CN106026089A - Transmission network false data attack defense method based on protection measurement point - Google Patents

Transmission network false data attack defense method based on protection measurement point Download PDF

Info

Publication number
CN106026089A
CN106026089A CN201610547842.8A CN201610547842A CN106026089A CN 106026089 A CN106026089 A CN 106026089A CN 201610547842 A CN201610547842 A CN 201610547842A CN 106026089 A CN106026089 A CN 106026089A
Authority
CN
China
Prior art keywords
attack
index
measuring point
vector
false data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610547842.8A
Other languages
Chinese (zh)
Other versions
CN106026089B (en
Inventor
田猛
王先培
龙嘉川
代荡荡
朱国威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201610547842.8A priority Critical patent/CN106026089B/en
Publication of CN106026089A publication Critical patent/CN106026089A/en
Application granted granted Critical
Publication of CN106026089B publication Critical patent/CN106026089B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J3/00Circuit arrangements for ac mains or ac distribution networks
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J2203/00Indexing scheme relating to details of circuit arrangements for AC mains or AC distribution networks
    • H02J2203/20Simulating, e g planning, reliability check, modelling or computer assisted design [CAD]

Abstract

The invention discloses a modern transmission network false data attack defense method based on a protection measurement point in the field of information security research of a power system. The method provided by the invention comprises the steps that a false data attack vector optimization model is constructed based on a traditional power system state estimation theory; according to the optimization model, a false data attack defense measure based on indexes Vk and Rk is provided; the basic idea is to reduce the number of vulnerable nodes vulnerable to attacks in the power system and to enhance the overall ability to deal with false data attacks; and according to an importance index Ik, the defense measure is realized, namely the target of the optimization indexes Vk and Rk is realized by protecting a high measurement point of the importance index Ik. According to the invention, the important measurement point is protected to effectively improve the attack cost and the attack difficulty of an attacker.

