CN106099920A - A kind of modern power transmission network false data attack method based on parameter estimation - Google Patents

A kind of modern power transmission network false data attack method based on parameter estimation Download PDF

Info

Publication number
CN106099920A
CN106099920A CN201610550245.0A CN201610550245A CN106099920A CN 106099920 A CN106099920 A CN 106099920A CN 201610550245 A CN201610550245 A CN 201610550245A CN 106099920 A CN106099920 A CN 106099920A
Authority
CN
China
Prior art keywords
vector
attack
represent
false data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610550245.0A
Other languages
Chinese (zh)
Other versions
CN106099920B (en
Inventor
田猛
王先培
龙嘉川
代荡荡
朱国威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201610550245.0A priority Critical patent/CN106099920B/en
Publication of CN106099920A publication Critical patent/CN106099920A/en
Application granted granted Critical
Publication of CN106099920B publication Critical patent/CN106099920B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J3/00Circuit arrangements for ac mains or ac distribution networks
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J2203/00Indexing scheme relating to details of circuit arrangements for AC mains or AC distribution networks
    • H02J2203/20Simulating, e g planning, reliability check, modelling or computer assisted design [CAD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention discloses a kind of based on parameter estimation the modern power transmission network false data attack method in power system information security study field.The present invention is primarily based on the Optimized model of traditional Power system state estimation the Theory Construction false data vector of attack, and use alternating direction multiplier method (Alternating Direction Method of Multipliers, ADMM) to solve this Optimized model.There is error, even completely and there is the problem of bad data in metric data, then by method of Lagrange multipliers and the augmented state estimation technique in the electric parameter facing grasp for assailant, it is achieved the estimation to unknown branch road susceptance.Optimized model finally by false data vector of attack builds false data vector of attack.The present invention improves motility and the effectiveness that false data is attacked, and can be used for testing the effect of false data attack defense method, the ability that checking modern power transmission network reply false data is attacked simultaneously.

