Enhancing security for voltage control of distribution systems under data falsification attacks

Mizuki Onogawa, Shinya Yoshizawa, Yu Fujimoto, Hideaki Ishii, Isao Ono, Takashi Onoda, Yasuhiro Hayashi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)


We consider enhancing cyber security in voltage regulation of distribution systems in the presence of malicious attacks. Due to the increase in distributed generation, the regulation of voltage has become more complicated, requiring more sensor data to be used for control. Recently, we have developed an attack detection algorithm to find data falsification attacks on voltage measurements transmitted by sectionizing switches in the feeders to a centralized controller. In this paper, the security level of the system is further improved by introducing a controller that is capable of operating the regulation in the presence of attacks by utilizing the detection results. In particular, it identifies abnormal behavior in the sensor data and ignores measurements taking extreme values among those received. Through detailed simulation studies on a small scale distribution system, we show the effectiveness of the proposed control and analyze the relation between the number of attacks and the detectability of the attacks.

Original languageEnglish
Title of host publication2019 American Control Conference, ACC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781538679265
Publication statusPublished - 2019 Jul
Event2019 American Control Conference, ACC 2019 - Philadelphia, United States
Duration: 2019 Jul 102019 Jul 12

Publication series

NameProceedings of the American Control Conference
ISSN (Print)0743-1619


Conference2019 American Control Conference, ACC 2019
Country/TerritoryUnited States

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'Enhancing security for voltage control of distribution systems under data falsification attacks'. Together they form a unique fingerprint.

Cite this