Description

A kind of power transmission network false data attack defense method based on protective number measuring point
Technical field
The present invention relates to power system information security fields, be specifically related to a kind of power transmission network based on protective number measuring point false Data attack defence method.
Background technology
EMS (Energy Management System, EMS) be important power information communication system it One, mainly include the basic functions such as data acquisition, energy management and analysis of network, the safe and stable operation of power system is played Important function.State estimation is one of Core Feature of EMS, is that EMS performs load prediction, optimal load flow calculates and transient stability The correlation analysiss such as analysis control the basis of function.False data attacks (False Data Injection Attacks, FDI) A kind of network attack utilizing Legacy Status to estimate detection leak initiation.False data is attacked based on DC flow model, Point out when vector of attack be power system observation Jacobian matrix H column vector linear combination time, assailant can successfully around Cross the raw data detection device in state estimation, reach to revise measuring value and state variable, the control power system of power system Running status or obtain the illegal purpose such as economic interests.False data is attacked and is equally attacked with AC power flow mould simultaneously State estimator based on type.FDI attacks and takes full advantage of the leak that Legacy Status is estimated, this kind is attacked the most hidden, right Power system safety and stability runs very harmful, in some instances it may even be possible to cause large-scale blackout.
In order to defend false data to attack, currently mainly from designing more excellent inspection policies and arranging protective number measuring point two Aspect launches research.By designing more excellent inspection policies, such as self adaptation CUSUM check algorithm, nuclear norm minimize method (Nuclear Norm Minimization) and low-rank matrix decomposition method (Low Rank Matrix Factorization), False data can be directly detected, it is not necessary to extra hardware puts into, and however it is necessary that and again develops software from metric data, Development risk is higher, the cycle is longer, and is likely to occur the attack pattern for new inspection policies.And by arranging protective number Measuring point, such as protection protect basic measuring point (Basic Measurements) and protection key stato variable, can be effectively Improve intrusion scene, increase and attack difficulty, it might even be possible to defence false data completely is attacked, although facing asking of hardware cost Topic, but there is the advantage that the construction cycle is shorter and development risk is little.Therefore, the most more efficiently defensive measure is to arrange Protective number measuring point.
Summary of the invention
The present invention is directed to the deficiencies in the prior art, it is provided that a kind of power transmission network false data based on protective number measuring point is attacked Defence method.The present invention proposes index VkWith index Rk, resist from the local of power system and overall measurement power system respectively The ability that false data is attacked, by optimizing index VkWith index RkRealize the protection of significant quantity measuring point, reach to defend false data The purpose attacked.This invention can effectively strengthen the ability that power system defence false data is attacked.
The concrete technical scheme of the present invention is:
Step 1: attack all of measuring point in power system successively, obtain according to false data vector of attack Optimized model The vector of attack that all measuring points are corresponding, calculates index V of power systemkIf attacking index V under difficulty β meaningk=0, Perform step 3, otherwise perform step 2;Wherein, index VkFragile number of nodes is characterized from the angle of power system local;
Step 2: calculate and attack the importance degree index being subject to the fragile node that false data is attacked under difficulty β meaning Ik, then protection importance degree index IkMaximum measuring point;If importance degree index I of maximumkCorresponding multiple measuring points, the most at random A measuring point is selected to implement protection;Perform step 1;
Step 3: attack all of measuring point in power system successively, obtain the vector of attack that all measuring points are corresponding, meter Calculate index R of power systemkIf, indexThen algorithm terminates, and otherwise performs step 4;Wherein, index RkFrom entirety Angle weigh power system defence false data attack ability,Represent index RkThreshold value;
Step 4: calculate importance degree index I of all measuring pointsk, then protection importance degree index IkMaximum measuring point;If Maximum importance degree index IkCorresponding multiple measuring points, then randomly choose a measuring point and implement protection;Perform step 3.
Described false data vector of attack Optimized model, index Vk, index RkWith index IkAs follows;
m i n c | | a P ‾ k | | 1
s . t . B P ‾ k a P ‾ k = - b k
V k = &Sigma; k = 1 , 2 , ... , m I ( | | a k * | | 0 < &beta; )
