簡易檢索 / 詳目顯示

研究生: 李駿宏
Lee, Chun-Hung
論文名稱: 在交流與直流狀態估測下利用線性迴歸對智慧電網作假數據注入攻擊
False Data Injection Attack using Linear Regression under AC and DC State Estimation in Smart Grid
指導教授: 卿文龍
Chin, Wen-Long
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 83
中文關鍵詞: 假數據注入攻擊線性回歸智慧電網交流狀態估測直流狀態估測
外文關鍵詞: False Data Injection Attack, Linear Regression, Smart Grid, AC State Estimation, DC State Estimation
相關次數: 點閱:86下載:5
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 智慧電網中的資訊保護問題日趨重要,除了探討防護方法外,部分學者則是探討攻擊方式。其中最具代表的即為假數據注入攻擊(false data injection attack, FDIA),而後有人提出利用主成分分析做進階的假數據注入攻擊─不需得知此電力系統的架構且電力系統的狀態訊號為任意分布。然而此方法依舊有部分條件限制,如電力系統須為直流狀態估測,不得為交流狀態估測,這限制了它的應用。本篇論文嘗試提出能應用在交流狀態估測的攻擊方法,利用迴歸分析搭配廣義反矩陣找出電力系統量測資料的變化資訊,並使用此資訊達到注入隨機數據攻擊的目的。此方法只需要分析一段時間的量測值以產生有效的攻擊,不需要事先取得受到極為嚴密保護的電力系統架構資料,減少產生攻擊所需的時間和成本。

    The information protection issues are becoming increasingly important in smart grid. In addition to explore the protective methods, some scholars explore attacking methods. One of the most representative of those methods is the false data injection attacks (false data injection attack, FDIA). Someone suggested that the use of principal component analysis for the advanced false data injection attacks─do not need to know the architecture of the power system and the status of signal is arbitrary distribution. However, this method is still has some limitations, such as DC power system state estimation shall not be for the exchange of AC power system state estimation, which limits its application. This paper tries to put forward a kind of attack that can be applied in AC state estimation. Regression analysis with pseudo-inverse method is used to identify changes in the power system measurement data, and use this information to achieve the purpose of injecting random data attacks. The proposed method doesn’t require the architecture data of the power system. Intruders only need to obtain a period of time’s measurement data. That makes the attack becomes more easily to produce because the protection of architecture data is harder than the protection of measurement data.

    書名頁..............................................................i 中文摘要............................................................i 英文摘要............................................................ii 誌謝................................................................vi 目錄................................................................vii 圖目錄..............................................................ix 符號說明...........................................................xiii 第一章、導論........................................................1 1.1 背景知識....................................................1 1.2 研究動機及貢獻..............................................3 1.3 文獻探討....................................................5 1.4 論文架構....................................................8 第二章、系統架構....................................................9 2.1 交流電力潮流................................................ 9 2.2 交流狀態估測............................................... 11 2.3 不良資料偵測............................................... 13 第三章、假數據注入攻擊..............................................14 3.1 直流狀態估測下的攻擊方式................................... 14 3.2 交流狀態估測下的攻擊方式................................... 17 第四章、使用主成分分析的假數據攻擊..................................18 4.1 概述....................................................... 18 4.2 主成分分析原理............................................. 19 4.3 利用主成分分析在資訊有限的狀況下發動攻擊................... 22 第五章、利用線性迴歸搭配廣義反矩陣原理求交流狀態估測下之攻擊向量....24 5.1 概述....................................................... 24 5.2 使用LR搭配廣義反矩陣向量之原理產生攻擊向量................ 27 5.3 模擬與討論................................................. 40 5.3.1 攻擊方式不同.............................................. 44 5.3.2 攻擊訊號對雜訊的訊雜比不同................................ 56 5.3.3 量測向量的樣本數t不同.....................................68 5.3.4 不同攻擊方式所需時間比較(狀態訊號為全非高斯).............. 80 第六章、結論和未來展望.............................................81 參考文獻...........................................................82

    [1] Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," Proc. ACM TISSEC , vol. 14, no. 1, pp. 546-551, 2011.
    [2] L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in Proc. Of IEEE International Conference on SmartGridComm, Gaithersburg, MD, Oct. 2010.
    [3] M. Esmalifalak, N. Huy, Z. Rong, and H. Zhu, "Stealth false data injection using independent component analysis in smart grid," IEEE Conf. Smart Grid Commun., pp. 244-248, 2011.
    [4] Z. H. Yu, "Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid," IEEE Transactions on Smart Grid, vol. 6, pp. 1219-1226, 2015.
    [5] C. Jian, and A. Abur, "Placement of PMUs to Enable Bad Data Detection in State Estimation," IEEE Transactions on Power Systems, vol.21, pp. 1608-1615, 2006.
    [6] O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Limiting false data attacks on power system state estimation," Proc. Conf. Inf. Sci. Syst. , pp. 1-6, 2010.
    [7] S. Bi and Y. J. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," Proc. IEEE Globecom, pp. 1162-1167, 2011.
    [8] H. Yi, L. Husheng, K. A. Campbell, and H. Zhu, "Defending false data injection attack on smart grid nrtwork using adaptive CUSUM test," Proc. IEEE CISS , pp.1-6, 2011.
    [9] O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Malicious Data Attacks on the Smart Grid," IEEE Transactions on Smart Grid , vol. 2, pp. 645-658, 2011.
    [10] M. A. Rahhan and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart grids," Proc. IEEE Globecom, pp. 3153-3158, 2012.
    [11] G. Hug and J. A. Giampapa, "Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks," IEEE Transactions on Smart Grid, vol. 3, pp. 1362-1370, 2012.
    [12] Md. Ashfaqur Rahman and Hamed Mohsenian-Rad, "False data injection attacks against nonlinear state estimation in smart power grids" Power and Energy Society General Meeting (PES), Vancouver, BC, Canada, 21-25 July 2013.
    [13] A. Wood and B. Wollenberg, “Power generation, operation, and control,”John Wiley and Sons, 2nd edition, 1996.
    [14] A. Abur and A. Gomez Exposito, “Power System State Estimation: Theory and Implementation,” Marcel Dekker, 2004.
    [15] J. Duncan Glover, Mulukutla S. Sarma, Thomas Overbye, “Power System Analysis and Design” 5th Edition, pp. 326-352, 2012.
    [16] P. S. T. C. A.-. UWEE. Available: http://www.ee.washington.edu/research/pstca/
    [17] P. D. P. Bickel, S. Fienberg, K. Krickeberg, I. Olkin, N. Wermuth and S. Zeger, “Principle Component Analysis:Spring Series in Statistics”, 2nd edition ed.: I. T. Jollifle, 2002.
    [18] Tùng T. Kim and H. Vincent Poor, "Strategic Protection Against Data Injection Attacks on Power Grids," IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 326-333, June 2011.
    [19] Shuguang Cui, Zhu Han, Soummya Kar, Tung T. Kim, H. Vincent Poor, and Ali Tajer, " Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions," IEEE Signal Processing Magazine, pp. 106-115, September 2012.

    下載圖示 校內:2019-06-29公開
    校外:2019-06-29公開
    QR CODE