Unlock instant, AI-driven research and patent intelligence for your innovation.

False data attack identification method based on probability distribution

A technology of false data attack and identification method, applied in the field of smart grid data information security, can solve problems such as affecting calculation results, large residual error of bad data, loss of false data, etc., to ensure universality, improve reliability, and reduce errors. The effect of judgment

Active Publication Date: 2019-11-22
HOHAI UNIV +4
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the carefully constructed false data is injected into the original measurement data and avoids the existing bad data identification module, the calculation results of the state estimation can be affected or even manipulated
[0003] Although some literatures have proposed some false data construction methods for the AC-DC transmission model of the smart grid and achieved certain results, these false data construction methods do not take into account that the residual error of each measurement before and after the attack has not changed, so the original Those bad data with large residuals will still be identified as bad data and eliminated due to large residuals after false data injection, thus losing the meaning of false data injection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • False data attack identification method based on probability distribution
  • False data attack identification method based on probability distribution
  • False data attack identification method based on probability distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings. The following examples are only descriptive, not restrictive, and cannot limit the protection scope of the present invention.

[0048] This embodiment provides a false data attack identification method based on probability distribution, the flow chart of which is as follows image 3 shown, including the following steps:

[0049] 1) Read grid topology B and line parameter information y:

[0050] The power grid topology includes the connection status between each node, the number of connection lines, and the opening and closing of switches. Line parameter information includes conductance g and susceptance b of the line, conductance and susceptance y to ground i0 wait.

[0051]2) Calculate the node admittance matrix Y;

[0052] The elements in the admittance matrix are divided into mutual admittance and self admittance. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a false data attack identification method based on probability distribution, and belongs to the field of intelligent power grid data information security. The method comprisesthe following steps: reading a known power grid topological structure and line parameter information; calculating a node admittance matrix; reading measurement data; calculating a false measurement data increment according to an attack target needing to be achieved; incrementally injecting the false measurement data into the original measurement data to obtain false measurement data; and carryingout measurement variation probability distribution fitting, and identifying false data attacks. Compared with the conventional false data construction method, the novel false data attack method provided by the invention has the advantages that the required cost is consistent, an attack target can be well completed, but the false measurement data of the provided false data construction method canavoid the existing bad data identification module more easily. The method is an improvement provided based on the defect of the bad data identification module.

Description

technical field [0001] The invention relates to the field of smart grid data information security, in particular to a false data attack identification method based on probability distribution. Background technique [0002] Modern smart grids use different state estimation algorithms, such as the weighted least squares method, to obtain the best estimates of the current voltage amplitude and voltage phase angle of each power node in the power system from the measurement data containing measurement noise. In addition, the estimated value also includes the injected active power and reactive power of each node, the head-end active power and reactive power of each branch, and the end active power and reactive power of each branch. After years of development, the power system has established a relatively complete theoretical system of bad data identification. Correspondingly, a bad data identification module has been added to the state estimator, so that the power grid regulators ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H02J3/00
CPCH02J3/00
Inventor 刘忠喜卫志农孙国强黄蔓云杨毅姜海涛齐贝贝赵丽莉倪明
Owner HOHAI UNIV