Description

A kind of modern power transmission network false data attack method based on parameter estimation
Technical field
The present invention relates to power system information security fields, be specifically related to modern power transmission network false data attack method neck Territory, particularly to a kind of modern power transmission network false data attack method based on parameter estimation.
Background technology
EMS (Energy Management System, EMS) be important power information communication system it One, mainly include the basic functions such as data acquisition, energy management and analysis of network, the safe and stable operation of power system is played Important function.State estimation is one of Core Feature of EMS, is that EMS performs load prediction, optimal load flow calculates and transient stability The correlation analysiss such as analysis control the basis of function.False data attacks (False Data Injection Attacks, FDI) A kind of network attack utilizing Legacy Status to estimate detection leak initiation.False data is attacked based on DC flow model, Point out when vector of attack be power system observation Jacobian matrix H column vector linear combination time, assailant can successfully around Cross the raw data detection device in state estimation, reach to revise measuring value and state variable, the control power system of power system Running status or obtain the illegal purpose such as economic interests.False data is attacked and is equally attacked with AC power flow mould simultaneously State estimator based on type.FDI attacks and takes full advantage of the leak that Legacy Status is estimated, this kind is attacked the most hidden, right Power system safety and stability runs very harmful, in some instances it may even be possible to cause large-scale blackout.
Due to the restriction of intrusion scene protection relevant with power system regulation, assailant is difficult to obtain completely power system Electric parameter and topological parameter, and electric parameter along with environmental condition different it may happen that change, such as line admittance and environment Temperature is correlated with, and its actual value and design load have certain deviation.But, by bribing the data of interior employee or public publication Etc. means, it is possible to obtain the part relevant parameter of power system, therefore, for assailant, the most real situation is to grasp Some electrical power systematic parameter, but assailant can only start local assault, and other node cannot be attacked.Assailant can pass through Start false data to attack metric data analysis, but do not utilize the parameters of electric power system of grasp, also there is no treating capacity Survey the bad data in data.Generally speaking, assailant faces the electric parameter of grasp and there is error, even complete and measure The problem that there is bad data in data.
Summary of the invention
The present invention is directed to the deficiencies in the prior art, it is provided that a kind of modern power transmission network false data based on parameter estimation is attacked Hit method.The present invention uses method for parameter estimation to build modern power transmission network false data vector of attack, improves false data and attacks The motility hit and effectiveness, can be used for testing the effect of false data attack defense method, the transmission of electricity of checking modern times simultaneously The ability that net reply false data is attacked.
The concrete technical scheme of the present invention is:
Step 1: calculate the susceptance of unknown parameter branch road according to method of Lagrange multipliers and the augmented state estimation technique;
Step 2: calculate Jacobian matrix H according to following formulax
In formula, h (x, pe) represent and state variable x and branch parameters error peRelevant nonlinear function, PijRepresent and prop up Road trend, PiRepresent the injecting power of bus, θiRepresent the phase place of bus i, bijRepresent the susceptance of branch road ij, BiiRepresent bus i Self-admittance.
Step 3: using the Optimized model of ADMM Algorithm for Solving false data vector of attack, this model is as follows, obtains VariableIn relevant position completion 0 and 1, obtain suboptimum vector of attack ax
min c | | a P ‾ k | | 1
s . t . B P ‾ k a P ‾ k = - b k
In formula,Represent from matrixIn remove bkRear submatrix,Representing matrix B removes with to gather P corresponding Submatrix after column vector, bkKth row column vector in representing matrix B, wherein B=H (HTH)-1HT-I, H represent observation Jacobi Matrix,Represent from vectorIn remove the vector after element a (k),With set in expression vector of attack aCorresponding The vector that element is constituted, a (k) represents the kth element in vector a.
