2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

面向电力信息物理系统的虚假数据注入攻击研究综述

王琦 邰伟 汤奕 倪明

王琦, 邰伟, 汤奕, 倪明. 面向电力信息物理系统的虚假数据注入攻击研究综述. 自动化学报, 2019, 45(1): 72-83. doi: 10.16383/j.aas.2018.c180369
引用本文: 王琦, 邰伟, 汤奕, 倪明. 面向电力信息物理系统的虚假数据注入攻击研究综述. 自动化学报, 2019, 45(1): 72-83. doi: 10.16383/j.aas.2018.c180369
WANG Qi, TAI Wei, TANG Yi, NI Ming. A Review on False Data Injection Attack Toward Cyber-physical Power System. ACTA AUTOMATICA SINICA, 2019, 45(1): 72-83. doi: 10.16383/j.aas.2018.c180369
Citation: WANG Qi, TAI Wei, TANG Yi, NI Ming. A Review on False Data Injection Attack Toward Cyber-physical Power System. ACTA AUTOMATICA SINICA, 2019, 45(1): 72-83. doi: 10.16383/j.aas.2018.c180369

面向电力信息物理系统的虚假数据注入攻击研究综述

doi: 10.16383/j.aas.2018.c180369
基金项目: 

国家自然科学基金 51577030

国家重点研究发展计划 2017YFB0903000

国家自然科学基金 51707032

详细信息
    作者简介:

    邰伟 东南大学电气工程学硕士研究生.主要研究方向为电力信息物理系统网络攻击.E-mail:taiwei@seu.edu.cn

    汤奕 博士, 东南大学电气工程学院副教授.主要研究方向为电力系统稳定分析与控制和电力信息物理融合系统.E-mail:tangyi@seu.edu.cn

    倪明 博士, 南瑞集团有限公司研究员级高级工程师.主要研究方向为电力系统规划, 分析与控制.E-mail:ni-ming@sgepri.sgcc.com.cn

    通讯作者:

    王琦 博士, 东南大学电气工程学院讲师.主要研究方向为电力信息物理系统和电力系统稳定分析与控制.本文通信作者.E-mail:wangqi@seu.edu.cn

A Review on False Data Injection Attack Toward Cyber-physical Power System

Funds: 

National Natural Science Foundation of China 51577030

National Key Research and Development Program of China 2017YFB0903000

National Natural Science Foundation of China 51707032

More Information
    Author Bio:

    Master student at the School of Electrical Engineering,Southeast University.His research interest covers cyber-attacks against cyber physical power systems

    Ph.D.,associate professor at the School of Electrical Engineering,Southeast University.His research interest covers power system stability analysis and control,and cyber physical power systems

    Ph.D.,professor status high level engineer at NARI Group Corporation.His research interest covers planning,analysis and control of power system

    Corresponding author: WANG Qi Ph.D.,lecturer at the School of Electrical Engineering,Southeast University.His research interest covers cyber physical power systems,and power system stability analysis and control.Corresponding author of this paper
  • 摘要: 随着电力信息通信技术的发展与应用,电力流与信息流深度融合,共同实现对系统的全景状态感知与控制决策,电力系统转变成典型的信息物理系统(Cyber physical system,CPS).开放的通信环境与复杂的信息物理耦合交互过程,使得信息安全风险成为影响电力系统安全稳定运行的重要因素.其中,虚假数据注入攻击(False data injection attack,FDIA)通过破坏网络数据完整性以干扰控制决策,是一种典型的网络攻击方式.本文针对面向电力CPS的虚假数据注入的攻击过程和防御手段进行了分析与总结.从攻击者视角分析了FDIA的攻击目标、策略及后果;从防御者视角总结了保护与检测环节中的各类方法;最后基于联合仿真技术,提出了针对虚假数据攻防过程建模和评估的电力CPS联合攻防平台.
    1)  本文责任编委 孙秋野
  • 图  1  电力CPS结构图

