Abstract
This paper introduces a dynamic network model together with a phasor measurement unit (PMU) measurement model suitable for power system state estimation under spoofing attacks on the global positioning system (GPS) receivers of PMUs. The spoofing attacks may introduce time-varying phase offsets in the affected PMU measurements. An algorithm is developed to jointly estimate the state of the network, which amounts to the nodal voltages in rectangular coordinates, as well as the time-varying attacks. The algorithm features closed-form updates. The effectiveness of the algorithm is verified on the standard IEEE transmission networks. It is numerically shown that the estimation performance is improved when the dynamic network model is accounted for compared with a previously reported static approach.
Keywords
Dynamic state equation; global positioning system (GPS) spoofing; phasor measurement unit (PMU); state estimation; time synchronization; weighted least squares
THE smart grid is a massive cyber-physical system (CPS) spanning continents. The cyber part consists of a computerized network including two-way digital communication between devices (e.g., voltage and current sensors, power meters) and the network operation center. The physical part is formed by the power grid itself (generation, transmission, and distribution), which can be as large as a continent. Phasor measurement units (PMUs) equipped with global positioning system (GPS) receivers are installed ubiquitously and replace traditional sensors of the supervisory control and data acquisition (SCADA) systems. PMUs use GPS receivers to accurately time stamp and synchronize measurements. The main advantage of PMUs over SCADA is the higher sampling rate, which enables the operator to perform real-time wide area monitoring, protection and control (WAMPAC).
Sensors such as PMUs that measure nodal voltages, among other quantities, cannot be installed on each bus in the network. Thus, state estimation (SE) routines are performed to gain the visibility of the network. According to [
Various threat scenarios, security gaps, and mitigation strategies in relation to TSAs have been assessed in [
A set of studies has investigated the operation at the GPS receiver level and developed methods to detect GPS spoofing and if possible, to provide accurate timing to the PMU. Specifically, [
The impacts of GPS spoofing attacks on power grid operation have also been analyzed. In addition to demonstrating the experimental feasibility of spoofing, a false generator trip in a synchrophasor-based automatic control scheme is exhibited in [
More recently, power grid operation such as SE have been upgraded to account for GPS spoofing attacks on PMUs. Specifically, distributed estimation of power system oscillations under GPS spoofing attacks is developed in [
The effect of GPS spoofing on PMU measurements bears some resemblance to the problem of imperfect PMU synchronization [
Based on a dynamic model for the power system state, this paper develops an SE algorithm that furnishes the phase offsets induced by GPS spoofing across time, in addition to the power system state. There are two approaches to dynamic SE depending on the definition of the state vector [
This paper adopts the random walk model for the network voltage states [
The remainder of this paper is organized as follows. Section II details the system and attack models. The SE problem is formulated in Section III. The iterative solver is developed in Section IV. Numerical tests and conclusions are presented in Sections V and VI, respectively.
This section describes the multi-period state and measurement model with and without TSAs on PMU measurements.
Consider a power network with buses connected via transmission lines. Let be the set of buses connected to bus , and define as the number of lines connected to bus . The nodal voltage at bus and discrete time period is written in complex, rectangular, and polar forms as , where and are the real and imaginary parts of the nodal voltage, respectively; and is the phase of the nodal voltage. The dynamic equation describing the state evolution over discrete time periods indexed by follows a random walk model:
(1) |
where is the system state vector at time , and vectors and collect the real and imaginary parts of nodal voltages and for , respectively; is the state noise, which follows a Gaussian distribution, that is, , and is a positive definite covariance matrix at time k; and is a generic terminal time through which SE is to be performed. The duration of time period is given by the sampling period . The typical sampling frequency for PMUs ranges between 30 and 120 samples per second, yielding a sampling period of approximately 8-33 ms. The model in (1) is appropriate for the systems where the network dynamics are slow enough compared to the duration of the sampling period [
