Overview of fraudulent data attack on power system state estimation and defense mechanism

被引:0
作者
Zhu J. [1 ]
Zhang G. [1 ]
Wang T. [1 ]
Zhao J. [1 ]
机构
[1] School of Electrical Engineering, Southwest Jiaotong University, Chengdu, 610031, Sichuan Province
来源
| 1600年 / Power System Technology Press卷 / 40期
基金
中国国家自然科学基金;
关键词
Attack strategies; Data security vulnerabilities; Defense mechanism; Fraudulent data; State estimation;
D O I
10.13335/j.1000-3673.pst.2016.08.023
中图分类号
学科分类号
摘要
Aiming to distort power system state estimation by efficiently bypassing traditional bad data detection and identification algorithms, fraudulent data pose a great threat to safe and reliable operations of power systems. Therefore, more attention should be paid to investigate data security vulnerabilities of real power systems and formulate corresponding defense mechanism during process of constructing secure smart grids. For this reason, basic principles of fraudulent data and their impacts on power systems are firstly discussed. Secondly, according to feasible ways of constructing fraudulent data, their manipulation methods are classified into 2 categories: manipulating data collection and corrupting data communication. Thirdly, according to their capabilities, defense mechanismsare classified into 3 types: detection, identification and containment. Then merits and demerits of these defense mechanisms are discussed. Finally, some issues in urgent solution need aboutfraudulent data attacks and defense mechanisms are pointed out. © 2016, Power System Technology Press. All right reserved.
引用
收藏
页码:2406 / 2415
页数:9
相关论文
共 102 条
  • [1] Schweppe F.C., Wildes J., Rom D.B., Power system static-state estimation: Part I, II & III, IEEE Transactions on Power Apparatus and Systems, 89, 1, pp. 120-135, (1970)
  • [2] Wu F.F., Power system state estimation: a survey, International Journal of Electrical Power & Energy Systems, 12, 2, pp. 80-87, (1990)
  • [3] Monticelli A., Garcia A., Reliable bad data processing for real-time state estimation, IEEE Transactions on Power Apparatus and Systems, 102, 5, pp. 1126-1139, (1983)
  • [4] Cutsem T.V., Pavella M.R., Mili L., Hypothesis testing identification: a new method for bad data analysis in power system state estimation, IEEE Transactions on Power Apparatus and Systems, 103, 11, pp. 3239-3252, (1984)
  • [5] Monticelli A., Wu F.F., Multiple M.Y., Bad data identification for state estimation by combinatorial optimization, IEEE Transactions on Power Delivery, 1, 3, pp. 361-369, (1986)
  • [6] Cutsem T.V., Pavella M.R., Mili L., Bad data identification methods in power system state estimation: a comparative study, IEEE Transactions on Power Apparatus and Systems, 104, 11, pp. 3037-3049, (1985)
  • [7] Cheniae M.G., Mili L., Rousseeuw J., Identification of multiple interacting bad data via power system decomposition, IEEE Transactions on Power Systems, 11, 3, pp. 1555-1563, (1996)
  • [8] Wu J., Yang W., Ge C., Application of GSA-based elbow judgment on bad-data detection of power system, Power System Protection and Control, 26, 22, pp. 23-28, (2007)
  • [9] Lu Z., Wang H., Sun J., Optimal data screening and bad data identification based on sensitive analysis, Power System Technology, 35, 2, pp. 38-42, (2011)
  • [10] Lu Z., Cheng H., Feng L., Et al., Multi bad data identification based on evidence fusion theory, Power System Technology, 36, 1, pp. 123-128, (2012)