{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T04:09:54Z","timestamp":1770350994449,"version":"3.49.0"},"reference-count":25,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2022,4,28]]},"abstract":"<jats:p>\u00a0The denial-of-service (DoS) attacks block the communications of the power grids, which affects the availability of the measurement data for monitoring and control. In order to reduce the impact of DoS attacks on measurement data, it is essential to predict missing measurement data. Predicting technique with measurement data depends on the correlation between measurement data. However, it is impractical to install phasor measurement units (PMUs) on all buses owing to the high cost of PMU installment. This paper initializes the study on the impact of PMU placement on predicting measurement data. Considering the data availability, this paper proposes a scheme for predicting states using the LSTM network while ensuring system observability by optimizing phasor measurement unit (PMU) placement. The optimized PMU placement is obtained by integer programming with the criterion of the node importance and the cost of PMU deployment. There is a strong correlation between the measurement data corresponding to the optimal PMU placement. A Long-Short Term Memory neural network (LSTM) is proposed to learn the strong correlation among PMUs, which is utilized to predict the unavailable measured data of the attacked PMUs. The proposed method is verified on an IEEE 118-bus system, and the advantages compared with some conventional methods are also illustrated.<\/jats:p>","DOI":"10.3233\/jifs-212593","type":"journal-article","created":{"date-parts":[[2021,12,31]],"date-time":"2021-12-31T08:42:25Z","timestamp":1640940145000},"page":"5957-5971","source":"Crossref","is-referenced-by-count":1,"title":["State prediction using LSTM with optimized PMU deployment against DoS attacks"],"prefix":"10.1177","volume":"42","author":[{"given":"Chunye","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Southwest University, Chongqing, P. R. China"}]},{"given":"Jian","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Southwest University, Chongqing, P. R. China"}]},{"given":"Xiaoxin","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Southwest University, Chongqing, P. R. China"}]},{"given":"Bin","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Southwest University, Chongqing, P. R. China"}]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Grid Chongqing Electric Power Company, Chongqing, P. R. China"}]},{"given":"Yang","family":"Tang","sequence":"additional","affiliation":[{"name":"State Grid Chongqing Electric Power Company, Chongqing, P. R. China"}]},{"given":"Min","family":"Zeng","sequence":"additional","affiliation":[{"name":"State Grid Chongqing Electric Power Company, Chongqing, P. R. China"}]}],"member":"179","reference":[{"issue":"4","key":"10.3233\/JIFS-212593_ref1","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/JSYST.2012.2183033","article-title":"Comparing the topological and electrical structure of the north american electric power infrastructure","volume":"6","author":"Cotilla-Sanchez","year":"2012","journal-title":"IEEE Systems Journal"},{"key":"10.3233\/JIFS-212593_ref2","unstructured":"Salman G.A. and Abood H.G. , Assessing algorithms of phasor measurements optimal placement for state estimation, In IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT), 550 2019. Assessing algorithms of phasor measurements optimal placement for state estimation, In, IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT) 2019."},{"key":"10.3233\/JIFS-212593_ref3","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.ssci.2013.05.006","article-title":"An entropy-based metric to quantify the robustness of power grids against cascading failures","volume":"59","author":"Ko\u00e7","year":"2013","journal-title":"Safety Science"},{"issue":"5","key":"10.3233\/JIFS-212593_ref4","doi-asserted-by":"crossref","first-page":"3881","DOI":"10.1109\/TPWRS.2015.2487419","article-title":"A short-term nodal voltage phasor forecasting method using temporal and spatial correlation","volume":"31","author":"Hassanzadeh","year":"2016","journal-title":"IEEE Transactions on Power Systems"},{"issue":"99","key":"10.3233\/JIFS-212593_ref6","first-page":"1","article-title":"Distributed resilient filtering for power systems subject to denial-of-service attacks","volume":"PP","author":"Chen","year":"2019","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"10.3233\/JIFS-212593_ref8","first-page":"1","article-title":"Dos attacks on remote state estimation with asymmetric information","volume":"PP","author":"Ding","year":"2018","journal-title":"IEEE Transactions on Control of Network Systems"},{"issue":"2","key":"10.3233\/JIFS-212593_ref13","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TIFS.2018.2854745","article-title":"Real-time detection of hybrid and stealthy cyber-attacks in smart grid","volume":"14","author":"Kurt","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"10.3233\/JIFS-212593_ref15","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1016\/j.epsr.2010.03.005","article-title":"Optimal pmu placement method for complete topological and numerical observability of power system","volume":"80","author":"Sodhi","year":"2010","journal-title":"Electric Power Systems