R k = &Sigma; k = 1 , 2 , ... , m | | a k * | | 0 m - t
I k = &Sigma; i = 1 , 2 , ... , m I ( k &Element; A i * )
In formula, defining shielded measuring point numbering collection and be combined into P, unprotected measuring point collection is combined into||(·)||0With | |(·)||1Representing l0-norm and l1-norm respectively, k represents that measuring point is numbered,Represent from vectorIn remove element a Vector after (k), a (k) represents the kth element in vector of attack a,Represent from matrixIn remove bkAfter sub-square Battle array, bkKth row column vector in representing matrix B,Represent when attacking kth measuring value corresponding optimum false data attack to Amount, β represents attack difficulty, and m represents measuring point quantity, and t represents the measuring point quantity that there is not suboptimum vector of attack,Represent secondary In excellent vector of attackThe set that the numbering that middle nonzero element is corresponding is constituted, I () represents indicator function, it is assumed that S represents variable x Meet set, I () is shown below:
I ( x ) = 1 i f x &Element; S 0 i f x &NotElement; S .
Described step 1 and 2 Main Function be to eliminate in power system to be subject to the fragile node that false data is attacked, The Main Function of step 3 and step 4 is an up power system entirety and resists the ability that false data is attacked.
Described false data vector of attack Optimized model is used for the false data vector of attack that amount of calculation measuring point is corresponding.Should Model is l0-norm optimization problem, belongs to NP-hard problem, in order to improve computational efficiency, uses convex relaxing techniques, by this mould Type is converted into the l1-norm optimization problem of standard.
Preferably, alternating direction multiplier method (Alternating Direction Method of is used Multipliers, ADMM) solve false data vector of attack Optimized model.ADMM algorithm has separability and Fast Convergent Advantage, be suitable for process big data, drastically increase the solution efficiency of false data vector of attack.
Described index VkFragile number of nodes is characterized from the angle of power system local.If index Vk≠ 0, show electricity Existing in Force system to attack and be subject to the node that false data is attacked under difficulty β meaning, assailant can be fragile by these Node success offensive attack.Index VkThe biggest, the node being subject to false data attack in power system is the most, is i.e. crisp Weak bus is the most, otherwise, if index VkThe least, the node being subject to false data attack in power system is the fewest, is i.e. Fragile node is the fewest.
Described index RkThe ability that power system defence false data is attacked, index R has been weighed from overall anglekMore Greatly, the whole capability that now defence false data is attacked is the strongest.
Described importance degree index IkFor weighing the significance level of measuring point in power system, importance degree index IkIt is the biggest, Showing that the number of times that measuring point k occurs in the suboptimum vector of attack that power system is corresponding is the most, this measuring point is the most important.
Compared with prior art, the present invention has the following advantages and beneficial effect:
1. propose index VkWith index Rk, resist falseness from the local of power system and overall measurement power system respectively The ability of Data attack, can assess the ability that power system reply false data is attacked more reasonably and comprehensively.
2. propose by importance degree index IkOptimizing index VkWith index RkFind protective number test points set, be greatly enhanced Computational efficiency.
3. propose a kind of power transmission network false data attack defense method based on protective number measuring point, by optimizing index Vk With index RkRealize the protection of significant quantity measuring point, reach the purpose defending false data to attack, can be effectively increased assailant's Intrusion scene and attack difficulty.
Accompanying drawing explanation
Fig. 1 present invention is based on index VkWith index RkFalse data attack defense method flow chart.
Detailed description of the invention
Below with reference to specific embodiments and the drawings, the present invention is described further.
Fig. 1 is based on index VkWith index RkFalse data attack defense method flow chart, implement step as follows:
Step 1: attack all of measuring point in power system successively, obtain according to false data vector of attack Optimized model The vector of attack that all measuring points are corresponding, calculates index V of power systemkIf attacking index V under difficulty β meaningk=0, Perform step 3, otherwise perform step 2.
In a power system with N bar bus, state variable is typically taken as the complex voltage of each bus, including electricity Pressure amplitude value and phase angle, remove outside reference mode, and a total of 2N-1 state variable, state variable is collectively expressed as x=[x1, x2,…,xn]T, n=2N-1.For a properly functioning power system, its busbar voltage is near rated voltage, and props up Two ends, road phase angle difference is the least, and for supertension network, branch resistance is more much smaller than reactance.Therefore, make the following assumptions, all mothers The voltage magnitude of line is equal and is 1, ignores line resistance, then there is not reactive power in measuring value, and state variable is only Voltage phase angle.Now, between measuring value and state variable, meet linear relationship, obtain the DC power flow equation being shown below.