PMUs are installed on the selected buses of the network, and is a binary indicator equal to 1 if a PMU is installed at bus and 0 otherwise. Vector a collects for . The set of buses where PMUs are installed is denoted by , where P is the number of PMUs installed in the network.
A PMU installed at bus measures, for all time periods , the complex nodal voltage as well as the complex currents on all lines that bus is connected to. This collection of measured quantities (in rectangular coordinates) at bus for time is concatenated in a vector . To make the notation more compact, define as the number of distinct real quantities measured by the PMU at bus for time .
It is convenient for subsequent developments to consider the noiseless version of , which is denoted by :
(2) |
where and are the real and imaginary parts of the complex current flowing on line for time k, respectively; and and are the corresponding current magnitude and phase, respectively.
To summarize, the noiseless quantities measured at bus , for discrete time , comprise of the real and imaginary parts of the nodal voltage, appended by the real and imaginary parts of the complex currents injected to all lines connected to bus for time . Using the bus admittance matrix of the network, can be written as a linear function of the system state as . The corresponding noisy measurement equation evolving over discrete time periods is given as:
(3) |
where , and is a positive definite measurement noise covariance matrix at time k; and the construction of is provided in [
A TSA at node introduces a generally time-varying delay denoted by to all measurements, i.e., voltages and currents, captured by the PMU. To introduce a mathematical model of the attack, let be the instantaneous voltage of bus , and let be the corresponding phasor at continuous time . The phasor is time-dependent to allow for description of a system with time-varying state. The sampled phasor at period is thus . The attacked instantaneous nodal voltage is written as:
(4) |
where is the system operation frequency; and is the real part operator. Similar expressions can be written for the line currents. It is worth emphasizing that the same delay is introduced across the measurements captured by the PMU at bus (entries of ). The reason is that GPS spoofing affects the time estimated by the GPS receiver of the PMU, which subsequently affects the time stamp of all measurements of the PMU. We also introduce the sampled version of , denoted by , and the corresponding attack angle .
The objective is to formulate a time-varying measurement model that relates the attacked measurements with the network state and the attack in period . To this end, it is assumed that . This assumption is valid as experimentally demonstrated. Other realistic attacks reported in [
Theorem 1 The TSA measurement equation at discrete period is given as:
(5) |
where is the attacked measurement vector; and is a block diagonal matrix consisting of blocks where each block is a matrix .
Proof The attacked instantaneous voltage at is
(6) |
Considering that and the network dynamics evolve slowly with respect to the sampling period , the voltage phasor at can be approximated as [
(7) |
(8) |
Extracting the real and imaginary parts of the latter, and repeating for the current measurements, the noisy attacked PMU measurement at bus for time period is given by (cf. (2)):
(9) |
Upon introducing the trigonometric identities and into (9) and combining with (2) and , the measurement model in (5) is obtained.
The assumed relationship between and enables the approximation . Thus, when is smaller, but not significantly smaller, than , the validity of the assumption and the resulting approximation are eventually determined by the extent in which the network dynamics are slow compared to the duration of the sampling period.
The model in (5) expresses the attacked PMU measurement in terms of the spoofing attack , the system , and the state at time . This model is leveraged in the next section to formulate the SE problem with spoofed PMU measurements.
This section presents the joint SE and attack angle reconstruction formulation. Both measurement and state equations are considered in a multi-objective optimization. Let collect for . Likewise, vector collects for and . The optimization is formulated as follows:
(10) |
where represents the nonlinear weighted least squares problem of estimating and based on the measurement
(11) |
(12) |
where the norm notation is used. The initial state vector is considered known, which is an assumption akin to typical multi-period estimation setups that rely on, for example, the Kalman filter.
Problem (10) is nonconvex due to the bilinear term and the sinusoidal dependence of on in . Following [
(13) |
where ; ; and . The variable is eliminated, and the matrix has blocks of the form . The variables and are thus used interchangeably.
In order to uniquely map the vector back to an angle , it is necessary and sufficient to impose the constraint . Define as the vector including for all , . Then, problem (10) becomes equivalent to the following:
(14) |
s.t.
(15) |