    Fig.  1  The framework of cyber physical power systems

    图  2  电力CPS安全监控架构

    Fig.  2  The security supervisory and control architecture of CPPS

    图  3  FDIA最优攻击区域选取

    Fig.  3  The optimal attack area of the FDIA

    图  4  电力CPS数据流中的FDIA攻防手段概括

    Fig.  4  The attack-defense means of FDIA aimed at the data flow in CPPS

    图  5  电力CPS网络联合攻防平台框架

    Fig.  5  The framework of the CPPS associated attack-defense platform

    图  6  FDIA协同攻防框架

    Fig.  6  The synergetic attack-defense framework of FDIA

    表  1  电力CPS网络安全攻防平台研究现状

    Table  1  Researches of CPPS associated attack-defense platforms

    组成结构 攻击场景 防御方法 验证效果
    MATLAB, OPNET[60] 信息传输故障 基于多维尺度和局部异常因子的检测方法 实现CPS各区域故障的统一识别与定位
    Digsilent, OMNET++, MATLAB[61] 针对EMS的FDIA 检测和事后恢复方法 构建了脆弱性和攻击影响的综合评估框架
    PSLF, NS2[62] 针对PMU状态估计器的FDIA 基于状态变量时效性的检测方法 验证了状态估计器对单链路和路由器故障、拥塞的鲁棒性
    MATLAB, OPNET, C++[63] 针对广域阻尼控制系统的拒绝服务、中间人等攻击 分析归纳了延迟、无序、错误数据的端到端信息特征
    Simulink, OPNET[64] 目的为延迟和污染通信数据的分布式拒绝服务攻击 观察了网络攻击对故障附近发电机响应的影响
    RTDS, Python, AutoIt[65] 面向广域监控系统应用的电力CPS突发事件和网络攻击行为 基于数据挖掘的入侵异常检测方法 验证了电力系统应对攻击的脆弱性评估、异常检测与故障检测能力
    下载: 导出CSV
  • [1] 赵俊华, 文福拴, 薛禹胜, 李雪, 董朝阳.电力CPS的架构及其实现技术与挑战.电力系统自动化, 2010, 34(16):1-7 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201016001

    Zhao Jun-Hua, Wen Fu-Shuan, Xue Yu-Sheng, Li Xue, Dong Zhao-Yang.Cyber physical power systems:architecture, implementation techniques and challenges.Automation of Electric Power Systems, 2010, 34(16):1-7 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201016001
    [2] 马钊, 周孝信, 尚宇炜, 盛万兴.能源互联网概念、关键技术及发展模式探索.电网技术, 2015, 39(11):3014-3022 http://d.old.wanfangdata.com.cn/Periodical/dwjs201511003

    Ma Zhao, Zhou Xiao-Xin, Shang Yu-Wei, Sheng Wan-Xing.Exploring the concept, key technologies and development model of energy internet.Power System Technology, 2015, 39(11):3014-3022 http://d.old.wanfangdata.com.cn/Periodical/dwjs201511003
    [3] Mo Y L, Kim T H J, Brancik K, Dickinson D, Lee H, Perrig A, et al.Cyber-physical security of a smart grid infrastructure.Proceedings of the IEEE, 2012, 100(1):195-209 doi: 10.1109/JPROC.2011.2161428
    [4] He H B, Yan J.Cyber-physical attacks and defences in the smart grid:a survey.IET Cyber-Physical Systems:Theory and Applications, 2016, 1(1):13-27 doi: 10.1049/iet-cps.2016.0019
    [5] 刘东, 盛万兴, 王云, 陆一鸣, 孙辰.电网信息物理系统的关键技术及其进展.中国电机工程学报, 2015, 35(14):3522-3531 http://d.old.wanfangdata.com.cn/Periodical/zgdjgcxb201514007