Step 4: inject metric data z after false datax=z+ax, z represents original measurement number during unimplanted false data According to.
The detailed process of described step 1 is as follows;
The true value assuming branch parameters is pt, error vector is pe, then the measured value of branch parameters is shown below:
P=pt+pe
During Legacy Status is estimated, it is assumed that the error vector of branch parameters is 0, it is i.e. to have described in following formula to retrain;
pe=0
This constraint is injected the constraints of weighted least-squares state estimation model under equality constraint as zero, obtain as Under described Optimized model:
min J ( x ) = 1 2 r T W r
s.t.c(x,pe)=0
pe=0
In formula, W is for measuring weight diagonal matrix, r=z-h (x, pe) represent measuring value residual error, h (x, pe) represent and shape State variable x and branch parameters error peRelevant nonlinear function, c (x, pe) represent not only there is no load but also there is no the mother of electromotor The injecting power of line;
To above-mentioned Optimized model application method of Lagrange multipliers, obtain Lagrangian as follows, adopt further The susceptance of unknown parameter branch road is calculated by method of Lagrange multipliers and the augmented state estimation technique:
L = 1 2 r T W r - μ T c ( x , p e ) - λ T p e .
In formula, μ and λ is Lagrange multiplier.
The detailed process of described step 3 is as follows;
In a power system with N bar bus, including voltage magnitude and phase angle, remove outside reference mode, altogether Having 2N-1 state variable, state variable is collectively expressed as x=[x1,x2,…,xn]T, n=2N-1;
Making the following assumptions, the voltage magnitude of all buses is equal and is 1, ignores line resistance, then in measuring value not There is reactive power, state variable only has voltage phase angle;Now, meet linear relationship between measuring value and state variable, obtain The DC power flow equation being shown below:
Z=Hx+e e~N (0, Σe)
Now, observation Jacobian matrix H=HxFor constant matrices.If with a=[a1,a2,…,am]TRepresent that disabled user exists The false data vector injected in measuring value, then actual measurement data is zbad=z+a, c=[c1,c2,…,cn]TRepresent by In the error vector being infused in state variable introducing of false data, e=[e1,e2,…,em]TRepresent measurement error, and Obeying average is 0, and variance is diagonal matrixNormal distribution, the state variable of estimation isFrom the angle of assailant, when building vector of attack a, it is desirable to reach with minimum intrusion scene and cost Purpose, therefore there is an optimal value in vector of attack a;The measuring point that in vector of attack a, nonzero element correspondence is attacked, nonzero element Number l0Norm represents, the Optimized model of vector of attack is shown below:
min c | | a | | 0
S.t.a=Hc
In formula, | | a | |0Represent the l of vector a0Norm, l0Norm is the least, and the degree of rarefication of vector of attack a is the highest;
Use convex relaxing techniques, above-mentioned Optimized model can be further converted to following formula:
min c | | a P ‾ k | | 1
s . t . B P ‾ k a P ‾ k = - b k
In formula, defining shielded measuring point numbering collection and be combined into P, unprotected measuring point collection is combined into||(·)||1Table Show l1-norm,Represent from matrixIn remove bkRear submatrix,Represent from vectorIn remove element a (k) after Vector;Use this model of ADMM Algorithm for Solving, obtain variableIn relevant position completion 0 and 1, obtain suboptimum vector of attack ax。
The susceptance of described unknown parameter branch road uses method of Lagrange multipliers and the augmented state estimation technique to calculate.
Described false data vector of attack Optimized model is used for the false data vector of attack that amount of calculation measuring point is corresponding.Should Model is l0-norm optimization problem, belongs to NP-hard problem, in order to improve computational efficiency, uses convex relaxing techniques, by this mould Type is converted into the l1-norm optimization problem of standard.
Preferably, alternating direction multiplier method (Alternating Direction Method of is used Multipliers, ADMM) solve false data vector of attack Optimized model.ADMM algorithm has separability and Fast Convergent Advantage, be suitable for process big data, drastically increase the solution efficiency of false data vector of attack.
Compared with prior art, the present invention has the following advantages and beneficial effect:
Solve assailant face the electric parameter of grasp exist error, even complete and metric data exist bad The problem of data so that false data is attacked more flexibly and effective.
Accompanying drawing explanation
Fig. 1 false data based on parameter estimation attack method flow chart.
