Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Defense method of false data injection attack of power state estimation system

A false data attack and injection attack technology, which is applied to electrical components, circuit devices, AC network circuits, etc., can solve the problems of reduced security and achieve the effect of ensuring security

Inactive Publication Date: 2012-10-31
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF2 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By analyzing conditions such as the minimum measurements required in the attack, it is possible to protect a set of measurements to prevent this attack, but there is currently no effective way to defend against this attack
[0004] The protection set method can resist false data injection attacks. In the smart grid, the system can be protected from intrusion by selecting a small number of measured values ​​for protection and authentication. This method is simple and direct, but the protection set method will be controlled by the network. The change of the topology structure leads to a decrease in its security, that is, when the configuration of the system changes, the protection set method cannot completely protect the system from false data injection attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method of false data injection attack of power state estimation system
  • Defense method of false data injection attack of power state estimation system
  • Defense method of false data injection attack of power state estimation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The preferred embodiments will be described in detail below in conjunction with the accompanying drawings. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0066] The invention proposes a defense method against false data injection attacks of the power state estimation system, adopts an extended protection set method, so that the system can still effectively defend against false data injection attacks while the structure changes.

[0067] The implementation of the extended protection set method of the present invention will be described in detail below in conjunction with the accompanying drawings, taking the modified IEEE4 node system as an example. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0068] figure 1 It is a flowchart of a defense method for false data injecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defense method of false data injection attack of a power state estimation system, belonging to the field of intelligent power grid and information safety. The method comprises the following steps of: firstly establishing a power system state estimating model and a false data attack model; subsequently calculating a system configuration matrix so as to obtain the solution of the state quantity of the power system state estimating model; further establishing the safety set of the system; and updating the safety set when the power system is changed in structure. The method is based on a protection set and by arranging an expansion protection set, the false data injection attack can be defended even a network structure is changed, thereby ensuring the security of the power system.

Description

technical field [0001] The invention belongs to the field of smart grid and information security, and in particular relates to a defense method for false data injection attack of a power state estimation system. Background technique [0002] A smart grid covers power generation, transmission networks and regional distribution networks, and ultimately delivers electricity to consumers. In order to ensure the reliability of the system and the normal operation of the system functions, real-time system monitoring is very necessary. Power system state estimation estimates the operating state of the system by collecting the values ​​measured by the measuring instruments and analyzing the system model. There are many methods and technologies in interactive error data detection, but these methods cannot effectively resist the attack of malicious data injection. At present, there is a new type of false data injection attack against the state estimation system of the power system, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H02J3/00
Inventor 李元诚王以良李文智
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products