首页 | 官方网站   微博 | 高级检索  
     

智能电网状态维持拓扑攻击及其对经济运行的影响
引用本文:田继伟,王布宏,李夏.智能电网状态维持拓扑攻击及其对经济运行的影响[J].电力系统保护与控制,2018,46(1):50-56.
作者姓名:田继伟  王布宏  李夏
作者单位:空军工程大学信息与导航学院,陕西 西安710077,空军工程大学信息与导航学院,陕西 西安710077,空军工程大学信息与导航学院,陕西 西安710077
基金项目:国家自然科学基金(61272486);信息安全国家重点实验室开放课题基金(2014-02)
摘    要:随着传感器技术、计算机和通信网络技术的迅猛发展,现代电力系统已经成为一个复杂的信息物理系统。信息技术在电力系统大量运用的同时,也增加了电力系统遭受网络攻击的风险。为了评估电力系统面临的攻击威胁,研究了通过“错误”的拓扑信息对智能电网控制中心进行误导的网络攻击。在此类拓扑攻击中,攻击者拦截远程终端单元的数据,对其进行修改,并将修改后的数据发送到控制中心。对不被检测的状态维持拓扑攻击的条件和一个更加现实可行的攻击策略进行了分析研究,并在IEEE 9-bus和14-bus系统上进行了仿真实验。仿真结果表明该类拓扑攻击能对经济运行造成破坏性影响。

关 键 词:拓扑攻击  虚假数据注入攻击  状态估计  坏数据检测  最优潮流
收稿时间:2016/12/16 0:00:00
修稿时间:2017/4/14 0:00:00

State-preserving topology attacks and its impact on economic operation of smart grid
TIAN Jiwei,WANG Buhong and LI Xia.State-preserving topology attacks and its impact on economic operation of smart grid[J].Power System Protection and Control,2018,46(1):50-56.
Authors:TIAN Jiwei  WANG Buhong and LI Xia
Abstract:With rapid advances in sensor, computer and communication networks, modern power systems have become complicated cyber-physical systems. The increasing use of information technologies in power systems has increased the risk of power systems to cyber-attacks. In order to evaluate the threat of attack on the power system, cyber attacks on smart grids aiming at misleading the control center with incorrect topology information are considered. In such topology attacks, an adversary intercepts network and meter data from the remote terminal units, modifies part of them, and forwards the modified data to the control center. A necessary and sufficient condition for an undetectable state-preserving topology attack and a more realistic and feasible attack strategy are analyzed and studied. The proposed attacks are tested with IEEE 9-bus and 14-bus systems. The simulation results show that the topology attack can have the destructive influence on the economic operation. This work is supported by National Natural Science Foundation of China (No. 61272486) and Research on New Theory and Key Technology of Cryptography in Cloud Computing Security Open Topic Foundation in State Key Laboratory of Information Security (No. 2014-02).
Keywords:topology attack  false data injection attack  state estimation  bad data detection  optimal power flow
点击此处可从《电力系统保护与控制》浏览原始摘要信息
点击此处可从《电力系统保护与控制》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号