In order to facilitate the development of an algorithm for the solution of (3), it is supposed that the following condition holds for the measurement model in (3).
Assumption 1 The matrix is full column-rank.
This assumption pertains to the observation matrix corresponding to all PMU measurements. It ensures that under normal operation (i.e., no spoofing), the power network is observable and the SE problem has a unique solution [
The transformation of the original unconstrained nonlinear problem (10) into the nonconvex quadratically constrained quadratic program (3) enables the development of an iterative solver with closed-form updates. This is the theme of the next section.
This section develops an AM algorithm, to jointly solve (15) for and . The algorithm minimizes two sets of variables one after the other. In the first step, the objective is minimized with respect to one set of variables while treating the second set as constant. In the second step, the minimization occurs with respect to the second set of variables upon substituting the updated values of the first set of variables. In this instance, the vectors and constitute the two sets of variables.
The procedure is repeated until convergence. The initialization step includes for all and . The two minimizations can be performed in closed form, and the related updates are described in the sequel.
In order to derive the update for , the objectives and are re-written as explicit functions of the vector instead of . Specifically, is written as:
(16) |
where is a matrix such that . In particular, is constructed as a block diagonal matrix with the identity matrix in the block.
Similarly, can be written as:
(17) |
where and () are matrices such that and . Specifically, matrix includes the identity matrix in the top diagonal block and is zero otherwise. Matrix is constructed as a fat matrix with negative identity matrix at the block and identity matrix at the block.
The minimization with respect to is an unconstrained minimization with a convex quadratic objective function. The solution is obtained by solving the first-order optimality condition and is given as:
(18) |
(19) |
The following result asserts that matrix is indeed invertible.
Theorem 2 Given that Assumption 1 holds and the entries in satisfy (15), then matrix is invertible.
Proof It follows by the structure of and the positive definiteness of and that is positive semidefinite. We will show that the third term comprising is full-rank, and therefore, is invertible. The third term in can be written as shown in (20).
(20) |
The central matrix in (20) is full-rank because the convariance matrices are positive definite. The matrices are full-rank as long as the entries in satisfy (15). Finally, the matrix consisting of the is full-rank due to Assumption 1. By successive application of the Sylvester inequality [
By the construction of , the pre- and post-multiplication by and , respectively, generates a block diagonal matrix. The
The invertibility of relies upon the values substituted in (2) satisfying (15). This condition is ensured by the next step.
In order to perform the minimization with respect to , only the first of the two objectives in (14) is relevant. Due to the separability of the objective (cf. (16)) and constraints per and , this minimization can be performed in parallel with respect to the variables pertaining to different PMUs and time periods. The resulting problem is stated for and as follows:
(21) |
Considering that is not a variable in (21), the objective in (21) can be rearranged as follows:
(22) |
where is given by
(23) |
where is the
Problem (21) is nonconvex due to the quadratic equality constraints. A problem of this form has been thoroughly analyzed in [
Theorem 3 Suppose that is a diagonal matrix with equal variances for the real and imaginary parts corresponding to each measurement, that is, the diagonal entries of satisfy the following for all and :
(24) |
Then, the solution of (21) is given as follows:
(25) |
Note that the measurement covariance matrix is routinely assumed diagonal, and the particular structure mentioned in Theorem 3 can be found in [
This section presents the state and attack angle estimation tests using the AM algorithm. The numerical tests are performed on the standard IEEE 14- and 118-bus systems. All network parameters are provided in case files case14.m and case118.m of MATPOWER [
The PMU sampling rate is set to 30 samples per second. The simulation considers a time horizon of 35 s. Two realistic attacks, namely, Type I (step) and Type II (ramp) are performed [
The Type I attack occurs suddenly at a particular time instant and remains constant thereafter. In this test, a Type I attack of 0.5787° appears at 30 s [
To demonstrate the effectiveness of the algorithm, representative results pertaining to individual buses and the entire network are presented. The true and estimated voltage magnitudes and phase angles at bus 2 of the IEEE 14- and 118-bus networks across the time horizon are given in

