Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control system security dynamic event trigger control method under false data attack

A false data attack and event-triggered technology, applied in the field of power systems, can solve problems such as excessive data consumption, excessive consumption of network resources, and less consideration of actuator execution capabilities, so as to save network communication resources, reduce pressure, and avoid transmission.

Pending Publication Date: 2022-07-05
YINGKOU ELECTRIC POWER SUPPLY COMPANY OF STATE GRID LIAONING ELECTRIC POWER SUPPLY +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Disadvantages of the existing technology: 1. The traditional event trigger mechanism samples a lot of data, and a large amount of data needs to be collected for transmission when the system is stable, which increases the burden of network communication and causes excessive consumption of network resources
2. When designing the system model, the unmeasurable part of the system state is not considered, and the limited execution ability of the actuator is less considered. It is difficult to simulate the actual operation of the system, which causes difficulties for the actual application of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control system security dynamic event trigger control method under false data attack
  • Control system security dynamic event trigger control method under false data attack
  • Control system security dynamic event trigger control method under false data attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0083] This example is implemented under the great premise of the technical solution of the present invention, and provides a detailed implementation scheme and a specific operation process, but the protection scope of the present invention is not limited to the following examples.

[0084] like figure 2 The present invention considers the linear control model of the three-region interconnected power system. The structure of the power system mainly includes a turbine, a governor, a generator, a power system synchronous vector measurement unit (PMU), a sensor, an event generator, a holder, and a controller. It is composed of actuators, and the PMU is used for dynamic monitoring on the back street of the generator; a dynamic event trigger controller is introduced behind the sensor, and the control process is operated by the event generator; if the dynamic trigger strategy is satisfied, the event generator will execute the trigger. That is, non-uniform sampling is performed, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A control system security dynamic event trigger control method under false data attack designs a false data injection attack model with an observer module, a sensor module, a controller module and an actuator saturation module, and introduces a dynamic event trigger mechanism in consideration of limited communication network bandwidth resources. An improved event triggering scheme is presented. The main idea of the event triggering mechanism is to detect whether a current sampling signal satisfies a preset triggering algorithm, if so, the sampled signal is transmitted to the controller, otherwise, the sampled signal is abandoned. The method has the advantages that the improved event triggering scheme ensures that the system can operate safely and stably on the premise of global stability, meanwhile, transmission of redundant signals is reduced, the pressure of network transmission is relieved, and bandwidth resources are saved. In addition, the introduced observer module and actuator saturation module are closer to the operating environment and requirements of the power grid, the network control performance is ensured, and the expected control effect is achieved.

Description

technical field [0001] The invention relates to the technical field of electric power systems, in particular to a control method for triggering a control system security dynamic event under false data attack. Background technique [0002] Whether the power system can operate safely and stably is an important part of the power system. As a typical physical information system, power grid integrates network computing and communication between power grid components, which can effectively improve the cooperation between physical components and network components. Safe and stable operation is one of the most basic and most important goals pursued by power grids, and having a power grid that can resist physical information system attacks is the key to achieving this goal. Physical information system attacks are usually divided into two categories: false data injection attacks and denial of service attacks. False data attacks will cause the control center to fail to make correct j...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H02J3/24H02J3/00H02J13/00H04L9/40H04L41/142H04L67/12
CPCH02J3/241H02J3/001H02J13/00H04L63/1466H04L63/20H04L41/142H04L67/12H02J2203/10H02J2203/20
Inventor 郑薇隋合轼陶雪刘杰张德福贾旭聂瑾李宁张忠傲傅冠儒
Owner YINGKOU ELECTRIC POWER SUPPLY COMPANY OF STATE GRID LIAONING ELECTRIC POWER SUPPLY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products