Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A False Data Attack Identification Method Based on Probability Distribution

A technology of false data attack and identification method, applied in the field of smart grid data information security, can solve problems such as affecting calculation results, large residual error of bad data, loss of false data, etc., to ensure universality, improve reliability, and reduce errors. The effect of judgment

Active Publication Date: 2022-06-24
HOHAI UNIV +4
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the carefully constructed false data is injected into the original measurement data and avoids the existing bad data identification module, the calculation results of the state estimation can be affected or even manipulated
[0003] Although some literatures have proposed some false data construction methods for the AC-DC transmission model of the smart grid and achieved certain results, these false data construction methods do not take into account that the residual error of each measurement before and after the attack has not changed, so the original Those bad data with large residuals will still be identified as bad data and eliminated due to large residuals after false data injection, thus losing the meaning of false data injection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A False Data Attack Identification Method Based on Probability Distribution
  • A False Data Attack Identification Method Based on Probability Distribution
  • A False Data Attack Identification Method Based on Probability Distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific embodiments of the present invention will be further described in detail below with reference to the accompanying drawings. The following examples are only descriptive, not restrictive, and cannot limit the protection scope of the present invention.

[0048] This embodiment provides a method for identifying false data attacks based on probability distribution, the flowchart of which is as follows image 3 shown, including the following steps:

[0049] 1) Read the grid topology B and line parameter information y:

[0050] The topology of the power grid includes the connection status between each node, the number of connection lines, the opening and closing of switches, and so on. Line parameter information includes conductance g and susceptance b of the line, conductance and susceptance y to ground i0 Wait.

[0051]2) Calculate the node admittance matrix Y;

[0052] The elements in the admittance matrix are divided into mutual admittance and self admitt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is a false data attack identification method based on probability distribution, which belongs to the field of smart grid data information security. The method includes the following steps: reading known grid topology and line parameter information; calculating node admittance matrix; reading measurement data; calculating false measurement data increment according to the attack target to be achieved; Inject the incremental measurement data into the original measurement data to obtain false measurement data; perform probability distribution fitting of measurement changes to identify false data attacks. The cost of the new false data attack method mentioned in the present invention is the same as that of the previous false data construction method, and both can accomplish the attack target well, but the false measurement data of the former can more easily escape the existing bad data identification module. The present invention is an improvement based on the shortcoming of the bad data identification module.

Description

technical field [0001] The invention relates to the field of smart grid data information security, in particular to a method for identifying false data attacks based on probability distribution. Background technique [0002] Modern smart grids use different state estimation algorithms, such as the weighted least squares method, to obtain the best estimate of the current voltage amplitude and voltage phase angle of each power node in the power system from the measurement data containing measurement noise. In addition, the estimated values ​​also include the injected active power and reactive power of each node, the active power and reactive power at the head end of each branch, and the active power and reactive power at the end of each branch. After years of development, the power system has established a relatively complete bad data identification theoretical system, and correspondingly, a bad data identification module has been added to the state estimator, so that the powe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H02J3/00
CPCH02J3/00
Inventor 刘忠喜卫志农孙国强黄蔓云杨毅姜海涛齐贝贝赵丽莉倪明
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products