Fig. 1 True and estimated voltage magnitudes and phase angles at bus 2 of IEEE 14-bus network across time horizon. (a) Voltage magnitude. (b) Voltage phase angle.

Fig. 2 True and estimated voltage magnitudes and phase angles at bus 2 of IEEE 118-bus network across time horizon. (a) Voltage magnitude. (b) Voltage phase angle.

Fig. 3 True and estimated Type I and Type II attack angles at bus 14 in IEEE 14-bus network across time horizon. (a) Type I. (b) Type II.

Fig. 4 True and estimated Type I and Type II attack angles at bus 7 in IEEE 118-bus network across time horizon. (a) Type I. (b) Type II.
The relative voltage error is defined as , where and are the state vector estimated with

Fig. 5 Relative voltage errors for IEEE 14- and 118-bus networks across time horizon. (a) IEEE 14-bus network. (b) IEEE 118-bus network.

Fig. 6 Type I and Type II attack angle errors for IEEE 14-bus network across time horizon. (a) Type I. (b) Type II.

Fig. 7 Type I and Type II attack angle errors for IEEE 118-bus network across time horizon. (a) Type I. (b) Type II.
Next, the algorithm is tested with attacks at buses 2, 4, 6, and 14 of the IEEE 14-bus network, and buses 7, 50, 60, and 80 of the IEEE 118-bus network. Only one bus is attacked in each run. The mean relative error is defined as the average of the relative error across the time horizon, that is, . The mean voltage phase angle is the average of the voltage phase angle of a bus across the time horizon, computed from the random walk model of the voltage state. Tables II and III list the mean voltage phase angle for the attacked bus and the resulting mean relative voltage error for the IEEE 14-bus network with Type I attacks of 0.5787° and 5°, respectively. The corresponding values for the IEEE 14-bus network with Type II attack are given in Table IV. Tables V-VII list the mean voltage phase angle for the attacked bus and the resulting mean relative voltage error for the IEEE 118-bus network under Type I and Type II attacks. The values for the mean voltage phase angle and mean relative voltage error in Tables II-VII are computed from single run of the algorithm. However, these values vary only slightly across multiple runs of the algorithm. The results in Tables II-VII reveal that the performance of the algorithm is not sensitive to the location of the attack, the voltage phase angle of the attacked bus, or the attack size.
The quality of the state and attack angle estimation is compared to that of [

Fig. 8 Relative voltage error and attack angle error for Type I attack in IEEE 14-bus network across time horizon. (a) Relative voltage error. (b) Attack angle error.

Fig. 9 State error norms for Type I and Type II attacks in IEEE 14-bus network across time horizon. (a) Type I. (b) Type II.

Fig. 10 Relative voltage error and attack angle error for Type II attack in IEEE 14-bus network across time horizon. (a) Relative voltage error. (b) Attack angle error.
Finally, a comparison between

