Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power dispatching operation instruction security verification method and system

A technology of operating instructions and power scheduling, applied in the field of power systems, can solve problems such as tampering of scheduling instructions, power accidents, and potential safety hazards

Pending Publication Date: 2021-05-18
HUNAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are many shortcomings in the existing power dispatching operation command operation method: 1) the current power dispatching operation command method does not consider the inaccuracy of the dispatcher in the judgment of the wrong or incomplete measurement data; 2) in addition, the current dispatching The method does not take into account the possibility of dispatching instructions being tampered with in the process of power communication; 3) The current power dispatching method is simple "from top to bottom", and only the dispatching operator makes dispatching operation instructions on the macro data of the system, and the substation The operator of the operation instruction did not conduct risk verification on the dispatch operation instruction through the on-site data
Therefore, the current power dispatching operation command operation method is not enough to deal with information attacks, has serious security risks, and is easy to cause large-scale power accidents. It is urgent to invent a new power dispatching operation command security verification method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power dispatching operation instruction security verification method and system
  • Power dispatching operation instruction security verification method and system
  • Power dispatching operation instruction security verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0059] Further as a preferred embodiment, step S2 includes:

[0060] Step S21: According to the topological structure of the power network, establish a local communication network between substations, that is, a communication circle of substations. Choose substation n as the root node, and determine the child node substation j according to the connection line n-j of substation n. Substation n and all child nodes j establish a local communication network through a dedicated optical fiber network, which constitutes the communication circle of substation n, and realizes the actual data D between substation n and substation j. n 、D j , G n , G j of sharing. If there is a connecting line between substation j and substations outside the communication circle, substation j is a boundary substation.

[0061] In one embodiment, the schematic diagram of the communication network of substation 2 is as follows image 3 shown. Choose substation 2 as the root node, and determine subst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power dispatching operation instruction safety verification method and system, and the method comprises the steps: building a power grid local load flow calculation model according to a local communication network between transformer substations, and calculating the transmission power of a line in a communication circle after a dispatching operation instruction is executed; researching the change relation of the line power flow before and after the scheduling instruction is executed, establishing a power scheduling instruction credibility model, and achieving quantitative evaluation of scheduling instruction safety analysis. The method and system overcome the defect that an existing method cannot cope with network attacks, and the safety level of power dispatching is improved.

Description

technical field [0001] The invention relates to the technical field of power systems, in particular to power system safety analysis, and in particular to a method and system for safety verification of power dispatching operation instructions. Background technique [0002] With the continuous improvement of the intelligence level of the power system, information and communication technology has been widely used in the power system. In recent years, power system network attacks have occurred frequently, and malicious attackers are using the security loopholes in power information systems to carry out data injection attacks. For example, malicious attackers can modify the data of measuring devices, destroy the integrity of power system data, and mislead dispatchers to issue wrong dispatching operation instructions, resulting in safety accidents such as line disconnection and load shedding. [0003] At present, the execution method of power dispatching operation instructions is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q50/06G06F30/20G06F113/04
CPCG06Q50/06G06F30/20G06F2113/04Y04S10/50
Inventor 刘绚严康于宗超
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products