Z=Hx+e e~N (0, ∑e)
In formula, H represents observation Jacobian matrix, e=[e1,e2,…,em]TRepresent measurement error, and obey average and be 0, variance is diagonal matrixNormal distribution.
If with a=[a1,a2,…,am]TRepresent disabled user injects in measuring value false data vector, then reality Measurement data is zbad=z+a, c=[c1,c2,…,cn]TRepresent the mistake being infused in state variable introducing due to false data Difference vector, the state variable of estimation isFrom the angle of assailant, when building vector of attack a, it is desirable to use Minimum intrusion scene and cost achieve the goal, and therefore vector of attack a exists an optimal value.Nonzero element in vector of attack a The corresponding measuring point attacked, nonzero element number l0Norm represents, the Optimized model of vector of attack is shown below.
m i n c | | a | | 0
S.t.a=Hc
In formula, defining shielded measuring point numbering collection and be combined into P, unprotected measuring point collection is combined into||(·)||0With | |(·)||1Represent l0-norm and l1-norm, | | a | | respectively0Represent the l of vector a0Norm, l0Norm is the least, vector of attack a Degree of rarefication the highest.
Use convex relaxing techniques, above-mentioned Optimized model can be further converted to following formula.
m i n c | | a P &OverBar; k | | 1
s . t . B P &OverBar; k a P &OverBar; k = - b k
In formula,Represent from matrixIn remove bkRear submatrix,Representing matrix B removes with to gather P corresponding Submatrix after column vector, wherein B=H (HTH)-1HT-I, H represent observation Jacobian matrix,Represent from vectorIn remove Vector after element a (k),With set in expression vector of attack aThe vector that corresponding element is constituted.Use ADMM algorithm Solve this model, obtain false data vector of attack.
Attack m measuring point in power system, the suboptimum vector of attack l obtained successively0There is a minima in norm, This value can represent the minimum cost attacked required for power system, is defined as follows index α shown in formulak, this index expression kth The vector of attack l that individual measuring point is corresponding0Norm minimum.
&alpha; k = m i n k = 1 , 2 , ... , m | | a k * | | 0
Assuming that difficulty is attacked in the power system that manager is arranged is β, is i.e. αk>=β, now to successfully start false number According to attack, the l of suboptimum vector of attack0Norm is more than β.
Index VkShown in being defined as follows.
V k = &Sigma; k = 1 , 2 , ... , m I ( | | a k * | | 0 < &beta; )
In formula,Representing optimum false data vector of attack corresponding when attacking kth measuring value, β represents attack difficulty, M represents measuring point quantity, and k represents that measuring point is numbered.
Step 2: calculate and attack the importance degree index being subject to the fragile node that false data is attacked under difficulty β meaning Ik, then protection importance degree index IkMaximum measuring point.If importance degree index I of maximumkCorresponding multiple measuring points, the most at random A measuring point is selected to implement protection.Perform step 1.
Importance degree index IkShown in being defined as follows.
I k = &Sigma; i = 1 , 2 , ... , m I ( k &Element; A i * )
In formula, k represents that measuring point is numbered, and m represents measuring point quantity,Represent in suboptimum vector of attackMiddle nonzero element The set that corresponding numbering is constituted, I () represents indicator function, it is assumed that S represents the set met of variable x, I () such as following formula Shown in.
I ( x ) = 1 i f x &Element; s 0 i f x &NotElement; S
Step 3: attack all of measuring point in power system successively, obtain the vector of attack that all measuring points are corresponding, meter Calculate index R of power systemkIf, indexThen algorithm terminates, and otherwise performs step 4.
Index RkShown in being defined as follows.
R k = &Sigma; k = 1 , 2 , ... , m | | a k * | | 0 m - t
In formula,Representing optimum false data vector of attack corresponding when attacking kth measuring value, k represents that measuring point is compiled Number, m represents measuring point quantity, and t represents the measuring point quantity that there is not suboptimum vector of attack.
Step 4: calculate importance degree index I of all measuring pointsk, then protection importance degree index IkMaximum measuring point.If Maximum importance degree index IkCorresponding multiple measuring points, then randomly choose a measuring point and implement protection.Perform step 3.
Specific embodiment described herein is only to present invention spirit explanation for example.Technology neck belonging to the present invention Described specific embodiment can be made various amendment or supplements or use similar mode to replace by the technical staff in territory Generation, but without departing from the spirit of the present invention or surmount scope defined in appended claims.

