Defense Strategy against False Data Injection Attacks in Ship DC Microgrids

8Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

False Data Injection Attacks (FDIA) on ship Direct Current (DC) microgrids may result in the priority trip of a large load, a black-out, and serious accidents of ship collisions when maneuvering in the port. The key of the prevention of FDIA is the detection of and countermeasures to false data. In this paper, a defense strategy is developed to detect and mitigate against FDIA on ship DC microgrids. First, a DC bus voltage estimator is trained with an Artificial Neural Network (ANN) model. The error between the estimate value and the measure value is compared with a threshold generated from history data to detect the occurrence of FDIA. Combined with the correlation of artificial neural network inputs, bad data are identified and recovered. The method is tested under six cases with different network and physical disturbances in Matlab/Simulink. The results show that the method can identify and mitigate the FDIA effectively; the error of identifying FDIA by ANN is less than 0.5 V. Therefore, the deviation between the actual bus voltage and the reference voltage is less than 0.5 V.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Zeng, H., Zhao, Y., Wang, T., & Zhang, J. (2022). Defense Strategy against False Data Injection Attacks in Ship DC Microgrids. Journal of Marine Science and Engineering, 10(12). https://doi.org/10.3390/jmse10121930

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 2

67%

Lecturer / Post doc 1

33%

Readers' Discipline

Tooltip

Engineering 3

60%

Social Sciences 1

20%

Business, Management and Accounting 1

20%

Article Metrics

Tooltip
Mentions
Blog Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free