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113772199","display_name":"Hastings David","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hastings David","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102871982"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":2.6214,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.90308187,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10972","display_name":"Power Systems Fault Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8758160471916199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7302406430244446},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6809805631637573},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5807878971099854},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5263833999633789},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5202820897102356},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5090086460113525},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.30817461013793945},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30649423599243164}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8758160471916199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7302406430244446},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6809805631637573},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5807878971099854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5263833999633789},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5202820897102356},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5090086460113525},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.30817461013793945},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30649423599243164},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst.2018.8514197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2018.8514197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/16f37f7f-e4c2-4983-888d-cfcaf712c4c3","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/16f37f7f-e4c2-4983-888d-cfcaf712c4c3","pdf_url":"https://pure.qub.ac.uk/files/154491533/2018_Demonstrating_Cyber_Physical_Attacks_and_Defense_for_Synchrophasor_Technology_in_Smart_Grid.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Khan, R, McLaughlin, K, Hastings, J, Laverty, D & Sezer, S 2018, Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. in 16th Annual Conference on Privacy, Security and Trust. Institute of Electrical and Electronics Engineers Inc., Privacy, Security and Trust 2018, Belfast, United Kingdom, 28/08/2018. < https://ieeexplore.ieee.org/document/8514197 >","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/16f37f7f-e4c2-4983-888d-cfcaf712c4c3","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/16f37f7f-e4c2-4983-888d-cfcaf712c4c3","pdf_url":"https://pure.qub.ac.uk/files/154491533/2018_Demonstrating_Cyber_Physical_Attacks_and_Defense_for_Synchrophasor_Technology_in_Smart_Grid.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Khan, R, McLaughlin, K, Hastings, J, Laverty, D & Sezer, S 2018, Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. in 16th Annual Conference on Privacy, Security and Trust. Institute of Electrical and Electronics Engineers Inc., Privacy, Security and Trust 2018, Belfast, United Kingdom, 28/08/2018. < https://ieeexplore.ieee.org/document/8514197 >","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4205205259","display_name":null,"funder_award_id":"EP/M002837/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G8856505179","display_name":null,"funder_award_id":"EP/N022866/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2810187563.pdf","grobid_xml":"https://content.openalex.org/works/W2810187563.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W208605634","https://openalex.org/W1560795310","https://openalex.org/W2009351244","https://openalex.org/W2015086338","https://openalex.org/W2060174796","https://openalex.org/W2063510917","https://openalex.org/W2162000985","https://openalex.org/W2296484668","https://openalex.org/W2343433123","https://openalex.org/W2514382028","https://openalex.org/W2514791526","https://openalex.org/W2549702890","https://openalex.org/W2553856392","https://openalex.org/W2562415914","https://openalex.org/W2585316664","https://openalex.org/W2600063871","https://openalex.org/W2611617590","https://openalex.org/W2694044524","https://openalex.org/W2729760045","https://openalex.org/W2755027283","https://openalex.org/W2770831242","https://openalex.org/W2770868219","https://openalex.org/W4230289697","https://openalex.org/W6697625413","https://openalex.org/W6704585594","https://openalex.org/W6725824424","https://openalex.org/W6726173414","https://openalex.org/W6729626543","https://openalex.org/W6732561770","https://openalex.org/W6735367906","https://openalex.org/W6744339379"],"related_works":["https://openalex.org/W3089038912","https://openalex.org/W2358245908","https://openalex.org/W3123953333","https://openalex.org/W2974890647","https://openalex.org/W4321484089","https://openalex.org/W4385452087","https://openalex.org/W2296060994","https://openalex.org/W4304097726","https://openalex.org/W4304097727","https://openalex.org/W2177488045"],"abstract_inverted_index":{"Synchrophasor":[0],"technology":[1],"is":[2],"used":[3],"for":[4,134],"real-time":[5],"control":[6],"and":[7,31,89,103,111,150,163],"monitoring":[8],"in":[9,14,19,69,76,131],"smart":[10],"grid.":[11],"Previous":[12],"works":[13],"literature":[15],"identified":[16,140],"critical":[17],"vulnerabilities":[18],"IEEE":[20],"C37.118.2":[21],"synchrophasor":[22,56,165],"communication":[23],"standard.":[24],"To":[25],"protect":[26],"synchrophasor-based":[27,72],"systems,":[28],"stealthy":[29,52,91,160],"cyber-attacks":[30],"effective":[32],"defense":[33],"mechanisms":[34],"still":[35],"need":[36],"to":[37,50,153],"be":[38],"investigated.This":[39],"paper":[40,108,139],"investigates":[41],"how":[42],"an":[43],"attacker":[44],"can":[45],"develop":[46],"a":[47,70,113,142],"custom":[48],"tool":[49],"execute":[51],"man-in-the-middle":[53],"attacks":[54],"against":[55],"devices.":[57],"In":[58],"particular,":[59],"four":[60],"different":[61],"types":[62],"of":[63,99,124],"attack":[64,88,101],"capabilities":[65,102],"have":[66,128],"been":[67,129],"demonstrated":[68],"real":[71],"synchronous":[73],"islanding":[74],"testbed":[75,133],"laboratory:":[77],"(i)":[78],"command":[79],"injection":[80],"attack,":[81,85],"(ii)":[82],"packet":[83],"drop":[84],"(iii)":[86],"replay":[87],"(iv)":[90],"data":[92],"manipulation":[93],"attack.":[94],"With":[95],"deep":[96],"technical":[97],"understanding":[98],"the":[100,125,132,151],"potential":[104],"physical":[105],"impacts,":[106],"this":[107],"also":[109],"develops":[110],"tests":[112],"distributed":[114,143],"Intrusion":[115],"Detection":[116],"System":[117],"(IDS)":[118],"following":[119],"NIST":[120],"recommendations.":[121],"The":[122,138],"functionalities":[123],"proposed":[126],"IDS":[127,144],"validated":[130],"detecting":[135],"aforementioned":[136],"cyber-attacks.":[137],"that":[141],"with":[145],"decentralized":[146],"decision":[147],"making":[148],"capability":[149],"ability":[152],"learn":[154],"system":[155],"behavior":[156],"could":[157],"effectively":[158],"detect":[159],"malicious":[161],"activities":[162],"improve":[164],"network":[166],"security.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