Fig. 11 State error norms for Type I and Type II attacks in IEEE 14-bus network across time horizon using Algorithm 1 and Kalman filter. (a) Type I. (b) Type II.
This paper puts forth a dynamic model which relates the measurement, state vector, and GPS spoofing attacks. The resulting nonconvex multi-period SE problem is solved by an AM algorithm that jointly estimates the state and reconstructs the attack. Two realistic attack scenarios are considered to validate the aforementioned algorithm on standard IEEE transmission networks. The numerical tests indicate that the estimation quality under GPS spoofing attacks is improved by considering the dynamic model of the network, as opposed to static estimation approaches.
The developed dynamic model and resulting algorithm are applicable to networks whose dynamics are slow enough compared to the sampling period, while relying on the condition that the delay induced by spoofing attack is smaller than the sampling period. It is an interesting direction to develop models for dynamic SE under spoofing attacks in more general setups. Furthermore, power networks may have available readings from SCADA and PMU systems. Developing algorithms for mitigating spoofing attacks in networks where both types of measurements are combined is an additional research direction.
References
T. Popovic, C. Blask, M. Carpenter et al., “Electric sector failure scenarios and impact analyses–version 3.0,” Electric Power Research Institute, Washington, Tech. Rep., Dec. 2015. [百度学术]
A. Jafarnia-Jahromi, A. Broumandan, J. Nielsen et al., “GPS vulnerability to spoofing threats and a review of anti spoofing techniques,” International Journal of Navigation and Observation, vol. 2012, pp. 1-16, May 2012. [百度学术]
D. Schmidt, K. Radke, S. Camtepe et al., “A survey and analysis of the GNSS spoofing threat and countermeasures,” ACM Computing Surveys, vol. 48, no. 4, pp. 1-31, May 2016. [百度学术]
B. Moussa, M. Debbabi, and C. Assi, “Security assessment of time synchronization mechanisms for the smart grid,” IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp. 1952-1973, Feb. 2016. [百度学术]
L. Heng, J. J. Makela, A. D. Dominguez-Garcia et al., “Reliable GPS-based timing for power systems: a multi-layered multi-receiver architecture,” in Proceedings of Power and Energy Conference at Illinois, Champaign, USA, Feb. 2014, pp. 1-7. [百度学术]
D. Chou, L. Heng, and G. Gao, “Robust GPS-based timing for phasor measurement units: a position-information-aided approach,” in Proceedings of 27th International Technical Meeting of the Satellite Division of the Institute of Navigation, Tampa, USA, Sept. 2014, pp. 1261-1269. [百度学术]
D.-Y. Yu, A. Ranganathan, T. Locher et al., “Short paper: detection of GPS spoofing attacks in power grids,” in Proceedings of ACM Conference on Security and Privacy in Wireless & Mobile Networks, Oxford, United Kingdom, Jul. 2014, pp. 99-104. [百度学术]
F. Zhu, A. Youssef, and W. Hamouda, “Detection techniques for data level spoofing in GPS-based phasor measurement units,” in Proceedings of International Conference on Selected Topics in Mobile Wireless Networking, Cairo, Egypt, Apr. 2016, pp. 1-8. [百度学术]
Y. Fan, Z. Zhang, M. Trinkle et al., “A cross-layer defense mechanism against GPS spoofing attacks on PMUs in smart grids,” IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 2659-2668, Nov. 2015. [百度学术]
D. P. Shepard, T. E. Humphreys, and A. A. Fansler, “Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks,” International Journal of Critical Infrastructure Protection, vol. 5, no. 3, pp. 146-153, Dec. 2012. [百度学术]
I. Akkaya, E. A. Lee, and P. Derler, “Model-based evaluation of GPS spoofing attacks on power grid sensors,” in Proceedings of Workshop Modeling and Simulation of Cyber-Physical Energy Systems, Berkeley, USA, May 2013, pp. 1-6. [百度学术]
X. Jiang, J. Zhang, B. J. Harding et al., “Spoofing GPS receiver clock offset of phasor measurement units,” IEEE Transactions on Power Systems, vol. 28, no. 3, pp. 3253-3262, Aug. 2013. [百度学术]
Z. Zhang, S. Gong, A. D. Dimitrovski et al., “Time synchronization attack in smart grid: impact and analysis,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 87-98, Mar. 2013. [百度学术]
J. G. Sreenath, S. Mangalwedekar, A. Meghwani et al., “Impact of GPS spoofing on synchrophasor assisted load shedding,” in Proceedings of IEEE PES General Meeting, Portland, USA, Aug. 2018, pp. 1-5. [百度学术]
Y. Wang and J. P. Hespanha, “Distributed estimation of power system oscillation modes under attacks on GPS clocks,” IEEE Transactions on Instrumentation and Measurement, vol. 67, no. 7, pp. 1626-1637, Jul. 2018. [百度学术]
X. Fan, L. Du, and D. Duan, “Synchrophasor data correction under GPS spoofing attack: a state estimation based approach,” IEEE Transactions on Smart Grid, vol. 9, no. 5, pp. 4538-4546, Sept. 2018. [百度学术]
X. Fan, S. Pal, D. Duan et al., “Closed-form solution for synchrophasor data correction under GPS spoofing attack,” in Proceedings of IEEE PES General Meeting, Portland, USA, Aug. 2018, pp. 1-5. [百度学术]
