A two-layer defense method against spurious data injection attack in power system

A false data injection attack technology, applied in transmission systems, information technology support systems, electrical components, etc., can solve the problem of no FDI attack defense and achieve the effect of defending against FDI injection attacks

Active Publication Date: 2018-12-11
GUANGDONG UNIV OF TECH
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are many defense methods for power systems,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-layer defense method against spurious data injection attack in power system
  • A two-layer defense method against spurious data injection attack in power system
  • A two-layer defense method against spurious data injection attack in power system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The accompanying drawings are for illustrative purposes only and cannot be construed as limiting the patent;

[0036] In order to better illustrate this embodiment, some parts in the drawings will be omitted, enlarged or reduced, and do not represent the size of the actual product;

[0037] For those skilled in the art, it is understandable that some well-known structures and descriptions thereof may be omitted in the drawings.

[0038] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] refer to figure 1 , the specific implementation steps of the present invention are as follows:

[0040] S1: For the FDI attack launched by the attacker at time k, the defender first uses the MTD method to defend. The defender arranges a flexible AC transmission system (D-FACTS) device on the transmission line, and transfers the transmission line between the transmission line i and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-layer defense method for false data injection attack in a power system, comprising a two-layer defense strategy. The first layer adopts moving target defense to defend the false data injection attack from the source, and the second layer adopts Kalman filter state estimation method to eliminate the false data injection attack after moving target defense. The inventionadopts a double-layer defense strategy, which makes up for the deficiency of using only the moving target defense, so as to maintain the normal operation of the electric power system.

Description

technical field [0001] The invention relates to the technical field of electric power system security, and more specifically, relates to a double-layer defense method for false data injection attacks in electric power systems. Background technique [0002] With the convergence of cyberspace such as information and communication technologies, power systems are moving towards smart grids. However, potential threats in terms of cyber attacks will also be introduced into the system, among which False Data Injection (FDI) attacks can evade the concealment detection of bad data and can hide deviations in state estimates. Seriously damage the normal operation of the power grid. Therefore, how to defend against FDI attacks and maintain the normal operation of the power system has always been the focus and key point in the field of power system security technology. At present, there are many defense methods for power systems, most of which do not defend against FDI attacks from the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H02J3/00
CPCH02J3/00H04L63/1416H04L63/1466Y04S40/20
Inventor 刘俊辉杨超刘义谢胜利
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products