Research"},{"issue":"1","key":"10.3233\/JIFS-212593_ref16","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/TPWRD.2008.2008430","article-title":"Placement of synchronized measurements for power system observability","volume":"24","author":"Chakrabarti","year":"2008","journal-title":"IEEE Transactions on Power Delivery"},{"issue":"2","key":"10.3233\/JIFS-212593_ref17","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1109\/TPWRS.2011.2179816","article-title":"Tomy of pmu placement methodologies","volume":"27","author":"Manousakis","year":"2012","journal-title":"IEEE Transactions on Power Systems"},{"issue":"4","key":"10.3233\/JIFS-212593_ref19","doi-asserted-by":"crossref","first-page":"2381","DOI":"10.1109\/TPWRD.2005.855457","article-title":"Phasor measurement unit placement techniques for complete and incomplete observability","volume":"20","author":"Nuqui","year":"2005","journal-title":"IEEE Transactions on Power Delivery"},{"issue":"4","key":"10.3233\/JIFS-212593_ref21","doi-asserted-by":"crossref","first-page":"1930","DOI":"10.1109\/TPWRS.2006.881112","article-title":"An alternative for including phasor measurements in state estimators","volume":"21","author":"Ming","year":"2006","journal-title":"IEEE Transactions on Power Systems"},{"key":"10.3233\/JIFS-212593_ref22","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/TPWRS.2006.881149","article-title":"Placement of pmus to enable bad data detection in state estimation","volume":"21","author":"Chen","year":"2006","journal-title":"IEEE Transactions on Power Systems"},{"issue":"3","key":"10.3233\/JIFS-212593_ref24","doi-asserted-by":"crossref","first-page":"1525","DOI":"10.1109\/TPWRS.2008.926723","article-title":"Optimal placement of pmus by integer linear programming","volume":"23","author":"Gou","year":"2008","journal-title":"IEEE Transactions on Power Systems"},{"issue":"3","key":"10.3233\/JIFS-212593_ref25","doi-asserted-by":"crossref","first-page":"2434","DOI":"10.1109\/TPWRS.2015.2451592","article-title":"Input-output analysis and decentralized optimal control of inter-area oscillations in power systems","volume":"31","author":"Wu","year":"2016","journal-title":"IEEE Transactions on Power Systems"},{"key":"10.3233\/JIFS-212593_ref27","doi-asserted-by":"crossref","first-page":"107586","DOI":"10.1016\/j.ress.2021.107586","article-title":"Cyber attacks on pmu placement in a smart grid: Characterization and optimization","volume":"212","author":"Ding","year":"2021","journal-title":"Reliability Engineering and System Safety"},{"issue":"10","key":"10.3233\/JIFS-212593_ref29","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1109\/TAC.2015.2461851","article-title":"Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach","volume":"60","author":"Li","year":"2015","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"3","key":"10.3233\/JIFS-212593_ref30","doi-asserted-by":"crossref","first-page":"164","DOI":"10.4236\/ica.2017.83013","article-title":"Generalized attack model for networked control systems, evaluation of control methods","volume":"8","author":"Sargolzaei","year":"2017","journal-title":"Intelligent Control and Automation"},{"issue":"2","key":"10.3233\/JIFS-212593_ref31","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TIFS.2018.2854745","article-title":"Real-time detection of hybrid and stealthy cyber-attacks in smart grid","volume":"14","author":"Kurt","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/JIFS-212593_ref32","doi-asserted-by":"crossref","unstructured":"Sun J. , Qi G. and Zhu Z.Q. , A sparse neural network based control structure optimization game under dos attacks for des frequency regulation of power grid, Applied Sciences 9(11) (2019).","DOI":"10.3390\/app9112217"},{"key":"10.3233\/JIFS-212593_ref34","unstructured":"Soav Edu, Security analysis of phasor measurement units in smart grid communication infrastructures, 2014."},{"key":"10.3233\/JIFS-212593_ref37","doi-asserted-by":"crossref","unstructured":"Hochreiter, Sepp, Schmidhuber, and Jurgen, Long short-term memory, Neural Computation, 1997.","DOI":"10.1162\/neco.1997.9.8.1735"},{"issue":"4","key":"10.3233\/JIFS-212593_ref40","doi-asserted-by":"crossref","first-page":"2937","DOI":"10.1109\/TPWRS.2019.2963109","article-title":"Ultra-short-term industrial power demand forecasting using lstm based hybrid ensemble learning","volume":"35","author":"Tan","year":"2020","journal-title":"IEEE Transactions on Power Systems"},{"issue":"6","key":"10.3233\/JIFS-212593_ref41","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1109\/TPWRS.2014.2382102","article-title":"Dynamic state estimation under communication failure using kriging based bus load forecasting","volume":"30","author":"Gu","year":"2015","journal-title":"IEEE Transactions on Power Systems"},{"key":"10.3233\/JIFS-212593_ref42","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.renene.2015.01.022","article-title":"Short-term wind speed forecasting based on spectral clustering and optimised echo state networks","volume":"78","author":"Liu","year":"2015","journal-title":"Renewable Energy"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-212593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T12:58:20Z","timestamp":1769777900000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-212593"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,28]]},"references-count":25,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jifs-212593","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,28]]}}}