Detailed description of the invention
Below with reference to specific embodiments and the drawings, the present invention is described further.
Fig. 1 is the false data attack method flow chart of parameter estimation, implements step as follows:
Step 1: calculate the susceptance of unknown parameter branch road according to method of Lagrange multipliers and the augmented state estimation technique;
The true value assuming branch parameters is pt, error vector is pe, then the measured value of branch parameters is shown below.
P=pt+pe
During Legacy Status is estimated, it is assumed that the error vector of branch parameters is 0, it is i.e. to have described in following formula to retrain.
pe=0
This constraint is injected the constraints of weighted least-squares state estimation model under equality constraint as zero, obtain as Under described Optimized model.
min J ( x ) = 1 2 r T W r
s.t.c(x,pe)=0
pe=0
In formula, r=z-h (x, pe) represent measuring value residual error, h (x, pe) represent and state variable x and branch parameters error peRelevant nonlinear function, c (x, pe) represent the injecting power of the bus not only not had load but also do not have electromotor.
To above-mentioned Optimized model application method of Lagrange multipliers, obtain Lagrangian as follows, adopt further The susceptance of unknown parameter branch road is calculated by method of Lagrange multipliers and the augmented state estimation technique.
L = 1 2 r T W r - μ T c ( x , p e ) - λ T p e
Step 2: calculate Jacobian matrix H according to following formulax
In formula, h (x, pe) represent and state variable x and branch parameters error peRelevant nonlinear function, PijRepresent and prop up Road trend, PiRepresent the injecting power of bus, θiRepresent the phase place of bus i, bijRepresent the susceptance of branch road ij, BiiRepresent bus i Self-admittance.
Step 3: using the Optimized model of ADMM Algorithm for Solving false data vector of attack, this model is as follows, obtains VariableIn relevant position completion 0 and 1, obtain suboptimum vector of attack ax
In a power system with N bar bus, state variable is typically taken as the complex voltage of each bus, including electricity Pressure amplitude value and phase angle, remove outside reference mode, and a total of 2N-1 state variable, state variable is collectively expressed as x=[x1, x2,…,xn]T, n=2N-1.For a properly functioning power system, its busbar voltage is near rated voltage, and props up Two ends, road phase angle difference is the least, and for supertension network, branch resistance is more much smaller than reactance.Therefore, make the following assumptions, all mothers The voltage magnitude of line is equal and is 1, ignores line resistance, then there is not reactive power in measuring value, and state variable is only Voltage phase angle.Now, between measuring value and state variable, meet linear relationship, obtain the DC power flow equation being shown below.
Z=Hx+e e~N (0, Σe)
If with a=[a1,a2,…,am]TRepresent disabled user injects in measuring value false data vector, then reality Measurement data is zbad=z+a, c=[c1,c2,…,cn]TRepresent the mistake being infused in state variable introducing due to false data Difference vector, the state variable of estimation isFrom the angle of assailant, when building vector of attack a, it is desirable to use Minimum intrusion scene and cost achieve the goal, and therefore vector of attack a exists an optimal value.Nonzero element in vector of attack a The corresponding measuring point attacked, nonzero element number l0Norm represents, the Optimized model of vector of attack is shown below.
min c | | a | | 0
S.t.a=Hc
In formula, | | a | |0Represent the l of vector a0Norm, l0Norm is the least, and the degree of rarefication of vector of attack a is the highest.
Use convex relaxing techniques, above-mentioned Optimized model can be further converted to following formula.
min c | | a P ‾ k | | 1
s . t . B P ‾ k a P ‾ k = - b k
In formula, defining shielded measuring point numbering collection and be combined into P, unprotected measuring point collection is combined into||(·)||1Table Show l1-norm,Represent from matrixIn remove bkRear submatrix,Represent from vectorIn remove element a (k) after Vector.Use this model of ADMM Algorithm for Solving, obtain variableIn relevant position completion 0 and 1, obtain suboptimum vector of attack ax
Step 4: inject metric data z after false datax=z+ax
Specific embodiment described herein is only to present invention spirit explanation for example.Technology neck belonging to the present invention Described specific embodiment can be made various amendment or supplements or use similar mode to replace by the technical staff in territory Generation, but without departing from the spirit of the present invention or surmount scope defined in appended claims.