Claims (2)

1. a power transmission network false data attack defense method based on protective number measuring point, it is characterised in that comprise the following steps:
Step 1: attack all of measuring point in power system successively, according to false data vector of attack Optimized model, uses and hands over Obtain, for direction multiplier method, the vector of attack that all measuring points are corresponding, calculate index V of power systemkIf attacking difficulty β meaning Index V under Yik=0, perform step 3, otherwise perform step 2;Wherein, index VkCharacterize crisp from the angle of power system local Weak bus quantity;
Step 2: calculate and attack importance degree index I being subject to the fragile node that false data is attacked under difficulty β meaningk, then Protection importance degree index IkMaximum measuring point;If importance degree index I of maximumkCorresponding multiple measuring points, then randomly choose one Measuring point implements protection;Perform step 1;
Step 3: attack all of measuring point in power system successively, obtain the vector of attack that all measuring points are corresponding, calculate electricity Index R of Force systemkIf, indexThen algorithm terminates, and otherwise performs step 4;Wherein, index RkFrom overall angle Degree has weighed the ability that power system defence false data is attacked,Represent index RkThreshold value;
Step 4: calculate importance degree index I of all measuring pointsk, then protection importance degree index IkMaximum measuring point;If it is maximum Importance degree index IkCorresponding multiple measuring points, then randomly choose a measuring point and implement protection, perform step 3.
A kind of power transmission network false data attack defense method based on protective number measuring point the most according to claim 1, it is special Levy and be: described false data vector of attack Optimized model, index Vk, index RkWith index IkAs follows;
m i n c | | a P &OverBar; k | | 1
s . t . B P &OverBar; k a P &OverBar; k = - b k
V k = &Sigma; k = 1 , 2 , ... , m I ( | | a k * | | 0 < &beta; )
R k = &Sigma; k = 1 , 2 , ... , m | | a k * | | 0 m - t
I k = &Sigma; i = 1 , 2 , ... , m I ( k &Element; A i * )
In formula, defining shielded measuring point numbering collection and be combined into P, unprotected measuring point collection is combined into||(·)||0With | | (·)||1Representing l0-norm and l1-norm respectively, k represents that measuring point is numbered,Represent from vectorIn remove element a (k) Vector afterwards, a (k) represents the kth element in vector of attack a,Represent from matrixIn remove bkRear submatrix, bk Kth row column vector in representing matrix B, wherein B=H (HTH)-1HT-I, H represent observation Jacobian matrix,Represent and attack kth Optimum false data vector of attack corresponding during individual measuring value, β represents attack difficulty, and m represents measuring point quantity, and t represents and do not deposits In the measuring point quantity of suboptimum vector of attack,Represent in suboptimum vector of attackThe collection that the numbering that middle nonzero element is corresponding is constituted Closing, I () represents indicator function, it is assumed that S represents the set met of variable x, and I () is shown below:
I ( x ) = 1 i f x &Element; S 0 i f x &NotElement; S .
CN201610547842.8A 2016-07-13 2016-07-13 A kind of power transmission network false data attack defense method based on protection measuring point Expired - Fee Related CN106026089B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610547842.8A CN106026089B (en) 2016-07-13 2016-07-13 A kind of power transmission network false data attack defense method based on protection measuring point

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610547842.8A CN106026089B (en) 2016-07-13 2016-07-13 A kind of power transmission network false data attack defense method based on protection measuring point

Publications (2)

Publication Number Publication Date
CN106026089A true CN106026089A (en) 2016-10-12
CN106026089B CN106026089B (en) 2018-05-01

Family

ID=57109359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610547842.8A Expired - Fee Related CN106026089B (en) 2016-07-13 2016-07-13 A kind of power transmission network false data attack defense method based on protection measuring point

Country Status (1)

Country Link
CN (1) CN106026089B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234492A (en) * 2018-01-02 2018-06-29 国网四川省电力公司信息通信公司 Consider the power information physics concerted attack analysis method of load data falseness injection
CN108596361A (en) * 2018-03-21 2018-09-28 深圳供电局有限公司 A kind of power system practical measurement protection scheme selection method
CN110571787A (en) * 2019-09-26 2019-12-13 国网浙江省电力有限公司嘉兴供电公司 false data injection attack design and defense method for direct-current micro-grid
CN110830514A (en) * 2019-12-12 2020-02-21 四川大学 Detection method for collusion-based false data injection attack of smart power grid
CN111726323A (en) * 2019-03-20 2020-09-29 中国科学院沈阳自动化研究所 PMU (phasor measurement unit) deployment-based error data injection attack defense method in smart power grid
CN111786977A (en) * 2020-06-22 2020-10-16 西安建筑科技大学 Optimal false data injection attack method oriented to network self-triggering model prediction control
CN112398117A (en) * 2020-09-24 2021-02-23 北京航空航天大学 False data injection attack construction and defense method causing line load overload
CN113746818A (en) * 2021-08-23 2021-12-03 国网山东省电力公司济南供电公司 Power system security defense method and device for false data injection attack
CN116405333A (en) * 2023-06-09 2023-07-07 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Safe and efficient power system abnormal state detection terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761122A (en) * 2012-07-06 2012-10-31 华北电力大学 Defense method of false data injection attack of power state estimation system
US20150088758A1 (en) * 2011-11-14 2015-03-26 Ca, Inc. Authenticating users to atms and other secure machines for cardless transactions