P. Risbud, N. Gatsis, and A. Taha, “Vulnerability analysis of smart grids to GPS spoofing,” IEEE Transactions on Smart Grid, vol. 10, no. 4, pp. 3535-3548, Jul. 2019. [百度学术]
S. D. Silva, T. Hagan, J. Kim et al., “Sparse error correction for PMU data under GPS spoofing attacks,” in Proceedings of IEEE Global Conference on Signal and Information Processing, Anaheim, USA, Nov. 2018, pp. 902-906. [百度学术]
Y. Zhang, J. Wang, and J. Liu, “Attack identification and correction for PMU GPS spoofing in unbalanced distribution systems,” IEEE Transactions on Smart Grid, vol. 11, no. 1, pp. 762-773, Jan. 2020. [百度学术]
P. Pradhan, K. Nagananda, P. Venkitasubramaniam et al., “GPS spoofing attack characterization and detection in smart grids,” in Proceedings of IEEE Conference on Communications and Network Security, Philadelphia, USA, Oct. 2016, pp. 391-395. [百度学术]
P. Castello, C. Muscas, P. Pegoraro et al., “Trustworthiness of PMU data in the presence of synchronization issues,” in Proceedings of IEEE International Instrumentation and Measurement Technology Conference, Houston, USA, May 2018, pp. 1-5. [百度学术]
P. Yang, Z. Tan, A. Wiesel et al., “Power system state estimation using PMUs with imperfect synchronization,” IEEE Transactions on Power Systems, vol. 28, no. 4, pp. 4162-4172, Nov. 2013. [百度学术]
J. Du, S. Ma, Y. Wu et al., “Distributed Bayesian hybrid power state estimation with PMU synchronization errors,” in Proceedings of IEEE Global Communications Conference, Austin, USA, Dec. 2014, pp. 3174-3179. [百度学术]
J. A. Bazerque, U. Ribeiro, and J. Costa, “Synchronization of phasor measurement units and its error propagation to state estimators,” in Proceedings of IEEE PES Innovative Smart Grid Technologies Latin America, Montevideo, Uruguay, Oct. 2015, pp. 508-513. [百度学术]
M. Todescato, R. Carli, L. Schenato et al., “PMUs clock desynchronization compensation for smart grid state estimation,” in Proceedings of IEEE Conference on Decision and Control, Melbourne, Australia, Dec. 2017, pp. 793-798. [百度学术]
L. Hu, Z. Wang, I. Rahman et al., “A constrained optimization approach to dynamic state estimation for power systems including PMU and missing measurements,” IEEE Transactions on Control Systems Technology, vol. 24, no. 2, pp. 703-710, Mar. 2016. [百度学术]
S. Sarri, L. Zanni, M. Popovic et al., “Performance assessment of linear state estimators using synchrophasor measurements,” IEEE Transactions on Instrumentation and Measurement, vol. 65, no. 3, pp. 535-548, Mar. 2016. [百度学术]
M. B. D. C. Filho and J. C. S. de Souza, “Forecasting-aided state estimation–part I: panorama,” IEEE Transactions on Power Systems, vol. 24, no. 4, pp. 1667-1677, Nov. 2009. [百度学术]
A. Monticelli, “Electric power system state estimation,” Proceedings of IEEE, vol. 88, no. 2, pp. 262-282, Feb. 2000. [百度学术]
J. Zhang, G. Welch, G. Bishop et al., “A two-stage Kalman filter approach for robust and real-time power system state estimation,” IEEE Transactions on Sustainable Energy, vol. 5, no. 2, pp. 629-636, Apr. 2014. [百度学术]
N. Zhou, D. Meng, Z. Huang et al., “Dynamic state estimation of a synchronous machine using PMU data: a comparative study,” IEEE Transactions on Smart Grid, vol. 6, no. 1, pp. 450-460, Jan. 2015. [百度学术]
J. Zhao, M. Netto, and L. Mili, “A robust iterated extended Kalman filter for power system dynamic state estimation,” IEEE Transactions on Power Systems, vol. 32, no. 4, pp. 3205-3216, Jul. 2017. [百度学术]
Y. Guo, B. Zhang, W. Wu et al., “Multi-time interval power system state estimation incorporating phasor measurements,” in Proceedings of IEEE PES General Meeting, Denver, USA, Jul. 2015, pp. 1-5. [百度学术]
A. Khalajmehrabadi, N. Gatsis, D. Akopian et al., “Realtime rejection and mitigation of time synchronization attacks on the global positioning system,” IEEE Transactions on Industrial Electronics, vol. 65, no. 8, pp. 6425-6435, Aug. 2018. [百度学术]
V. Kekatos, G. Giannakis, and B. Wollenberg, “Optimal placement of phasor measurement units via convex relaxation,” IEEE Transactions on Power Systems, vol. 27, no. 3, pp. 1521-1530, Aug. 2012. [百度学术]
P. Risbud, N. Gatsis, and A. Taha, “Assessing power system state estimation accuracy with GPS-spoofed PMU measurements,” in Proceedings of 7th IEEE Conference on Innovative Smart Grid Technologies, Minneapoils, USA, Sept. 2016, pp. 1-5. [百度学术]
A. Gomez-Exposito, A. J. Conejo, and C. Canizares, Electric Energy Systems: Analysis and Operation. Boca Raton: CRC Press, 2018. [百度学术]
R. Horn and C. R. Johnson, Matrix Analysis, 2nd ed. Cambridge: Cambridge University Press, 2013. [百度学术]
A. Gomez-Exposito, P. Rousseaux, C. Gomez-Quiles et al., “On the use of PMUs in power system state estimation,” in Proceedings of 17th Power System Computation Conference, Stockholm, Sweden, Aug. 2011. [百度学术]
R. Zimmerman, C. Murillo-Saanchez, and R. Thomas, “MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education,” IEEE Transactions on Power Systems, vol. 26, no. 1, pp. 12-19, Feb. 2011. [百度学术]
IEEE Standard for Synchrophasor Measurements for Power Systems, IEEE Std C37.118.1-2011 (Revision of IEEE Std C37.118-2005), 2011. [百度学术]