Claims (3)

1. a modern power transmission network false data attack method based on parameter estimation, it is characterised in that comprise the following steps:
Step 1, calculate the susceptance of unknown parameter branch road according to method of Lagrange multipliers and the augmented state estimation technique;
Step 2, according to following formula calculate Jacobian matrix Hx
In formula, h (x, pe) represent and state variable x and branch parameters error peRelevant nonlinear function, PijRepresent branch road tide Stream, PiRepresent the injecting power of bus, θiRepresent the phase place of bus i, bijRepresent the susceptance of branch road ij, BiiRepresent bus i from Admittance;
Step 3, the Optimized model of employing ADMM Algorithm for Solving false data vector of attack, this model is as follows, obtains variableIn relevant position completion 0 and 1, obtain suboptimum vector of attack ax
min c | | a P ‾ k | | 1
s . t . B P ‾ k a P ‾ k = - b k
In formula, defining shielded measuring point numbering collection and be combined into P, unprotected measuring point collection is combined into(·)||1Represent 11-model Number,Represent from matrixIn remove bkRear submatrix,After representing matrix B removes the column vector corresponding with gathering P Submatrix, bkKth row column vector in representing matrix B, wherein B=H (HTH)-1HT-I, H represent observation Jacobian matrix,Table Show from vectorIn remove the vector after element a (k),With set in expression vector of attack aCorresponding element is constituted Vector, a (k) represents the kth element in vector a;
Metric data z after step 4, injection false datax=z+ax, zx=z+ax, z represents original vol during unimplanted false data Survey data.
A kind of modern power transmission network false data attack method based on parameter estimation the most according to claim 1, its feature It is: the detailed process of described step 1 is as follows;
The true value assuming branch parameters is pt, error vector is pe, then the measured value of branch parameters is shown below:
P=pt+pe
During Legacy Status is estimated, it is assumed that the error vector of branch parameters is 0, it is i.e. to have described in following formula to retrain;
pe=0
This constraint is injected the constraints of weighted least-squares state estimation model under equality constraint as zero, obtains following institute State Optimized model:
min J ( x ) = 1 2 r T W r
s.t.c(x,pe)=0
pe=0
In formula, W is for measuring weight diagonal matrix, r=z-h (x, pe) represent measuring value residual error, h (x, pe) represent and state change Amount x and branch parameters error peRelevant nonlinear function, c (x, pe) represent the bus that not only do not had load but also do not have electromotor Injecting power;
To above-mentioned Optimized model application method of Lagrange multipliers, obtain Lagrangian as follows, use further and draw Ge Lang multiplier method and the augmented state estimation technique calculate the susceptance of unknown parameter branch road:
L = 1 2 r T W r - μ T c ( x , p e ) - λ T p e .
A kind of modern power transmission network false data attack method based on parameter estimation the most according to claim 2, its feature It is: the detailed process of described step 3 is as follows;
In a power system with N bar bus, including voltage magnitude and phase angle, remove outside reference mode, a total of 2N- 1 state variable, state variable is collectively expressed as x=[x1,x2,…,xn]T, n=2N-1;
Making the following assumptions, the voltage magnitude of all buses is equal and is 1, ignores line resistance, then do not exist in measuring value Reactive power, state variable only has voltage phase angle;Now, between measuring value and state variable, meet linear relationship, obtain as follows DC power flow equation shown in formula:
Z=Hx+e e~N (0, Σe)
If with a=[a1,a2,…,am]TRepresent the false data vector that disabled user injects in measuring value, then actual measurement Data are zbad=z+a, c=[c1,c2,…,cn]TRepresent due to false data be infused in state variable introduce error to Amount, the state variable of estimation isFrom the angle of assailant, when building vector of attack a, it is desirable to minimum Intrusion scene and cost achieve the goal, therefore vector of attack a exist an optimal value;In vector of attack a, nonzero element is corresponding The measuring point attacked, nonzero element number l0Norm represents, the Optimized model of vector of attack is shown below:
min c | | a | | 0
S.t.a=Hc
In formula, | | a | |0Represent the l of vector a0Norm, l0Norm is the least, and the degree of rarefication of vector of attack a is the highest;
Use convex relaxing techniques, above-mentioned Optimized model can be further converted to following formula:
min c | | a P ‾ k | | 1
s . t . B P ‾ k a P ‾ k = - b k
In formula, defining shielded measuring point numbering collection and be combined into P, unprotected measuring point collection is combined into(·)||1Represent 11-model Number,Represent from matrixIn remove bkRear submatrix,After representing matrix B removes the column vector corresponding with gathering P Submatrix, bkKth row column vector in representing matrix B, wherein B=H (HTH)-1HT-I, H represent observation Jacobian matrix,Table Show from vectorIn remove the vector after element a (k),With set in expression vector of attack aCorresponding element is constituted Vector, a (k) represents the kth element in vector a;Use this model of ADMM Algorithm for Solving, obtain variableIn relevant position Completion 0 and 1, obtains suboptimum vector of attack ax
CN201610550245.0A 2016-07-13 2016-07-13 A kind of modern power transmission network false data attack method based on parameter Estimation Expired - Fee Related CN106099920B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610550245.0A CN106099920B (en) 2016-07-13 2016-07-13 A kind of modern power transmission network false data attack method based on parameter Estimation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610550245.0A CN106099920B (en) 2016-07-13 2016-07-13 A kind of modern power transmission network false data attack method based on parameter Estimation

