Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Transmission network false data attack defense method based on protection measurement point

A false data attack and measurement point technology, applied in the field of power system information security, can solve the problems of detection strategy attack, long cycle, and high development risk, achieve the effect of defending against false data attacks and enhancing the ability to defend against false data attacks

Inactive Publication Date: 2016-10-12
WUHAN UNIV
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By designing better detection strategies, such as adaptive CUSUM test algorithm, nuclear norm minimization method (Nuclear Norm Minimization) and low rank matrix factorization method (Low Rank Matrix Factorization), false data can be directly detected from measurement data , does not require additional hardware investment, but needs to redevelop the software, the development risk is high, the cycle is long, and there may be attack methods for new detection strategies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transmission network false data attack defense method based on protection measurement point
  • Transmission network false data attack defense method based on protection measurement point
  • Transmission network false data attack defense method based on protection measurement point

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below with reference to specific embodiments and accompanying drawings.

[0030] figure 1 is based on the indicator V k and the indicator R k The flow chart of the fake data attack defense method, the specific implementation steps are as follows:

[0031] Step 1: Attack all the measurement points in the power system in turn, obtain the attack vectors corresponding to all the measurement points according to the fake data attack vector optimization model, and calculate the index V of the power system k , if the index V in the sense of attack difficulty β k =0, go to step 3, otherwise go to step 2.

[0032] In a power system with N buses, the state variable is generally taken as the complex voltage of each bus, including the voltage amplitude and phase angle. Except for the reference node, there are a total of 2N-1 state variables, and the state variables are uniformly expressed as x =[x 1 ,x 2 ,…,x n ] T, n=2N-1. F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a modern transmission network false data attack defense method based on a protection measurement point in the field of information security research of a power system. The method provided by the invention comprises the steps that a false data attack vector optimization model is constructed based on a traditional power system state estimation theory; according to the optimization model, a false data attack defense measure based on indexes Vk and Rk is provided; the basic idea is to reduce the number of vulnerable nodes vulnerable to attacks in the power system and to enhance the overall ability to deal with false data attacks; and according to an importance index Ik, the defense measure is realized, namely the target of the optimization indexes Vk and Rk is realized by protecting a high measurement point of the importance index Ik. According to the invention, the important measurement point is protected to effectively improve the attack cost and the attack difficulty of an attacker.

Description

technical field [0001] The invention relates to the field of power system information security, in particular to a method for defending false data attacks in a power transmission network based on protection measurement points. Background technique [0002] Energy Management System (EMS) is one of the important power information communication systems, which mainly includes basic functions such as data acquisition, energy management and network analysis, and plays an important role in the safe and stable operation of the power system. State estimation is one of the core functions of EMS, and it is the basis for EMS to perform related analysis and control functions such as load forecasting, optimal power flow calculation and transient stability analysis. False Data Injection Attacks (FDI) is a kind of network attack that exploits traditional state estimation detection vulnerabilities. The fake data attack is based on the DC power flow model, and it is pointed out that when the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H02J3/00
CPCH02J3/00H02J2203/20
Inventor 田猛王先培龙嘉川代荡荡朱国威
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products