Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double-layer defense method facing power system false data injection attack

A power system and false data technology, applied in transmission systems, data processing applications, electrical components, etc., can solve the problems of power system miscuts and misoperations, damage to power grid information integrity, attacks, etc., to achieve the effect of protecting resources and optimizing

Active Publication Date: 2018-03-20
SOUTHEAST UNIV
View PDF6 Cites 56 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, false data injection attack (false data injection attack, FDIA) is an attack method that destroys the integrity of power grid information by tampering with terminal measurement data. The data will interfere with the analysis and decision-making of the upper-level control center, causing serious attack consequences, so it is a relatively high-level attack method for the power system.
The principle of FDAA is to use the limitations of the bad data identification method in the state estimator to carry out coordinated attacks on multiple nodes and lines in the power grid, maliciously tamper with the measured values ​​of the components, thereby manipulating the state estimates of specific components, so that the control center Misjudgment that the power grid has entered an emergency state, resulting in mis-cutting and misoperation of the power system, thus affecting the monitoring ability and safe and stable operation level of the power system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-layer defense method facing power system false data injection attack
  • Double-layer defense method facing power system false data injection attack
  • Double-layer defense method facing power system false data injection attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] The present invention provides a double-layer defense method for false data injection attacks in electric power systems. Based on the actual attack and defense principles and game theory, the false data injection attacks are detected and defended, and the consequences of attacks on the system are minimized. In the present invention, the characteristics of false data injection attack: the data tampering object is the state value of the power element (including node voltage amplitude, phase angle, generator output active power, reactive power and line active power, reactive power flow power), in the attack For a certain power component, it is necessary to carry out a coordinated attack on the line connected to the component and all components in the node to ensure that the state information in this range is consistent and conforms to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a double-layer defense method facing a power system false data injection attack, comprising an upper-layer defense policy and a lower-layer defense policy. In the upper-layer defense policy, based on internal defense means of a power system, methods such as bad data identification, injected power detection, and the like are mainly comprised, and injected false datais preliminarily detected, to generate attack space; and in the lower-layer defense policy, based on redundancy measurement defense means, a configuration position of a measurement apparatus is optimized by using a two-person zero-sum game theory according to an attack range that can be defended by the measurement apparatus, to make the measurement apparatus to implement an optimal defense capability on an attack behavior that is not detected by the upper-layer policy. The double-layer defense method facing a power system false data injection attack is used to assist a defender in establishinga power system security defense counterattack system.

Description

technical field [0001] The invention belongs to the technical field of electric power system security, and in particular relates to a double-layer defense method facing false data injection attacks of electric power systems. Background technique [0002] With the rapid development of smart grids and the in-depth application of advanced information technologies such as perception, computing, communication, and control, the power system is gradually realizing informatization, networking, and intelligence. While promoting real-time analysis, scientific decision-making, and efficient allocation of power resources, open communication networks and interface terminals also bring potential security risks. Compared with the relatively robust primary power system, the research on the security protection of the information communication system started late, and there are many security loopholes. Due to the great interest correlation and wide dissemination of the power system, once it ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q50/06
CPCG06Q50/06H04L63/1416H04L63/1441
Inventor 王琦邰伟汤奕
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products