電力系統(tǒng)狀態(tài)估計(jì)欺詐性數(shù)據(jù)防御方法
[Abstract]:Power system state estimation fraud data is the hidden bad data that hackers inject maliciously into the measurement data to tamper with the output of state estimation. Since fraudulent data can effectively avoid traditional bad data detection and identification, by constructing specific fraudulent data, hackers can deliberately manipulate the output of state estimation, which leads to the generation of false scheduling instructions. It threatens the safe and reliable operation of power system. Therefore, in order to ensure the future smart grid to better serve the development of the national economy, it is of urgent practical significance to study the data security vulnerabilities in the actual power system and to formulate corresponding defense measures. According to the defensive effect of the methods mentioned in the literature, the methods of fraudulent data defense are divided into three categories: detection, identification and containment. The detection method can only determine whether the fraudulent data exists, but it can not lock the location of the fraudulent data. Because containment method focuses on the possibility of disintegrating hackers to construct fraudulent data, containment method is regarded as the most effective defense way to ensure the reliability of power system state estimation results. Physical protection of measurement information, dynamic adjustment of network parameters, dynamic adjustment of topological structure and protection of power information fusion are four kinds of fraudulent data containment methods proposed at present, but it is inevitable to face high investment in equipment in the process of application. The global transmission capacity is limited and the computational complexity is high. In order to overcome the shortcomings of the above defense algorithms, this paper proposes a method of fraudulent data containment based on the improvement of bad data detection and identification of inherent data security vulnerabilities. The main results of this paper are as follows: 1. The research results of power system state estimation fraudulent data defense method are systematically reviewed. On the basis of summing up the deficiency of the existing fraudulent data defense methods, it is pointed out that improving the data security holes inherent in the bad data detection and identification algorithm is the core of the defense against fraudulent data. A state vector mining based data defense method is proposed. Using hidden Markov model to model the historical running state database, the generator output power which is difficult to manipulate by hackers is regarded as the observation state sequence, and the system state sequence is decoded by Viterbi algorithm. In this paper, a method of data fraud defense based on state variable correction is proposed. A state consistency test is proposed to lock the state variables that are suspected to be affected by fraudulent data, and to break the concealment of the fraudulent data by modifying the vector of the state variables, which makes it unable to avoid the bad data detection and identification algorithm. Finally, the identification and elimination of fraudulent data are realized. 4. The effectiveness of the proposed method is verified by using IEEE-14 node and IEEE-118 node standard test system.
【學(xué)位授予單位】:西南交通大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TM732
【參考文獻(xiàn)】
相關(guān)期刊論文 前9條
1 朱杰;張葛祥;王濤;趙俊博;;電力系統(tǒng)狀態(tài)估計(jì)欺詐性數(shù)據(jù)攻擊及防御綜述[J];電網(wǎng)技術(shù);2016年08期
2 朱杰;張葛祥;;基于歷史數(shù)據(jù)庫(kù)的電力系統(tǒng)狀態(tài)估計(jì)欺詐性數(shù)據(jù)防御[J];電網(wǎng)技術(shù);2016年06期
3 趙俊博;張葛祥;黃彥全;;含新能源電力系統(tǒng)狀態(tài)估計(jì)研究現(xiàn)狀和展望[J];電力自動(dòng)化設(shè)備;2014年05期
4 劉健;蔡明威;張志華;張小慶;杜紅衛(wèi);;基于可信度的電纜配電網(wǎng)不良數(shù)據(jù)辨識(shí)與修正[J];電力自動(dòng)化設(shè)備;2014年02期
5 陳艷波;何光宇;周京陽(yáng);于爾鏗;李強(qiáng);顧志東;潘曉強(qiáng);;基于改進(jìn)轉(zhuǎn)移潮流法的拓?fù)溴e(cuò)誤辨識(shí)方法[J];電網(wǎng)技術(shù);2012年03期
6 盧志剛;程慧琳;馮磊;楊麗君;;基于證據(jù)融合理論的多不良數(shù)據(jù)辨識(shí)[J];電網(wǎng)技術(shù);2012年01期
7 楊清宇;楊潔;馬訓(xùn)鳴;;電力系統(tǒng)中假數(shù)據(jù)注入攻擊研究[J];微電子學(xué)與計(jì)算機(jī);2011年12期
8 盧志剛;王浩銳;孫繼凱;;基于靈敏度分析的數(shù)據(jù)最優(yōu)篩選與不良數(shù)據(jù)辨識(shí)[J];電網(wǎng)技術(shù);2011年02期
9 吳軍基;楊偉;葛成;趙彤;;基于GSA的肘形判據(jù)用于電力系統(tǒng)不良數(shù)據(jù)辨識(shí)[J];中國(guó)電機(jī)工程學(xué)報(bào);2006年22期
相關(guān)碩士學(xué)位論文 前1條
1 王以良;智能電網(wǎng)虛假數(shù)據(jù)攻擊檢測(cè)及防范研究[D];華北電力大學(xué);2014年
,本文編號(hào):2362292
本文鏈接:http://sikaile.net/kejilunwen/dianlidianqilunwen/2362292.html