智能电网虚假数据注入攻击弹性防御策略的拓扑优化  被引量:2

Research on Topology Optimization of Resilient Defense Strategy Against False Data Injection Attack in Smart Grid

在线阅读下载全文

作  者:罗小元[1] 何俊楠 王新宇[1,2] 李宏波 关新平 LUO Xiao-Yuan;HE Jun-Nan;WANG Xin-Yu;LI Hong-Bo;GUAN Xin-Ping(School of Electrical Engineering,Yanshan University,Qinhuangdao 066004;Jiangsu Collaborative Innovation Center for Smart Distribution Network,Nanjing 636600;School of Electronic Information and Electrical Engineering,Shanghai Jiao Tong University,Shanghai 200240)

机构地区:[1]燕山大学电气工程学院,秦皇岛066004 [2]江苏省配电网智能技术与装备协同创新中心,南京636600 [3]上海交通大学电子信息与电气工程学院,上海200240

出  处:《自动化学报》2023年第6期1326-1338,共13页Acta Automatica Sinica

基  金:国家自然科学基金(61873228,62103357);河北省教育厅青年基金(QN2021139);河北省自然科学基金(F2021203043);江苏省配电网智能技术与装备协同创新中心开放基金项目(XTCX202203)资助。

摘  要:基于虚拟隐含网络的虚假数据注入攻击(False data injection attack,FDIA)防御控制策略,本文提出了一种基于图论的拓扑优化算法来提高其防御性能.首先,提出了一种图的等效变换方法—权值分配法,实现二分图连接拓扑与二分图拉普拉斯矩阵的一一对应;进而基于网络拓扑的连通度以及连通图的可去边理论,给出了虚拟隐含网络和二分图连接网络的拓扑选择依据;在考虑拓扑权值的基础上,给出了权值拓扑优化的指标评价函数;通过求解指标评价函数的最小化代价实现拓扑优化选择,从而改善基于虚拟隐含网络的虚假数据注入攻击防御方法的性能.最后,通过在IEEE-14总线电网系统上的仿真验证了所提算法的有效性.Based on the defense control strategy of virtual hidden network,this paper proposes a topology optimization algorithm based on graph theory to improve the defense performance of power system against false data injection attacks.Firstly,an equivalent transformation method of graph-weight distribution method is proposed to realize the one-to-one correspondence between the connection topology of bipartite graph and the Laplace matrix of bipartite graph;Then,based on the connectivity of network topology and the theory of removable edges of connected graphs,the topological selection basis of virtual hidden networks and bipartite graph connected networks is given;Based on the consideration of topological weights,the index evaluation function of topological optimization of weights is given;By minimizing the cost of index evaluation function,topology optimization is realized,and then the performance of false data injection attack defense method based on virtual hidden network is improved.Finally,the effectiveness of the proposed algorithm is verified by simulation on IEEE-14 bus power grid system.

关 键 词:智能电网 虚假数据注入攻击 攻击防御 拓扑图论 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术] TM73[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象