{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T06:57:56Z","timestamp":1776063476844,"version":"3.50.1"},"reference-count":34,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"third batch of school-level top-class construction projects of Tianjin College, University of Science and Technology Beijing, Motor and Drive Systems","award":["YLKC202306"],"award-info":[{"award-number":["YLKC202306"]}]},{"name":"third batch of school-level top-class construction projects of Tianjin College, University of Science and Technology Beijing, Motor and Drive Systems","award":["62103357"],"award-info":[{"award-number":["62103357"]}]},{"name":"third batch of school-level top-class construction projects of Tianjin College, University of Science and Technology Beijing, Motor and Drive Systems","award":["F2021203043"],"award-info":[{"award-number":["F2021203043"]}]},{"name":"third batch of school-level top-class construction projects of Tianjin College, University of Science and Technology Beijing, Motor and Drive Systems","award":["XTCX202203"],"award-info":[{"award-number":["XTCX202203"]}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["YLKC202306"],"award-info":[{"award-number":["YLKC202306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["62103357"],"award-info":[{"award-number":["62103357"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["F2021203043"],"award-info":[{"award-number":["F2021203043"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"publisher","award":["XTCX202203"],"award-info":[{"award-number":["XTCX202203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hebei Natural Science Foundation","award":["YLKC202306"],"award-info":[{"award-number":["YLKC202306"]}]},{"name":"Hebei Natural Science Foundation","award":["62103357"],"award-info":[{"award-number":["62103357"]}]},{"name":"Hebei Natural Science Foundation","award":["F2021203043"],"award-info":[{"award-number":["F2021203043"]}]},{"name":"Hebei Natural Science Foundation","award":["XTCX202203"],"award-info":[{"award-number":["XTCX202203"]}]},{"name":"Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network, Nanjing Institute of Technology","award":["YLKC202306"],"award-info":[{"award-number":["YLKC202306"]}]},{"name":"Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network, Nanjing Institute of Technology","award":["62103357"],"award-info":[{"award-number":["62103357"]}]},{"name":"Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network, Nanjing Institute of Technology","award":["F2021203043"],"award-info":[{"award-number":["F2021203043"]}]},{"name":"Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network, Nanjing Institute of Technology","award":["XTCX202203"],"award-info":[{"award-number":["XTCX202203"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The integration of advanced sensor technology and control technology has gradually improved the operational efficiency of traditional power systems. Due to the undetectability of these attacks using traditional chi-square detection techniques, the state estimation of power systems is vulnerable to cyber\u2013physical attacks, For this reason, this paper presents a novel detection and identification framework for detecting malicious attacks in power systems from the perspective of cyber\u2013physical symmetry. To consider the undetectability of cyber\u2013physical attacks, a physical dynamics detection model using the unknown input observers (UIOs) and cosine similarity theorem is proposed. Through the design of UIO parameters, the influence of attacks on state estimation can be eliminated. A cosine similarity value-based detection criterion is proposed to replace the traditional detection threshold. To further cut down the effects caused by malicious attacks, an observer combination-based attack identification framework is established. Finally, simulations are given to demonstrate that the proposed security method can detect and identify the injected malicious attacks quickly and effectively.<\/jats:p>","DOI":"10.3390\/sym15122104","type":"journal-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T06:06:23Z","timestamp":1700719583000},"page":"2104","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Detection and Identification Mechanism for Malicious Injection Attacks in Power Systems"],"prefix":"10.3390","volume":"15","author":[{"given":"Hongfeng","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Intelligent Manufacturing, Tianjin College, University of Science and Technology Beijing, Tianjin 301830, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2380-1639","authenticated-orcid":false,"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, Yanshan University, Qinhuangdao 066004, China"},{"name":"Jiangsu Collaborative Innovation