    Liu Dong, Sheng Wan-Xing, Wang Yun, Lu Yi-Ming, Sun Chen.Key technologies and trends of cyber physical system for power grid.Proceedings of the CSEE, 2015, 35(14):3522-3531 http://d.old.wanfangdata.com.cn/Periodical/zgdjgcxb201514007
    [6] Vellaithurai C, Srivastava A, Zonouz S, Berthier R.CPIndex:cyber-physical vulnerability assessment for power-grid infrastructures.IEEE Transactions on Smart Grid, 2015, 6(2):566-575 doi: 10.1109/TSG.2014.2372315
    [7] Wang W Y, Lu Z.Cyber security in the smart grid:survey and challenges.Computer Networks, 2013, 57(5):13441371 doi: 10.1016/j.comnet.2012.12.017
    [8] 苗新, 张恺, 田世明, 李建歧, 殷树刚, 赵子岩.支撑智能电网的信息通信体系.电网技术, 2009, 33(17):8-13 http://d.old.wanfangdata.com.cn/Periodical/zgsjtx201516019

    Miao Xin, Zhang Kai, Tian Shi-Ming, Li Jian-Qi, Yin Shu-Gang, Zhao Zi-Yan.Information communication system supporting smart grid.Power System Technology, 2009, 33(17):8-13 http://d.old.wanfangdata.com.cn/Periodical/zgsjtx201516019
    [9] Liu S, Mashayekh S, Kundur D, Zourntos T, Butler-Purry K.A framework for modeling cyber-physical switching attacks in smart grid.IEEE Transactions on Emerging Topics in Computing, 2013, 1(2):273-285 doi: 10.1109/TETC.2013.2296440
    [10] 叶夏明, 文福拴, 尚金成, 何洋.电力系统中信息物理安全风险传播机制.电网技术, 2015, 39(11):3072-3079 http://d.old.wanfangdata.com.cn/Periodical/dwjs201511012

    Ye Xia-Ming, Wen Fu-Shuan, Shang Jin-Cheng, He Yang.Propagation mechanism of cyber physical security risks in power systems.Power System Technology, 2015, 39(11):3072-3079 http://d.old.wanfangdata.com.cn/Periodical/dwjs201511012
    [11] Hahn A, Govindarasu M.Cyber attack exposure evaluation framework for the smart grid.IEEE Transactions on Smart Grid, 2011, 2(4):835-843 doi: 10.1109/TSG.2011.2163829
    [12] 田继伟, 王布宏, 李夏.智能电网状态维持拓扑攻击及其对经济运行的影响.电力系统保护与控制, 2018, 46(1):50-56 http://d.old.wanfangdata.com.cn/Periodical/jdq201801008

    Tian Ji-Wei, Wang Bu-Hong, Li Xia.State-preserving topology attacks and its impact on economic operation of smart grid.Power System Protection and Control, 2018, 46(1):50-56 http://d.old.wanfangdata.com.cn/Periodical/jdq201801008
    [13] 汤奕, 陈倩, 李梦雅, 王琦, 倪明, 梁云.电力信息物理融合系统环境中的网络攻击研究综述.电力系统自动化, 2016, 40(17):59-69 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201617009

    Tang Yi, Chen Qian, Li Meng-Ya, Wang Qi, Ni Ming, Liang Yun.Overview on cyber-attacks against cyber physical power system.Automation of Electric Power Systems, 2016, 40(17):59-69 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201617009
    [14] Liang G Q, Weller S R, Zhao J H, Luo F J, Dong Z Y.The 2015 Ukraine blackout:implications for false data injection attacks.IEEE Transactions on Power Systems, 2017, 32(4):3317-3318 doi: 10.1109/TPWRS.2016.2631891
    [15] 李中伟, 佟为明, 金显吉.智能电网信息安全防御体系与信息安全测试系统构建:乌克兰和以色列国家电网遭受网络攻击事件的思考与启示.电力系统自动化, 2016, 40(8):147-151 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201608022

