Method for defending data integrity attack in direct state estimation of power system

A data integrity, power system technology, applied in transmission systems, digital data protection, information technology support systems, etc., can solve problems such as non-emergence and high cost of PMU

Active Publication Date: 2016-07-20
XI AN JIAOTONG UNIV
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the high cost of PMUs, it is unrealistic to configure PMUs on every node in the entire network, so we are committed to finding an optimal PMU configuration strategy, so that the power system can use the least number of PMUs. Successfully defend against data integrity attacks and make the system fully observable, but there is no similar disclosure in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for defending data integrity attack in direct state estimation of power system
  • Method for defending data integrity attack in direct state estimation of power system
  • Method for defending data integrity attack in direct state estimation of power system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention is described in further detail below in conjunction with accompanying drawing:

[0043] refer to figure 1 , the method for resisting the data integrity attack in the DC state estimation of the electric power system described in the present invention comprises the following steps:

[0044]1) Obtain the network parameters of the power system from the energy management system, wherein the network parameters of the power system include the branch number of the transmission line, the first node number, the last node number, series resistance, series reactance, parallel conductance and parallel susceptance .

[0045] 2) The data acquisition and monitoring control system receives the sensor quantity measurement, and then sends the sensor quantity measurement to the state estimator of the energy management system. The state estimator of the energy management system estimates the real-time state of the power system according to the sensor quantity measurem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for defending a data integrity attack in direct state estimation of a power system. The method comprises the following steps: estimating a real-time state of a direct current system by using a weighted least square method; constructing a minimum cost data integrity attack model to simulate the behavior of an attacker; resolving the minimum cost data integrity attack by using an algorithm based on linear transformation to obtain an optimal attack vector at the moment; if the current optimal attack vector is obtained, realizing a PMU optimized configuration defense strategy based on a greedy algorithm, and after the configuration is completed, the occurrence of the data integrity attack is prevented from the source, and meanwhile, the complete observability of the system is guaranteed. By adopting the method disclosed by the invention, the data integrity attack in the direct state estimation of the power system can be accurately and quickly defended, and the accuracy and security of the state estimation of the power system are improved.

Description

technical field [0001] The invention belongs to the technical field of power system information security and control, and relates to a method for resisting data integrity attacks in power system DC state estimation Background technique [0002] With the construction of large-capacity long-distance transmission systems and the realization of large-scale grid interconnection, the security and stability of modern power systems have become increasingly prominent. Data integrity attack, that is, the attacker tampers with the sensor measurement data received by the energy management system (EMS) and changes the result of the state estimation according to the predetermined goal when the attacker has a certain understanding of the power system topology, and finally makes the EMS use Wrong estimates result in incorrect power adjustment or control decisions. [0003] In the current power system, the data integrity attack against EMS will pose a serious threat to the operation securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/64H02J3/24
CPCH02J3/24H04L63/1466G06F21/64Y04S40/20Y02E60/00
Inventor 杨清宇闵瑞安豆
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products