首页 | 官方网站   微博 | 高级检索  
     

考虑负荷虚假数据注入攻击的电力信息物理系统防御策略
引用本文:王电钢,黄林,刘捷,吕磊,阮振,吕林.考虑负荷虚假数据注入攻击的电力信息物理系统防御策略[J].电力系统保护与控制,2019,47(1):28-34.
作者姓名:王电钢  黄林  刘捷  吕磊  阮振  吕林
作者单位:国网四川省电力公司信息通信公司,四川 成都,610041;四川大学电气信息学院,四川 成都,610052
基金项目:国家自然科学基金项目资助(51437003); 国网四川省电力公司科技项目资助“信息系统数据状态与一次系统运行状态关联分析系统研究”
摘    要:为了更好地保障电网安全稳定运行,以电力信息物理高度融合为背景,结合博弈论思想,研究了电力信息物理系统攻防的具体过程,分析了一定防御资源下的最优防御方案及最小负荷期望损失。首先,以上层防御者制定最优防御方案降低电网脆弱性,中层攻击者制定最优防御策略最大化攻击效果,下层运行人员采取最优调度措施降低攻击损失为思路建立了一种三层优化模型。其次,基于遍历思想结合遗传算法和混合整数规划模型制定三层模型求解方案。最后基于算例分析,验证了该模型的有效性。

关 键 词:电力信息物理系统  防御策略  虚假数据注入攻击  攻防博弈
收稿时间:2018/1/2 0:00:00
修稿时间:2018/5/17 0:00:00

Cyber-physical system defense strategy considering loaded false data injection attacks
Affiliation:State Grid Sichuan Information and Communication Company, Chengdu 610041, China,State Grid Sichuan Information and Communication Company, Chengdu 610041, China,State Grid Sichuan Information and Communication Company, Chengdu 610041, China,State Grid Sichuan Information and Communication Company, Chengdu 610041, China,School of Electrical Engineering and Information, Sichuan University, Chengdu 610052, China and School of Electrical Engineering and Information, Sichuan University, Chengdu 610052, China
Abstract:In order to achieve the higher security level of power system in context of cyber-physical fusion, the detailed procedures of attacks and defenses are studied in this paper based on the three-level framework of game theory. The optimal defense strategy and the minimal load loss expectation under the limited defense resources are also investigated. Firstly, the optimal defense strategy is modeled in the upper defender model to reduce the vulnerability of power grid. Then, the middle attacker model is established to maximize the attack effects. In the lower-level, the optimal dispatch is used to reduce the attack loss. To solve the problem efficiently, mixed integer programming method combined with traversal thought based genetic algorithm is employed to calculate the optimal results. The feasibility of the proposed approach is validated through a benchmark case study. This work is supported by National Natural Science Foundation of China (No. 51437003).
Keywords:cyber-physical system  defense strategy  false data injection attack  offensive and defensive game
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电力系统保护与控制》浏览原始摘要信息
点击此处可从《电力系统保护与控制》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号