{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T18:09:12Z","timestamp":1774807752610,"version":"3.50.1"},"reference-count":52,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T00:00:00Z","timestamp":1662595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"publisher","award":["R20140"],"award-info":[{"award-number":["R20140"]}],"id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"publisher","award":["2022YFH0098"],"award-info":[{"award-number":["2022YFH0098"]}],"id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"publisher","award":["2017YFC1501701"],"award-info":[{"award-number":["2017YFC1501701"]}],"id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"publisher","award":["61801060"],"award-info":[{"award-number":["61801060"]}],"id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Science and Technology Program","award":["R20140"],"award-info":[{"award-number":["R20140"]}]},{"name":"Sichuan Science and Technology Program","award":["2022YFH0098"],"award-info":[{"award-number":["2022YFH0098"]}]},{"name":"Sichuan Science and Technology Program","award":["2017YFC1501701"],"award-info":[{"award-number":["2017YFC1501701"]}]},{"name":"Sichuan Science and Technology Program","award":["61801060"],"award-info":[{"award-number":["61801060"]}]},{"name":"National Key Research and Development Program of China Research Fund Grant","award":["R20140"],"award-info":[{"award-number":["R20140"]}]},{"name":"National Key Research and Development Program of China Research Fund Grant","award":["2022YFH0098"],"award-info":[{"award-number":["2022YFH0098"]}]},{"name":"National Key Research and Development Program of China Research Fund Grant","award":["2017YFC1501701"],"award-info":[{"award-number":["2017YFC1501701"]}]},{"name":"National Key Research and Development Program of China Research Fund Grant","award":["61801060"],"award-info":[{"award-number":["61801060"]}]},{"name":"the Scientific Research Foundation of CUIT","award":["R20140"],"award-info":[{"award-number":["R20140"]}]},{"name":"the Scientific Research Foundation of CUIT","award":["2022YFH0098"],"award-info":[{"award-number":["2022YFH0098"]}]},{"name":"the Scientific Research Foundation of CUIT","award":["2017YFC1501701"],"award-info":[{"award-number":["2017YFC1501701"]}]},{"name":"the Scientific Research Foundation of CUIT","award":["61801060"],"award-info":[{"award-number":["61801060"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["R20140"],"award-info":[{"award-number":["R20140"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2022YFH0098"],"award-info":[{"award-number":["2022YFH0098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFC1501701"],"award-info":[{"award-number":["2017YFC1501701"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801060"],"award-info":[{"award-number":["61801060"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the wide application of advanced communication and information technology, false data injection attack (FDIA) has become one of the significant potential threats to the security of smart grid. Malicious attack detection is the primary task of defense. Therefore, this paper proposes a method of FDIA detection based on vector auto-regression (VAR), aiming to improve safe operation and reliable power supply in smart grid applications. The proposed method is characterized by incorporating with VAR model and measurement residual analysis based on infinite norm and 2-norm to achieve the FDIA detection under the edge computing architecture, where the VAR model is used to make a short-term prediction of FDIA, and the infinite norm and 2-norm are utilized to generate the classification detector. To assess the performance of the proposed method, we conducted experiments by the IEEE 14-bus system power grid model. The experimental results demonstrate that the method based on VAR model has a better detection of FDIA compared to the method based on auto-regressive (AR) model.<\/jats:p>","DOI":"10.3390\/s22186789","type":"journal-article","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T07:05:56Z","timestamp":1662620756000},"page":"6789","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment"],"prefix":"10.3390","volume":"22","author":[{"given":"Yi","family":"Chen","sequence":"first","affiliation":[{"name":"College of Electronic Engineering, Chengdu University of Information Technology, Chengdu 610225, China"},{"name":"School of Aeronautics and Astronautics, University of Electronic Science and Technology of China, Chengdu 611731, China"},{"name":"CMA Key Laboratory of Atmospheric Sounding, Chengdu 610225, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8092-4590","authenticated-orcid":false,"given":"Kadhim","family":"Hayawi","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi 144534, United Arab Emirates"}]},{"given":"Qian","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, Chengdu University of Information Technology, Chengdu 610225, China"}]},{"given":"Junjie","family":"Mou","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, Chengdu University of Information Technology, Chengdu 610225, China"}]},{"given":"Ling","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, Chengdu University of Information Technology, Chengdu 610225, China"}]},{"given":"Jie","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Aeronautics and Astronautics, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Aeronautics and Astronautics, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8645-2264","authenticated-orcid":false,"given":"Hong","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Aeronautics and Astronautics, University of Electronic Science and Technology of China, Chengdu 611731, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MSP.2010.49","article-title":"Smart-grid security issues","volume":"8","author":"Khurana","year":"2010","journal-title":"IEEE Secur. Priv."