    Li Zhong-Wei, Tong Wei-Ming, Jin Xian-Ji.Construction of cyber security defense hierarchy and cyber security testing system of smart grid:thinking and enlightenment for network attack events to national power grid of Ukraine and Israel.Automation of Electric Power Systems, 2016, 40(8):147-151 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201608022
    [16] 赵俊华, 梁高琪, 文福拴, 董朝阳.乌克兰事件的启示:防范针对电网的虚假数据注入攻击.电力系统自动化, 2016, 40(7):149-151 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201607022

    Zhao Jun-Hua, Liang Gao-Qi, Wen Fu-Shuan, Dong Zhao-Yang.Lessons learnt from Ukrainian blackout:protecting power grids against false data injection attacks.Automation of Electric Power Systems, 2016, 40(7):149-151 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201607022
    [17] 倪明, 颜诘, 柏瑞, 汤奕.电力系统防恶意信息攻击的思考.电力系统自动化, 2016, 40(5):148-151 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201605023

    Ni Ming, Yan Jie, Bo Rui, Tang Yi.Power system cyber attack and its defense.Automation of Electric Power Systems, 2016, 40(5):148-151 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201605023
    [18] 卫志农, 陈和升, 倪明, 孙国强, 孙永辉, 厉超.电力信息物理系统中恶性数据定义、构建与防御挑战.电力系统自动化, 2016, 40(17):70-78 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201617010

    Wei Zhi-Nong, Chen He-Sheng, Ni Ming, Sun Guo-Qiang, Sun Yong-Hui, Li Chao.Definition, construction and defense of false data in cyber physical system.Automation of Electric Power Systems, 2016, 40(17):70-78 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201617010
    [19] 汤奕, 王琦, 倪明, 梁云.电力信息物理融合系统中的网络攻击分析.电力系统自动化, 2016, 40(6):148-151 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201606024

    Tang Yi, Wang Qi, Ni Ming, Liang Yun.Analysis of cyber attacks in cyber physical power system.Automation of Electric Power Systems, 2016, 40(6):148-151 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201606024
    [20] 朱杰, 张葛祥, 王涛, 赵俊博.电力系统状态估计欺诈性数据攻击及防御综述.电网技术, 2016, 40(8):2406-2415 http://www.cnki.com.cn/Article/CJFDTOTAL-DWJS201608026.htm

    Zhu Jie, Zhang Ge-Xiang, Wang Tao, Zhao Jun-Bo.Overview of fraudulent data attack on power system state estimation and defense mechanism.Power System Technology, 2016, 40(8):2406-2415 http://www.cnki.com.cn/Article/CJFDTOTAL-DWJS201608026.htm
    [21] Fan Y W, Zhang Z H, Trinkle M, Dimitrovski A D, Song J B, Li H S.A cross-layer defense mechanism against GPS spoofing attacks on PMUs in smart Grids.IEEE Transactions on Smart Grid, 2015, 6(6):2659-2668 doi: 10.1109/TSG.2014.2346088
    [22] Liu X X, Zhu P D, Zhang Y, Chen K.A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure.IEEE Transactions on Smart Grid, 2015, 6(5):2435-2443 doi: 10.1109/TSG.2015.2418280
    [23] Bishop A N, Savkin A V.On false-data attacks in robust multi-sensor-based estimation.In:Proceedings of the 9th IEEE International Conference on Control and Automation.Santiago, Chile:IEEE, 2011.10-17
    [24] Pal S, Sikdar B, Chow J H.An online mechanism for detection of gray-hole attacks on PMU data.IEEE Transactions on Smart Grid, 2018, 9(4):2498-2507 doi: 10.1109/TSG.2016.2614327
    [25] 冀星沛, 王波, 董朝阳, 陈果, 刘涤尘, 魏大千, 等.电力信息-物理相互依存网络脆弱性评估及加边保护策略.电网技术, 2016, 40(6):1867-1873 http://www.cnki.com.cn/Article/CJFDTotal-DWJS201606042.htm