Publications (2)

Publication Number Publication Date
CN106099920A true CN106099920A (en) 2016-11-09
CN106099920B CN106099920B (en) 2018-08-10

Family

ID=57220042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610550245.0A Expired - Fee Related CN106099920B (en) 2016-07-13 2016-07-13 A kind of modern power transmission network false data attack method based on parameter Estimation

Country Status (1)

Country Link
CN (1) CN106099920B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106655170A (en) * 2016-12-26 2017-05-10 国电南瑞科技股份有限公司 Power system adverse data identification method
CN107292456A (en) * 2017-08-01 2017-10-24 重庆大学 Electrical energy flow point cloth collaboration optimized calculation method based on alternating direction multiplier method
CN108196448A (en) * 2017-12-25 2018-06-22 北京理工大学 False data injection attacks method based on inaccurate mathematical model
CN108234492A (en) * 2018-01-02 2018-06-29 国网四川省电力公司信息通信公司 Consider the power information physics concerted attack analysis method of load data falseness injection
CN108767844A (en) * 2018-04-25 2018-11-06 上海大学 The adaptive state estimation method of Data Injection Attacks lower network multi-region power system
CN110492468A (en) * 2019-06-03 2019-11-22 河海大学 A kind of false data attack discrimination method based on probability distribution
CN110865616A (en) * 2019-11-07 2020-03-06 河南农业大学 Design method of event trigger zone memory DOF controller under random FDI attack
CN111369123A (en) * 2020-02-27 2020-07-03 国网信通亿力科技有限责任公司 Data processing method related to power distribution network
CN111726323A (en) * 2019-03-20 2020-09-29 中国科学院沈阳自动化研究所 PMU (phasor measurement unit) deployment-based error data injection attack defense method in smart power grid
CN111898843A (en) * 2020-05-25 2020-11-06 杭州电子科技大学 Method for evaluating network attack resistance stability of power system by using false alarm attack model
CN111917569A (en) * 2020-05-25 2020-11-10 杭州电子科技大学 Method for evaluating network attack resistance stability of power system by using missed report attack model
CN112364344A (en) * 2020-09-29 2021-02-12 中国南方电网有限责任公司超高压输电公司 Voltage phase angle virtual false data injection attack method for alternating current-direct current hybrid system
CN112565180A (en) * 2020-10-27 2021-03-26 西安交通大学 Power grid defense method, system, equipment and medium based on moving target defense
CN113746818A (en) * 2021-08-23 2021-12-03 国网山东省电力公司济南供电公司 Power system security defense method and device for false data injection attack
CN116827624A (en) * 2023-06-26 2023-09-29 华北电力大学 False data attack method aiming at SCADA system network structure A type error

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102522743A (en) * 2011-11-08 2012-06-27 西安交通大学 Method for defending false-data injection attack in direct-current state estimation of electrical power system
CN102761122A (en) * 2012-07-06 2012-10-31 华北电力大学 Defense method of false data injection attack of power state estimation system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102522743A (en) * 2011-11-08 2012-06-27 西安交通大学 Method for defending false-data injection attack in direct-current state estimation of electrical power system
CN102761122A (en) * 2012-07-06 2012-10-31 华北电力大学 Defense method of false data injection attack of power state estimation system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Y LIU ET AL.: "False data injection attacks state estimation in electronic power grid", 《ACM TRANSACTIONS ON INFORMATION & SYSTEM SECURITY》 *
YU Z. ET AL.: "Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid", 《IEEE TRANSACTIONS ON SMART GRID》 *
王以良: "智能电网虚假数据攻击检测及防范研究", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 *

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106655170A (en) * 2016-12-26 2017-05-10 国电南瑞科技股份有限公司 Power system adverse data identification method
CN107292456A (en) * 2017-08-01 2017-10-24 重庆大学 Electrical energy flow point cloth collaboration optimized calculation method based on alternating direction multiplier method
CN107292456B (en) * 2017-08-01 2020-11-24 重庆大学 Electric-gas energy flow distribution type collaborative optimization calculation method based on alternating direction multiplier method
CN108196448A (en) * 2017-12-25 2018-06-22 北京理工大学 False data injection attacks method based on inaccurate mathematical model
CN108234492A (en) * 2018-01-02 2018-06-29 国网四川省电力公司信息通信公司 Consider the power information physics concerted attack analysis method of load data falseness injection
CN108234492B (en) * 2018-01-02 2020-05-22 国网四川省电力公司信息通信公司 Power information physical cooperative attack analysis method considering load data false injection
CN108767844A (en) * 2018-04-25 2018-11-06 上海大学 The adaptive state estimation method of Data Injection Attacks lower network multi-region power system
CN108767844B (en) * 2018-04-25 2021-06-04 上海大学 Self-adaptive state estimation method of networked multi-region power system under data injection attack
CN111726323B (en) * 2019-03-20 2021-04-06 中国科学院沈阳自动化研究所 PMU (phasor measurement unit) deployment-based error data injection attack defense method in smart power grid
CN111726323A (en) * 2019-03-20 2020-09-29 中国科学院沈阳自动化研究所 PMU (phasor measurement unit) deployment-based error data injection attack defense method in smart power grid
CN110492468A (en) * 2019-06-03 2019-11-22 河海大学 A kind of false data attack discrimination method based on probability distribution
CN110492468B (en) * 2019-06-03 2022-06-24 河海大学 False data attack identification method based on probability distribution
CN110865616A (en) * 2019-11-07 2020-03-06 河南农业大学 Design method of event trigger zone memory DOF controller under random FDI attack
CN110865616B (en) * 2019-11-07 2020-09-25 河南农业大学 Design method of event trigger zone memory DOF controller under random FDI attack
CN111369123A (en) * 2020-02-27 2020-07-03 国网信通亿力科技有限责任公司 Data processing method related to power distribution network
CN111917569A (en) * 2020-05-25 2020-11-10 杭州电子科技大学 Method for evaluating network attack resistance stability of power system by using missed report attack model
CN111898843A (en) * 2020-05-25 2020-11-06 杭州电子科技大学 Method for evaluating network attack resistance stability of power system by using false alarm attack model
CN111917569B (en) * 2020-05-25 2022-07-08 杭州电子科技大学 Method for evaluating network attack resistance stability of power system by using missed report attack model
CN111898843B (en) * 2020-05-25 2023-09-26 杭州电子科技大学 Method for evaluating stability of electric power system against network attack by using false alarm attack model
CN112364344A (en) * 2020-09-29 2021-02-12 中国南方电网有限责任公司超高压输电公司 Voltage phase angle virtual false data injection attack method for alternating current-direct current hybrid system
CN112364344B (en) * 2020-09-29 2023-02-10 中国南方电网有限责任公司超高压输电公司 Voltage phase angle virtual false data injection attack method for alternating current-direct current hybrid system
CN112565180A (en) * 2020-10-27 2021-03-26 西安交通大学 Power grid defense method, system, equipment and medium based on moving target defense
CN112565180B (en) * 2020-10-27 2021-12-28 西安交通大学 Power grid defense method, system, equipment and medium based on moving target defense
CN113746818A (en) * 2021-08-23 2021-12-03 国网山东省电力公司济南供电公司 Power system security defense method and device for false data injection attack
CN116827624A (en) * 2023-06-26 2023-09-29 华北电力大学 False data attack method aiming at SCADA system network structure A type error
CN116827624B (en) * 2023-06-26 2024-04-16 华北电力大学 False data attack method aiming at SCADA system network structure A type error

