Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for carrying out attack detection and reconstruction on electric power information physical system

A technology of physical system and electric power information, applied in the direction of transmission system, digital transmission system, electrical components, etc., can solve problems such as improper

Active Publication Date: 2020-02-28
NORTHEAST DIANLI UNIVERSITY
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing attack detection methods only inject malicious data attacks on a single synchronized phase angle measurement, for example: Chinese Patent Application No. 201510062192.3. Since hackers attack the power information system randomly, it is not known which channel is attacked or Which channels are attacked at the same time, therefore, it is inappropriate to choose a single channel when studying the problem of attack detection
In the prior art, there have been no literature reports and practical applications on a method for attack detection and reconstruction of power cyber-physical systems with good stability, high accuracy, and fast response.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out attack detection and reconstruction on electric power information physical system
  • Method for carrying out attack detection and reconstruction on electric power information physical system
  • Method for carrying out attack detection and reconstruction on electric power information physical system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0068] refer to figure 1 , a method for attack detection and reconstruction of electric power cyber-physical system in the present invention, combining the sliding mode observer and adaptive method for attack detection method for electric power cyber-physical system, changing the attack condition from the existing function The known bounds are relaxed to partly known upper bound functions, and an adaptive method is used to estimate the unknowable upper bound value, so an adaptive sliding mode observer is designed to realize the simultaneous analysis of the state of the power cyber-physical system and the attack signal. Estimation; for general attack signals, the detection of attack signals can be realized by comparing the residual signal generated between the output signal of the power cyber physics system and the adaptive sliding mode observer with the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for carrying out attack detection and reconstruction on an electric power information physical system. The invention designs a method for carrying out attack detection on an electric power information physical system by combining a sliding mode observer and a self-adaptive method, the attack condition is broadened from the existing known function boundary to the known partial upper bound function, and an unknown upper bound value is estimated by using the self-adaptive method; for some attacks which cannot realize attack detection by comparing residual signalswith threshold values, in order to ensure the accuracy of attack detection, the residual signals are converged to zero to perform attack signal reconstruction, and attack judgment is performed on thereconstructed attack signals according to attack detection logic; the method is further popularized to the situation that the electric power information physical system is attacked by the sensor, anddetection and reconstruction of the sensor attack on the electric power information physical system are achieved. According to the method, attack detection and reconstruction are carried out when thepower information physical system comprising three motors and six buses is attacked.

Description

technical field [0001] The invention relates to the field of information security of electric power cyber-physical systems, and relates to a method for attack detection and reconstruction of electric power cyber-physical systems. Background technique [0002] With the increase of the node scale of the power cyber-physical system, the diversification of communication methods and the improvement of the automation control level, the technical means of attacking the power terminal equipment are also increasing. The performance of the system plays an important role, not only to reduce the damage of the system, but also to minimize the negative impact. On the basis of in-depth analysis of relatively undetectable attacks and absolutely undetectable attacks, the condition that absolutely undetectable attacks are zero and relatively undetectable is a stable signal is obtained, and then based on the method of vector decomposition, the attack signal reconfigurable and The conditions f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1416
Inventor 李健靳长岭苏庆宇赵晓琪李波
Owner NORTHEAST DIANLI UNIVERSITY