引用本文:阳育德,蓝水岚,覃智君,刘辉.电力信息物理融合系统的网络-物理协同攻击[J].电力自动化设备,2020,40(2):
YANG Yude,LAN Shuilan,QIN Zhijun,LIU Hui.Coordinated cyber-physical attacks of cyber-physical power system[J].Electric Power Automation Equipment,2020,40(2):
【打印本页】   【HTML】   【下载PDF全文】   查看/发表评论  【EndNote】   【RefMan】   【BibTex】
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 4609次   下载 2046  
电力信息物理融合系统的网络-物理协同攻击
阳育德, 蓝水岚, 覃智君, 刘辉
广西大学 电气工程学院,广西 南宁 530000
摘要:
随着智能电网的发展及智能设备不断引入电力信息物理融合系统(CPPS)中,CPPS面临一种新的攻击方式——网络-物理协同攻击(CCPAS)。这种攻击方式既隐蔽又可引发连锁故障,易造成大规模停电事故。首先,阐述CPPS遭受CCPAS的基本形式,在直流潮流模型下构建考虑状态估计约束的CCPAS模型。然后,探讨CCPAS的机理,以攻击者的角度分析规避状态估计监测后最大范围的攻击,分析CCPAS情景下CPPS的脆弱线路。最后,以IEEE 14、118节点系统为例,通过仿真计算验证模型的有效性、适用性,对比分析考虑状态估计约束后物理攻击的限制。
关键词:  智能电网  信息物理融合系统  状态估计  网络-物理协同攻击  虚假数据注入攻击
DOI:10.16081/j.epae.202001004
分类号:TM761
基金项目:国家自然科学基金资助项目(51767001)
Coordinated cyber-physical attacks of cyber-physical power system
YANG Yude, LAN Shuilan, QIN Zhijun, LIU Hui
School of Electrical Engineering, Guangxi University, Nanning 530000, China
Abstract:
With the development of smart grid and the continuous introduction of smart devices into CPPS(Cyber-Physical Power System),CPPS is faced with a new attack mode, that is CCPAS(Coordinated Cyber-Physical AttackS). This kind of attack mode is not only hidden but also can cause chain failure, which is easy to cause large-scale power failure. Firstly, the basic forms of CPPS suffering CCPAS are described. CCPAS model considering state estimation constraint is constructed under the DC power flow model. Then, the mechanism of CCPAS is discussed, the maximum attack range after circumventing state estimation monitoring is analyzed from the attacker’s point of view, and the vulnerable lines of CPPS are analyzed under CCPAS scenarios. Finally, taking IEEE 14-and 118-bus systems as the examples, the validity and applicability of the proposed model are verified through simulation and calculation, and the limitations of physical attack after considering the state estimation constraints are compared and analyzed.
Key words:  smart grid  cyber-physical system  state estimation  coordinated cyber-physical attacks  false data injection attack

用微信扫一扫

用微信扫一扫