Also Published As

Publication number Publication date
CN106099920B (en) 2018-08-10

Similar Documents

Publication Publication Date Title
CN106099920A (en) A kind of modern power transmission network false data attack method based on parameter estimation
CN106026089B (en) A kind of power transmission network false data attack defense method based on protection measuring point
CN102761122B (en) Defense method of false data injection attack of power state estimation system
CN102749521B (en) Method for computing harmonic impedance of power system
CN105745809B (en) Obtain the symmetry approach of the non-linear effective power flow of multiterminal element power network
Du et al. On-line estimation of transmission line parameters, temperature and sag using PMU measurements
CN104995811B (en) The acquisition methods of the linear effective power flow of minimum phase of AC power grid
CN105791280B (en) A method of electric system DC state estimated median is resisted according to complete sexual assault
CN103018534B (en) Determine the method and system of harmonic voltage
CN102609598B (en) Method for performing electromagnetic transient-state simulation to large power system
CN112398117B (en) Method for defending false data injection attack causing overload of line load
CN105512502A (en) Weight function least square state estimation method based on residual normalization
CN106127047A (en) A kind of power system malicious data detection method based on Jensen Shannon distance
CN104995810A (en) Method for acquiring a transmission coefficient of a source-load equivariant symmetrical power in an AC main.
CN103532137A (en) Method for estimating state of three-phase four-wire low-voltage distribution network
CN105260949A (en) Distribution network short-circuit calculation method based on matrix transformation
CN104239652A (en) Three-phase five-column transformer modeling analysis method based on EIC principle
CN104362638B (en) Key node regulating and controlling voltage method based on the electrical network polymerization that phasor measurement unit measures
CN108054757A (en) A kind of embedded idle and voltage N-1 Close loop security check methods
CN106130025A (en) A kind of linear method calculating three-phase distribution net trend based on loop analysis
CN104104081A (en) Non-iterative uncertain load flow analysis method based on optimization method
CN102427227B (en) Quick correction decoupling power system state estimating method considering zero injection constraint
CN104657599A (en) Single-phase transformer model for calculating direct current magnetic bias through equivalent differential electric/magnetic path principle
CN109149584A (en) Improve IPFC power injection model constringent method in Load flow calculation
CN102938010A (en) Parallel circuit unbalance degree analysis method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180810

Termination date: 20190713