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Metke, A.R., and Ekl, R.L. (2010, January 19\u201321). Smart grid security technology. Proceedings of the Innovative Smart Grid Technologies (ISGT), Gaithersburg, MD, USA.","DOI":"10.1109\/ISGT.2010.5434760"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gusrialdi, A., and Qu, Z. (2019). Smart grid security: Attacks and defenses. Smart Grid Control: Overview and Research Opportunities, Springer.","DOI":"10.1007\/978-3-319-98310-3_13"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Flick, T., and Morehouse, J. (2010). Securing the Smart Grid: Next Generation Power Grid Security, Syngress.","DOI":"10.1016\/B978-1-59749-570-7.00001-7"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/TSG.2015.2431693","article-title":"Power system real-time monitoring by using PMU-based robust state estimation method","volume":"7","author":"Zhao","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Weng, Y., Negi, R., and Ili\u0107, M.D. (2013, January 21\u201324). Historical data-driven state estimation for electric power systems. Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada.","DOI":"10.1109\/SmartGridComm.2013.6687940"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MPE.2012.2205315","article-title":"Metrics for success: Performance metrics for power system state estimators and measurement designs","volume":"10","author":"Gol","year":"2012","journal-title":"IEEE Power Energy Mag."},{"key":"ref_8","first-page":"148","article-title":"Power system cyber attack and its defense","volume":"40","author":"Ni","year":"2016","journal-title":"Autom. Electr. Power Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Anwar, A., and Mahmood, A.N. (2014). Vulnerabilities of smart grid state estimation against false data injection attack. Renewable Energy Integration: Challenges and Solutions, Springer.","DOI":"10.1007\/978-981-4585-27-9_17"},{"key":"ref_10","first-page":"147","article-title":"Construction of cyber security defense hierarchy and cyber security testing system of smart grid: Thinking and enlightenment for network attack events to national power grid of Ukraine and Israel","volume":"40","author":"Li","year":"2016","journal-title":"Autom. Electr. Power Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"612668","DOI":"10.3389\/fbuil.2021.612668","article-title":"Cybersecurity in Construction: Where Do We Stand and How Do We Get Better Prepared","volume":"7","author":"Mantha","year":"2021","journal-title":"Front. Built Environ."},{"key":"ref_12","unstructured":"Zheng, T., Liu, M., Puthal, D., Yi, P., Wu, Y., and He, X. (2022). Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin. arXiv."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Li, M., Yang, Z., He, L., and Teng, Y. (2018, January 15\u201316). Research and Application of Information Security Offense and Defense Exercise in Electric Power Industry. Proceedings of the 2018 3rd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2018), Chongqing, China.","DOI":"10.2991\/jimec-18.2018.11"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Murray, W.H. (2021). An Introduction to Internet Security and Firewall Policies. The Network Manager\u2019s Handbook, Auerbach Publications.","DOI":"10.1201\/9781003069409-17"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2021.05.013","article-title":"A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls","volume":"124","author":"Alkan","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","article-title":"A survey of intrusion detection techniques in cloud","volume":"36","author":"Modi","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5558860","DOI":"10.1155\/2021\/5558860","article-title":"An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks","volume":"2021","author":"Wang","year":"2021","journal-title":"J. Sens."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1002\/sec.957","article-title":"An integrated detection system against false data injection attacks in the smart grid","volume":"8","author":"Yu","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_19","first-page":"1943","article-title":"False data injection attacks based on robust principal component analysis in smart grid","volume":"37","author":"Jiwei","year":"2017","journal-title":"J. Comput. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1049\/iet-cps.2019.0010","article-title":"Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory","volume":"5","author":"Li","year":"2020","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"100541","DOI":"10.1016\/j.segan.2021.100541","article-title":"A multi-stage game model for the false data injection attack from attacker\u2019s perspective","volume":"28","author":"Yi","year":"2021","journal-title":"Sustain. Energy Grids Netw."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Xie, L., Mo, Y., and Sinopoli, B. (2010, January 4\u20136). False data injection attacks in electricity markets. Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MA, USA.","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2239","DOI":"10.1109\/TSG.2016.2521178","article-title":"False data attacks against AC state estimation with incomplete network information","volume":"8","author":"Liu","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1102","DOI":"10.1109\/TSP.2014.2385670","article-title":"Subspace methods for data attack on state estimation: A data driven approach","volume":"63","author":"Kim","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1109\/TSG.2014.2382714","article-title":"Blind false data injection attack using PCA approximation method in smart grid","volume":"6","author":"Yu","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1109\/TPAS.1982.317128","article-title":"A new approach for detection and identification of multiple bad data in power system state estimation","volume":"PAS-101","year":"1982","journal-title":"IEEE Trans. Power Appar. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/T-PAS.1975.31858","article-title":"Bad data analysis for power system state estimation","volume":"94","author":"Handschin","year":"1975","journal-title":"IEEE Trans. Power Appar. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1109\/TPWRS.1987.4335300","article-title":"An efficient dynamic state estimation algorithm including bad data processing","volume":"2","author":"Cantera","year":"1987","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"012013","DOI":"10.1088\/1742-6596\/1646\/1\/012013","article-title":"Research on FDI attacks in edge computing environment","volume":"1646","author":"Li","year":"2020","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TSG.2013.2284438","article-title":"Detecting false data injection attacks on power grid by sparse optimization","volume":"5","author":"Liu","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2892","DOI":"10.1109\/TII.2018.2875529","article-title":"Detecting false data injection attacks against power system state estimation with fast Go-decomposition approach","volume":"15","author":"Li","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1580","DOI":"10.1109\/TSG.2015.2492827","article-title":"Short-term state forecasting-aided method for detection of smart grid general false data injection attacks","volume":"8","author":"Zhao","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_34","first-page":"1636","article-title":"Online detection of stealthy false data injection attacks in power system state estimation","volume":"9","author":"Ashok","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"5349","DOI":"10.1109\/TSG.2021.3106246","article-title":"Targeted false data injection attacks against AC state estimation without network parameters","volume":"12","author":"Du","year":"2021","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2946","DOI":"10.1109\/JSYST.2021.3109082","article-title":"Graph neural networks based detection of stealth false data injection attacks in smart grids","volume":"16","author":"Boyaci","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2318","DOI":"10.1109\/TSG.2022.3141803","article-title":"A highly discriminative detector against false data injection attacks in AC state estimation","volume":"13","author":"Cheng","year":"2022","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Cob-Parro, A.C., Losada-Guti\u00e9rrez, C., Marr\u00f3n-Romera, M., Gardel-Vicente, A., and Bravo-Muoz, I. (2021). Smart Video Surveillance System Based on Edge Computing. Sensors, 21.","DOI":"10.3390\/s21092958"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"74089","DOI":"10.1109\/ACCESS.2019.2920488","article-title":"Internet of things based smart grids supported by intelligent edge computing","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Huang, Y., Lu, Y., Wang, F., Fan, X., Liu, J., and Leung, V.C. (2018, January 21\u201323). An edge computing framework for real-time monitoring in smart grid. Proceedings of the 2018 IEEE International Conference on Industrial Internet (ICII), Seattle, WA, USA.","DOI":"10.1109\/ICII.2018.00019"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1374","DOI":"10.1109\/JIOT.2021.3086581","article-title":"On Physical-Layer Authentication via Online Transfer Learning","volume":"9","author":"Chen","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"L\u00fctkepohl, H. (1993). New Introduction to Multiple Time Series Analysis, Springer.","DOI":"10.1007\/978-3-642-61695-2"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/TCBB.2014.2338298","article-title":"Predicting microbial interactions using vector autoregressive model with graph regularization","volume":"12","author":"Jiang","year":"2015","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Rohmawati, A.A., and Gunawan, P. (2019, January 24\u201326). The Causality Effect on Vector Autoregressive Model: The Case for Rainfall Forecasting. Proceedings of the 2019 7th International Conference on Information and Communication Technology (ICoICT), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICoICT.2019.8835379"},{"key":"ref_45","unstructured":"Wang, H., Bai, L., Xu, J., and Fei, W. (2015, January 15\u201317). EEG recognition through time-varying vector autoregressive model. Proceedings of the IEEE 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Zhangjiajie, China."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"3881","DOI":"10.1109\/TPWRS.2015.2487419","article-title":"A short-term nodal voltage phasor forecasting method using temporal and spatial correlation","volume":"31","author":"Hassanzadeh","year":"2015","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TSG.2011.2163807","article-title":"Malicious data attacks on the smart grid","volume":"2","author":"Kosut","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"2725","DOI":"10.1109\/TCSI.2021.3062970","article-title":"Damping Power System Electromechanical Oscillations Using Time Delays","volume":"68","author":"Tzounas","year":"2021","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Milano, F. (2010). Power System Modelling and Scripting, Springer.","DOI":"10.1007\/978-3-642-13669-6"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/TPWRS.2010.2051168","article-title":"MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education","volume":"26","author":"Zimmerman","year":"2010","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1052","DOI":"10.1109\/TPWRS.2012.2224144","article-title":"Real-time intrusion detection in power system operations","volume":"28","author":"Valenzuela","year":"2012","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., and Mohsenian-Rad, H. (2012, January 3\u20137). False data injection attacks with incomplete information against smart power grids. Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA.","DOI":"10.1109\/GLOCOM.2012.6503599"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6789\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:27:16Z","timestamp":1760142436000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,8]]},"references-count":52,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["s22186789"],"URL":"https:\/\/doi.org\/10.3390\/s22186789","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,8]]}}}