Center for Smart Distribution Network, Nanjing 210000, China"}]},{"given":"Lan","family":"Ban","sequence":"additional","affiliation":[{"name":"School of Intelligent Manufacturing, Tianjin College, University of Science and Technology Beijing, Tianjin 301830, China"}]},{"given":"Molin","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Intelligent Manufacturing, Tianjin College, University of Science and Technology Beijing, Tianjin 301830, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,11,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"179970","DOI":"10.1109\/ACCESS.2020.3028222","article-title":"Power System Security with Cyber-Physical Power System Operation","volume":"8","author":"Oyewole","year":"2020","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"6151","DOI":"10.1109\/JIOT.2022.3222911","article-title":"Blockchain-aided network resource orchestration in intelligent Internet of Things","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"5512","DOI":"10.1109\/TPWRS.2021.3078730","article-title":"A Coalitional Cyber-Insurance Design Considering Power System Reliability and Cyber Vulnerability","volume":"36","author":"Lau","year":"2021","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1109\/JPROC.2017.2686394","article-title":"Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid","volume":"105","author":"Ashok","year":"2017","journal-title":"Proc. IEEE"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"109918","DOI":"10.1016\/j.rser.2020.109918","article-title":"Measuring smart grid resilience: Methods challenges and opportunities","volume":"130","author":"Das","year":"2021","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/TETC.2013.2296440","article-title":"A framework for modeling cyber physical switching attacks in smart grid","volume":"1","author":"Liu","year":"2014","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Saini, A., Bhui, P., Singh, A.K., Haq, F.U., and Kotakonda, C. (2022, January 17\u201319). Impact of False Data Injection Attacks in Wide Area Damping Control. Proceedings of the 2022 22nd National Power Systems Conference (NPSC), New Delhi, India.","DOI":"10.1109\/NPSC57038.2022.10069455"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Xiao, M., Wu, J., Long, C., and Li, S. (2016, January 27\u201329). Construction of false sequence attack against PLC based power control system. Proceedings of the 2016 35th Chinese Control Conference (CCC), Chengdu, China.","DOI":"10.1109\/ChiCC.2016.7554953"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/JPROC.2015.2503119","article-title":"Smart grids: A cyber-physical systems perspective","volume":"104","author":"Yu","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"727","DOI":"10.35833\/MPCE.2021.000604","article-title":"A Review on Cybersecurity Analysis, Attack Detection, and Attack Defense Methods in Cyber-physical Power Systems","volume":"11","author":"Du","year":"2023","journal-title":"J. Mod. Power Syst. Clean Energy"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100603","DOI":"10.1016\/j.iot.2022.100603","article-title":"A novel machine learning pipeline to detect malicious anomalies for the Internet of Things","volume":"20","author":"Shukla","year":"2022","journal-title":"Internet Things"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Gaggero, G.B., Caviglia, R., Armellin, A., Rossi, M., Girdinio, P., and Marchese, M. (2022). Detecting Cyberattacks on Electrical Storage Systems through Neural Network Based Anomaly Detection Algorithm. Sensors, 22.","DOI":"10.3390\/s22103933"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Balzarotti, D., Stolfo, S.J., and Cova, M. (2012). Research in Attacks, Intrusions, and Defenses. RAID 2012, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-33338-5"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Gaggero, G.B., Rossi, M., Girdinio, P., and Marchese, M. (2020). Detecting System Fault\/Cyberattack within a Photovoltaic System Connected to the Grid: A Neural Network-Based Solution. J. Sens. Actuator Netw., 9.","DOI":"10.3390\/jsan9020020"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1049\/iet-stg.2020.0094","article-title":"Modern power system reliability assessment with cyber-intrusion on heat pump systems","volume":"3","author":"Gunduz","year":"2020","journal-title":"IET Smart Grid"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1804","DOI":"10.1109\/TIT.2021.3049468","article-title":"Low-complexity quickest change detection in linear systems with unknown time-varying pre- and post-change distributions","volume":"67","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"106819","DOI":"10.1016\/j.ijepes.2021.106819","article-title":"Machine learning based false data injection in smart