Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and readable storage medium for detecting false data injection attack

A false data injection attack technology, applied to circuit devices, AC network circuits, electrical components, etc., can solve the problems of poor communication security in the power grid and the inability to effectively resist false data injection attacks, etc., to achieve low overhead, protect data authenticity, The effect of ensuring data communication security

Active Publication Date: 2021-07-13
CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But there are the following problems: First, only the measured values ​​in specific PMUs are reliable in this method
Secondly, if an attacker attacks a specific PMU and modifies its measurement value, the PMU in the protection method may be in a dangerous state, and the state estimation may take a great risk, and it is still unable to effectively resist the false data injection attack. poor communication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and readable storage medium for detecting false data injection attack
  • Method, device and readable storage medium for detecting false data injection attack
  • Method, device and readable storage medium for detecting false data injection attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] The terms "first", "second", "third" and "fourth" in the specification and claims of this application and the above drawings are used to distinguish different objects, rather than to describe a specific order . Furthermore, the terms "comprising" and "having", and any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product, or device compris...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method, device and computer-readable storage medium for detecting false data injection attacks. Applied to a three-layer smart grid framework consisting of PMU layer, local aggregation layer, and control layer, the local aggregation layer pre-trains multiple fuzzy neural network models that are independent of each other and are used to detect false data in the aggregated data of the local aggregator; Receive the measurement data and estimated state values ​​sent by each local aggregator and input them into the corresponding fuzzy neural network model to obtain the false data information of each local aggregator; if there is at least one target local aggregator whose false data value is greater than the threshold, then determine the bus Suffering from false data injection attacks; the local aggregator aggregates the measurement data collected by the PMUs in the corresponding area and performs state estimation to obtain the estimated state value, and sends the data to the control layer after the identity legality verification request is passed. This application can effectively resist false data injection to attack the grid and ensure the security of grid communication.

Description

technical field [0001] The present application relates to the technical field of power grid security, in particular to a method, device and computer-readable storage medium for detecting false data injection attacks. Background technique [0002] In a distributed SE (state estimation, state estimation) system, the state estimator executes SE on each branch and bus in a distributed manner. Distributed SE systems support high R / X (resistance / reactance) ratios, low actual measurement availability, better scalability and minimized complexity. When applied to high-voltage direct current (HVDC) systems, distributed SE achieves better performance in smart grids than centralized SE systems, which occupy the high computational overhead and high complexity burden of the control center. [0003] Based on the advantages of distributed SE, the existing technology mostly adopts a three-layer smart grid framework, which includes a PMU layer, a local aggregation layer, and a control layer....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H02J13/00H02J3/00
CPCH02J3/00H02J13/00H04L63/1466Y02E60/00
Inventor 夏卓群龙高航尹波王进
Owner CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products