Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Smart grid malicious data injection attack and detection method

A malicious data, injection attack technology, applied in the field of smart grid data information security, can solve problems such as no detection algorithm proposed

Inactive Publication Date: 2015-04-29
SOUTHWEAT UNIV OF SCI & TECH
View PDF6 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although some literatures have proposed some detection algorithms for the DC transmission model of the smart grid and achieved certain results, but for the more practical AC transmission model of the power grid, no effective detection algorithm has been proposed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart grid malicious data injection attack and detection method
  • Smart grid malicious data injection attack and detection method
  • Smart grid malicious data injection attack and detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the content, effects and key points of the present invention clearer, the present invention will be further elaborated below in conjunction with the accompanying drawings. A smart grid malicious data injection attack and detection method, its technical implementation scheme such as flow figure 1 As shown, it includes the following steps:

[0056] Step 1: Obtain the grid topology and line parameters; the topology of the grid includes the connection status between lines, and the opening and closing of switches; the line parameters include line admittance and ground susceptance.

[0057] Step 2: Based on the PMU system observability analysis, determine the minimum PMU measurement configuration required for system observability through the system observability analysis method of the minimum number of PMU configurations; where, the PMU measurement includes the voltage at the PMU configuration node magnitude and the branch current vectors adjacent to it.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a smart grid malicious data injection attack and detection method, belongs to the field of smart grid data information safety, and aims at solving an existing technology has the defects if smart grid measurement data are subjected to malicious data injection attack by hackers. The method comprises the following steps: firstly converting the malicious data injection attack in an alternating current model into the malicious data injection attack in a direct current model by attacking few phasor measurement units (PMUs) in a grid so as to construct a new smart grid malicious data injection attack manner; and aiming at the new attack manner, providing two detection operators based on forecast measurement and estimation measurement residual for detecting, positioning and judging malicious injection data possibly existing in power system measurement information, and performing relative update data process to ensure that the smart grid runs relatively stably, safely and reliably. The smart grid malicious data injection attack and detection method can be achieved after the original grid architecture is subjected to relatively slight technological transformation and upgrade, so that the practical economic value and the operability are achieved.

Description

technical field [0001] The invention belongs to the field of smart grid data information security, in particular to a smart grid malicious data injection attack and detection method. Background technique [0002] Modern smart grids use state estimation theory to obtain the best estimate of the current state of the power system from error-containing telemetry data (active and reactive power injection measurements, active and reactive power flow measurements, voltage measurements), and eliminate errors that occur in the system. It provides real-time and accurate operation data for the online analysis and control of the power system. Therefore, effectively eliminating erroneous data in telemetry data and defending against hackers' malicious data injection attacks are the primary conditions for the safe and stable operation of smart grids. Although after years of development, a relatively complete theoretical system of bad data detection and identification has been established ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55
CPCG06F21/56
Inventor 王学渊胥学金赵俊博罗亮周金治张婧鹤
Owner SOUTHWEAT UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products