引用本文: | 田继伟,王布宏,李夏.智能电网状态维持拓扑攻击及其对经济运行的影响[J].电力系统保护与控制,2018,46(1):50-56.[点击复制] |
TIAN Jiwei,WANG Buhong,LI Xia.State-preserving topology attacks and its impact on economic operation of smart grid[J].Power System Protection and Control,2018,46(1):50-56[点击复制] |
|
摘要: |
随着传感器技术、计算机和通信网络技术的迅猛发展,现代电力系统已经成为一个复杂的信息物理系统。信息技术在电力系统大量运用的同时,也增加了电力系统遭受网络攻击的风险。为了评估电力系统面临的攻击威胁,研究了通过“错误”的拓扑信息对智能电网控制中心进行误导的网络攻击。在此类拓扑攻击中,攻击者拦截远程终端单元的数据,对其进行修改,并将修改后的数据发送到控制中心。对不被检测的状态维持拓扑攻击的条件和一个更加现实可行的攻击策略进行了分析研究,并在IEEE 9-bus和14-bus系统上进行了仿真实验。仿真结果表明该类拓扑攻击能对经济运行造成破坏性影响。 |
关键词: 拓扑攻击 虚假数据注入攻击 状态估计 坏数据检测 最优潮流 |
DOI:10.7667/PSPC162060 |
投稿时间:2016-12-16修订日期:2017-04-14 |
基金项目:国家自然科学基金(61272486);信息安全国家重点实验室开放课题基金(2014-02) |
|
State-preserving topology attacks and its impact on economic operation of smart grid |
TIAN Jiwei,WANG Buhong,LI Xia |
(Information and Navigation College, Air Force Engineering University, Xi’an 710077, China) |
Abstract: |
With rapid advances in sensor, computer and communication networks, modern power systems have become complicated cyber-physical systems. The increasing use of information technologies in power systems has increased the risk of power systems to cyber-attacks. In order to evaluate the threat of attack on the power system, cyber attacks on smart grids aiming at misleading the control center with incorrect topology information are considered. In such topology attacks, an adversary intercepts network and meter data from the remote terminal units, modifies part of them, and forwards the modified data to the control center. A necessary and sufficient condition for an undetectable state-preserving topology attack and a more realistic and feasible attack strategy are analyzed and studied. The proposed attacks are tested with IEEE 9-bus and 14-bus systems. The simulation results show that the topology attack can have the destructive influence on the economic operation. This work is supported by National Natural Science Foundation of China (No. 61272486) and Research on New Theory and Key Technology of Cryptography in Cloud Computing Security Open Topic Foundation in State Key Laboratory of Information Security (No. 2014-02). |
Key words: topology attack false data injection attack state estimation bad data detection optimal power flow |