引用本文:王胜锋,丁洲,吴劲松,邱爱兵.基于拓扑篡改的电力市场虚假数据注入攻击方案[J].电力自动化设备,2021,41(11):
WANG Shengfeng,DING Zhou,WU Jingsong,QIU Aibing.False data injection attack scheme of electricity market based on topology tampering[J].Electric Power Automation Equipment,2021,41(11):
【打印本页】   【HTML】   【下载PDF全文】   查看/发表评论  【EndNote】   【RefMan】   【BibTex】
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 3362次   下载 1204  
基于拓扑篡改的电力市场虚假数据注入攻击方案
王胜锋, 丁洲, 吴劲松, 邱爱兵
南通大学 电气工程学院,江苏 南通 226019
摘要:
从攻击者的角度出发,在直流状态估计框架下提出了一种基于拓扑篡改的虚假数据注入攻击(FDIA)方案。首先,通过分析攻击后由网络拓扑处理器计算所得拓扑结构与传感器测量结果的一致性以及对比攻击前、后的残差,给出可以躲避拓扑误差处理检测以及残差检测的隐蔽攻击定义;然后,基于上述定义以及攻击向量列空间的隐蔽条件,提出一种FDIA方案,通过求解凸规划问题实现在保证隐蔽性的同时获得最大发电收益;最后,基于标准IEEE 9节点及14节点系统对所提方案的有效性进行验证。结果表明,与现有FDIA方案相比,所提将拓扑篡改与FDIA相结合的攻击方案具有更强的隐蔽性且获利更大。
关键词:  虚假数据注入攻击  网络拓扑  拓扑篡改  电力市场  状态估计
DOI:10.16081/j.epae.202106004
分类号:TM761
基金项目:国家自然科学基金资助项目(61473159,61973209);江苏省六大人才高峰项目(XYDXX-091);南通市民生科技重点项目(MS22020030)
False data injection attack scheme of electricity market based on topology tampering
WANG Shengfeng, DING Zhou, WU Jingsong, QIU Aibing
School of Electrical Engineering, Nantong University, Nantong 226019, China
Abstract:
From the attacker’s point of view, a FDIA(False Data Injection Attack) scheme based on topology tampering is proposed under the framework of DC state estimation. Firstly, by analyzing the consistency between the topology structure calculated by the network topology processor after the attack and measured by the sensor, and comparing the residuals before and after the attack, the definition of stealthy attack which can avoid the topology error processing detection and residual detection is given. Then, based on the above definition and the concealment condition of the attack vector column space, a FDIA scheme is proposed to achieve the maximum generation benefits while ensuring concealment by solving the convex programming problem. Finally, the effectiveness of the proposed scheme is verified based on standard IEEE 9-bus and 14-bus systems. The results show that, compared with the existing FDIA schemes, the proposed attack scheme combining topology tampering with FDIA is more concealable and more profitable.
Key words:  false data injection attack  network topology  topology tampering  electricity market  state estimation

用微信扫一扫

用微信扫一扫