| 研究生: |
李駿宏 Lee, Chun-Hung |
|---|---|
| 論文名稱: |
在交流與直流狀態估測下利用線性迴歸對智慧電網作假數據注入攻擊 False Data Injection Attack using Linear Regression under AC and DC State Estimation in Smart Grid |
| 指導教授: |
卿文龍
Chin, Wen-Long |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2016 |
| 畢業學年度: | 104 |
| 語文別: | 中文 |
| 論文頁數: | 83 |
| 中文關鍵詞: | 假數據注入攻擊 、線性回歸 、智慧電網 、交流狀態估測 、直流狀態估測 |
| 外文關鍵詞: | False Data Injection Attack, Linear Regression, Smart Grid, AC State Estimation, DC State Estimation |
| 相關次數: | 點閱:86 下載:5 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
智慧電網中的資訊保護問題日趨重要,除了探討防護方法外,部分學者則是探討攻擊方式。其中最具代表的即為假數據注入攻擊(false data injection attack, FDIA),而後有人提出利用主成分分析做進階的假數據注入攻擊─不需得知此電力系統的架構且電力系統的狀態訊號為任意分布。然而此方法依舊有部分條件限制,如電力系統須為直流狀態估測,不得為交流狀態估測,這限制了它的應用。本篇論文嘗試提出能應用在交流狀態估測的攻擊方法,利用迴歸分析搭配廣義反矩陣找出電力系統量測資料的變化資訊,並使用此資訊達到注入隨機數據攻擊的目的。此方法只需要分析一段時間的量測值以產生有效的攻擊,不需要事先取得受到極為嚴密保護的電力系統架構資料,減少產生攻擊所需的時間和成本。
The information protection issues are becoming increasingly important in smart grid. In addition to explore the protective methods, some scholars explore attacking methods. One of the most representative of those methods is the false data injection attacks (false data injection attack, FDIA). Someone suggested that the use of principal component analysis for the advanced false data injection attacks─do not need to know the architecture of the power system and the status of signal is arbitrary distribution. However, this method is still has some limitations, such as DC power system state estimation shall not be for the exchange of AC power system state estimation, which limits its application. This paper tries to put forward a kind of attack that can be applied in AC state estimation. Regression analysis with pseudo-inverse method is used to identify changes in the power system measurement data, and use this information to achieve the purpose of injecting random data attacks. The proposed method doesn’t require the architecture data of the power system. Intruders only need to obtain a period of time’s measurement data. That makes the attack becomes more easily to produce because the protection of architecture data is harder than the protection of measurement data.
[1] Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," Proc. ACM TISSEC , vol. 14, no. 1, pp. 546-551, 2011.
[2] L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in Proc. Of IEEE International Conference on SmartGridComm, Gaithersburg, MD, Oct. 2010.
[3] M. Esmalifalak, N. Huy, Z. Rong, and H. Zhu, "Stealth false data injection using independent component analysis in smart grid," IEEE Conf. Smart Grid Commun., pp. 244-248, 2011.
[4] Z. H. Yu, "Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid," IEEE Transactions on Smart Grid, vol. 6, pp. 1219-1226, 2015.
[5] C. Jian, and A. Abur, "Placement of PMUs to Enable Bad Data Detection in State Estimation," IEEE Transactions on Power Systems, vol.21, pp. 1608-1615, 2006.
[6] O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Limiting false data attacks on power system state estimation," Proc. Conf. Inf. Sci. Syst. , pp. 1-6, 2010.
[7] S. Bi and Y. J. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," Proc. IEEE Globecom, pp. 1162-1167, 2011.
[8] H. Yi, L. Husheng, K. A. Campbell, and H. Zhu, "Defending false data injection attack on smart grid nrtwork using adaptive CUSUM test," Proc. IEEE CISS , pp.1-6, 2011.
[9] O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Malicious Data Attacks on the Smart Grid," IEEE Transactions on Smart Grid , vol. 2, pp. 645-658, 2011.
[10] M. A. Rahhan and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart grids," Proc. IEEE Globecom, pp. 3153-3158, 2012.
[11] G. Hug and J. A. Giampapa, "Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks," IEEE Transactions on Smart Grid, vol. 3, pp. 1362-1370, 2012.
[12] Md. Ashfaqur Rahman and Hamed Mohsenian-Rad, "False data injection attacks against nonlinear state estimation in smart power grids" Power and Energy Society General Meeting (PES), Vancouver, BC, Canada, 21-25 July 2013.
[13] A. Wood and B. Wollenberg, “Power generation, operation, and control,”John Wiley and Sons, 2nd edition, 1996.
[14] A. Abur and A. Gomez Exposito, “Power System State Estimation: Theory and Implementation,” Marcel Dekker, 2004.
[15] J. Duncan Glover, Mulukutla S. Sarma, Thomas Overbye, “Power System Analysis and Design” 5th Edition, pp. 326-352, 2012.
[16] P. S. T. C. A.-. UWEE. Available: http://www.ee.washington.edu/research/pstca/
[17] P. D. P. Bickel, S. Fienberg, K. Krickeberg, I. Olkin, N. Wermuth and S. Zeger, “Principle Component Analysis:Spring Series in Statistics”, 2nd edition ed.: I. T. Jollifle, 2002.
[18] Tùng T. Kim and H. Vincent Poor, "Strategic Protection Against Data Injection Attacks on Power Grids," IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 326-333, June 2011.
[19] Shuguang Cui, Zhu Han, Soummya Kar, Tung T. Kim, H. Vincent Poor, and Ali Tajer, " Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions," IEEE Signal Processing Magazine, pp. 106-115, September 2012.