A method for evaluating the stability of power systems against network attacks using a false negative attack model

A power system and network attack technology, applied in the field of power system security research, can solve the problems of lack of network attack models and methods, lack of network attack models and attack methods, data integrity and availability, etc., to improve stability and the effect of robustness

Active Publication Date: 2022-07-08
HANGZHOU DIANZI UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to improve the network attack model and expand the realistic application scenarios, the existing technology lacks new network attack models and methods to simulate more complex scenarios, and lacks new network attack models and attack methods to achieve data integrity and usability. sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for evaluating the stability of power systems against network attacks using a false negative attack model
  • A method for evaluating the stability of power systems against network attacks using a false negative attack model
  • A method for evaluating the stability of power systems against network attacks using a false negative attack model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be further described below with reference to the accompanying drawings and specific implementations.

[0062] The embodiment of the present invention and its implementation process are as follows:

[0063] step 1):

[0064] (1.1) The power system of the embodiment has n substations and m links, the substations are connected through links, and a smart meter is installed on each link to measure the power flow on the link, and the intelligent power of each link is Both the meter and the substation are connected to the server. The server receives the power flow signal from the smart meter and the status signal from the substation. The relationship between the power flow signal and the status signal is established as follows:

[0065] z=Hx+n

[0066] z=(z 1 ,z 2 ,...,z m ) T

[0067] x=(x 1 ,x 2 ,...,x n ) T

[0068] n=(n 1 ,n 2 ,...,n m ) T

[0069] (1.2) Establish the following optimization problem:

[0070]

[0071]

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for evaluating the stability of a power system against network attacks by using a missing-report attack model. Perform state evaluation and bad data detection, process and obtain the state estimation signal of the substation in the power system; establish a false negative attack model with an attack vector, solve the attack vector, and then evaluate the attack vector to obtain the stability result of the power system against network attacks. The method of the invention analyzes its ability to resist network attacks through the influence of the proposed underreporting attack model on the power system, and can well detect the insufficiency and stability problems of the internal modules of the power system, so as to improve the stability and robustness of the power system. provide accurate results.

Description

technical field [0001] The invention relates to a power system stability evaluation method in the research field of power system security, in particular to a method for evaluating the stability of a power system against network attacks by using a false negative attack model. Background technique [0002] With the rapid development of information and communication technology, the traditional power system has gradually developed into a power cyber-physical system. The deep integration of the communication network and the power network not only improves the operation efficiency of the power system, but also brings great convenience to people's production and life. However, the access of a large number of sensing devices also makes the power system more exposed to the network environment, and attackers can affect the safe and stable operation of the power system through the network side. [0003] False Data Injection Attack (FDIA), as one of the most typical network attacks in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/14H04L41/147H04L9/40
CPCH04L41/145H04L41/147H04L63/1416H04L63/1433H04L63/123H04L63/126Y04S40/20
Inventor 夏永祥涂海程
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products