grid","volume":"130","author":"Nawaz","year":"2021","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2326","DOI":"10.1109\/TSG.2019.2892595","article-title":"Energy theft detection using gradient boosting theft detector with feature engineering-based preprocessing","volume":"10","author":"Punmiya","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3800","DOI":"10.1109\/TAC.2020.2982577","article-title":"A Distributed Cyber-Attack Detection Scheme with Application to DC Microgrids","volume":"65","author":"Gallo","year":"2020","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_20","first-page":"126834","article-title":"An adaptive cubature Kalman filter for nonlinear systems against randomly occurring injection attacks","volume":"418","author":"Lv","year":"2022","journal-title":"Appl. Math. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1007\/s40565-018-0413-5","article-title":"Detection of false data injection attacks using unscented Kalman filter","volume":"6","year":"2018","journal-title":"J. Mod. Power Syst. Clean Energy"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xue, W., He, S., and Cheng, L. (2021, January 10\u201312). Stealthy False Data Injection Attacks against Extended Kalman Filter Detection in Power Grids. Proceedings of the 2021 8th International Conference on Information, Cybernetics, and Computational Social Systems (ICCSS), Beijing, China.","DOI":"10.1109\/ICCSS53909.2021.9721954"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/JESTIE.2021.3112919","article-title":"Decentralized Detection and Mitigation of Multiple False Data Injection Attacks in Multiarea Power Systems","volume":"3","author":"Xiahou","year":"2022","journal-title":"IEEE J. Emerg. Sel. Top. Ind. Electron."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"7275","DOI":"10.1109\/TII.2020.2972809","article-title":"A secure hybrid dynamic-state estimation approach for power systems under false data injection attacks","volume":"16","author":"Kazemi","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"5505","DOI":"10.1109\/TII.2019.2902163","article-title":"Dynamic data injection attack detection of cyber physical power systems with uncertainties","volume":"15","author":"Wang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TCNS.2014.2357531","article-title":"Detection of faults and attacks including false data injection attack in smart grid using Kalman filter","volume":"1","author":"Manandhar","year":"2014","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1109\/TIFS.2017.2676721","article-title":"Modeling and mitigating impact of false data injection attacks on automatic generation control","volume":"12","author":"Tan","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Luo, X., Zhu, M., Wang, X., and Guan, X. (2022). Detection and isolation of false data injection attack via adaptive Kalman filter bank. J. Control Decis., 1\u201313.","DOI":"10.1080\/23307706.2022.2139299"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.ifacol.2023.02.011","article-title":"Linear Unknown Input Observers for Sensor Fault Estimation in Nonlinear Systems","volume":"56","author":"Venkateswaran","year":"2023","journal-title":"IFAC-PapersOnLine"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2942","DOI":"10.1109\/TAC.2011.2161945","article-title":"Generalized KYP Lemma with Real Data","volume":"56","author":"Pipeleers","year":"2011","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1109\/TAC.2006.878784","article-title":"H\u221e observer design for lipschitz nonlinear systems","volume":"51","author":"Pertew","year":"2006","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.isatra.2016.11.016","article-title":"Event-triggered fault detection for a class of discrete-time linear systems using interval observers","volume":"68","author":"Zhang","year":"2017","journal-title":"ISA Trans."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"110195","DOI":"10.1016\/j.jfa.2023.110195","article-title":"Schur complement dominant operator matrices","volume":"286","author":"Gerhat","year":"2023","journal-title":"J. Funct. Anal."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/TAC.1985.1104055","article-title":"Time scale modeling of sparse dynamic networks","volume":"30","author":"Chow","year":"2003","journal-title":"IEEE Trans. Autom. Control"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/12\/2104\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:28:13Z","timestamp":1760131693000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/12\/2104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":34,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["sym15122104"],"URL":"https:\/\/doi.org\/10.3390\/sym15122104","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,23]]}}}