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150088758A1 (en) * 2011-11-14 2015-03-26 Ca, Inc. Authenticating users to atms and other secure machines for cardless transactions
CN102761122A (en) * 2012-07-06 2012-10-31 华北电力大学 Defense method of false data injection attack of power state estimation system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王以良: "智能电网虚假数据攻击检测及防范研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234492B (en) * 2018-01-02 2020-05-22 国网四川省电力公司信息通信公司 Power information physical cooperative attack analysis method considering load data false injection
CN108234492A (en) * 2018-01-02 2018-06-29 国网四川省电力公司信息通信公司 Consider the power information physics concerted attack analysis method of load data falseness injection
CN108596361A (en) * 2018-03-21 2018-09-28 深圳供电局有限公司 A kind of power system practical measurement protection scheme selection method
CN108596361B (en) * 2018-03-21 2022-03-04 深圳供电局有限公司 Selection method for practical measurement protection scheme of power system
CN111726323B (en) * 2019-03-20 2021-04-06 中国科学院沈阳自动化研究所 PMU (phasor measurement unit) deployment-based error data injection attack defense method in smart power grid
CN111726323A (en) * 2019-03-20 2020-09-29 中国科学院沈阳自动化研究所 PMU (phasor measurement unit) deployment-based error data injection attack defense method in smart power grid
CN110571787A (en) * 2019-09-26 2019-12-13 国网浙江省电力有限公司嘉兴供电公司 false data injection attack design and defense method for direct-current micro-grid
CN110830514A (en) * 2019-12-12 2020-02-21 四川大学 Detection method for collusion-based false data injection attack of smart power grid
CN111786977A (en) * 2020-06-22 2020-10-16 西安建筑科技大学 Optimal false data injection attack method oriented to network self-triggering model prediction control
CN112398117A (en) * 2020-09-24 2021-02-23 北京航空航天大学 False data injection attack construction and defense method causing line load overload
CN112398117B (en) * 2020-09-24 2023-08-04 北京航空航天大学 Method for defending false data injection attack causing overload of line load
CN113746818A (en) * 2021-08-23 2021-12-03 国网山东省电力公司济南供电公司 Power system security defense method and device for false data injection attack
CN116405333A (en) * 2023-06-09 2023-07-07 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Safe and efficient power system abnormal state detection terminal
CN116405333B (en) * 2023-06-09 2023-08-25 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Safe and efficient power system abnormal state detection terminal

Also Published As

Publication number Publication date
CN106026089B (en) 2018-05-01

Similar Documents

Publication Publication Date Title
CN106026089A (en) Transmission network false data attack defense method based on protection measurement point
CN106099920A (en) A kind of modern power transmission network false data attack method based on parameter estimation
Wang et al. A two-layer game theoretical attack-defense model for a false data injection attack against power systems
Yi et al. A multi-stage game model for the false data injection attack from attacker’s perspective
Bi et al. Using covert topological information for defense against malicious attacks on DC state estimation
Li et al. Bilevel model for analyzing coordinated cyber-physical attacks on power systems
Bi et al. Graphical methods for defense against false-data injection attacks on power system state estimation
CN106100877B (en) A kind of electric system reply network attack vulnerability assessment method
Liu et al. Local load redistribution attacks in power systems with incomplete network information
Teixeira et al. A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator
CN102761122B (en) Defense method of false data injection attack of power state estimation system
CN102749521B (en) Method for computing harmonic impedance of power system
CN111404915B (en) Power grid information physical security risk detection method based on three-layer model
Rahman et al. A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids
Tian et al. Multilevel programming-based coordinated cyber physical attacks and countermeasures in smart grid
Soltan et al. EXPOSE the line failures following a cyber-physical attack on the power grid
CN106127047A (en) A kind of power system malicious data detection method based on Jensen Shannon distance
Sun et al. Cascading failure analysis of power flow on wind power based on complex network theory
Zhou et al. Cyber attacks, detection and protection in smart grid state estimation
CN112737107A (en) Power distribution network PMU configuration method considering observability and FDIA defensive property
Yang et al. Towards optimal pmu placement against data integrity attacks in smart grid
De et al. A PMU assisted cyber attack resilient framework against power systems structural vulnerabilities
CN101841154A (en) Voltage stability margin real-time evaluation and optimum control method after grid major failure
CN114124546B (en) Hidden type moving target defense strategy generation method and device
Ding et al. Research on key node identification scheme for power system considering malicious data attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180501

Termination date: 20190713

CF01 Termination of patent right due to non-payment of annual fee