    Ji Xing-Pei, Wang Bo, Dong Zhao-Yang, Chen Guo, Liu Di-Chen, Wei Da-Qian, et al.Vulnerability evaluation and link addition protection strategy research of electrical cyber-physical interdependent networks.Power System Technology, 2016, 40(6):1867-1873 http://www.cnki.com.cn/Article/CJFDTotal-DWJS201606042.htm
    [26] 李强, 周京阳, 于尔铿, 刘树春, 王磊.基于混合量测的电力系统状态估计混合算法.电力系统自动化, 2005, 29(19):31-35 doi: 10.3321/j.issn:1000-1026.2005.19.006

    Li Qiang, Zhou Jing-Yang, Yu Er-Keng, Liu Shu-Chun, Wang Lei.Hybrid algorithm for power system state estimation based on PMU measurement and SCADA measurement.Automation of Electric Power Systems, 2005, 29(19):31-35 doi: 10.3321/j.issn:1000-1026.2005.19.006
    [27] Mo Y L, Sinopoli B.False data injection attacks in control systems.In:Proceedings of the 1st Workshop on Secure Control Systems.Stockholm, Sweden:Springer, 2010.
    [28] 王宇飞, 高昆仑, 赵婷, 邱健.基于改进攻击图的电力信息物理系统跨空间连锁故障危害评估.中国电机工程学报, 2016, 36(6):1490-1499 http://www.cnki.com.cn/Article/CJFDTOTAL-ZGDC201606005.htm

    Wang Yu-Fei, Gao Kun-Lun, Zhao Ting, Qiu Jian.Assessing the harmfulness of cascading failures across space in electric cyber-physical system based on improved attack graph.Proceedings of the CSEE, 2016, 36(6):1490-1499 http://www.cnki.com.cn/Article/CJFDTOTAL-ZGDC201606005.htm
    [29] 田猛, 王先培, 董政呈, 朱国威, 代荡荡, 赵乐.基于拉格朗日乘子法的虚假数据攻击策略.电力系统自动化, 2017, 41(11):26-32 doi: 10.7500/AEPS20161225004

    Tian Meng, Wang Xian-Pei, Dong Zheng-Cheng, Zhu Guo-Wei, Dai Dang-Dang, Zhao Le.Injected attack strategy for false data based on Lagrange multipliers method.Automation of Electric Power Systems, 2017, 41(11):26-32 doi: 10.7500/AEPS20161225004
    [30] 苏盛, 吴长江, 马钧, 曾祥君.基于攻击方视角的电力CPS网络攻击模式分析.电网技术, 2014, 38(11):3115-3120 http://d.old.wanfangdata.com.cn/Periodical/dwjs201411026

    Su Sheng, Wu Chang-Jiang, Ma Jun, Zeng Xiang-Jun.Attacker's perspective based analysis on cyber attack mode to cyber-physical system.Power System Technology, 2014, 38(11):3115-3120 http://d.old.wanfangdata.com.cn/Periodical/dwjs201411026
    [31] 朱泽磊, 周京阳, 潘毅, 闫翠会, 崔晖, 李伟刚.考虑电力电量平衡的安全约束经济调度.中国电机工程学报, 2013, 33(10):168-176 http://d.old.wanfangdata.com.cn/Periodical/zgdjgcxb201310022

    Zhu Ze-Lei, Zhou Jing-Yang, Pan Yi, Yan Cui-Hui, Cui Hui, Li Wei-Gang.Security constrained economic dispatch considering balance of electric power and energy.Proceedings of the CSEE, 2013, 33(10):168-176 http://d.old.wanfangdata.com.cn/Periodical/zgdjgcxb201310022
    [32] Xie L, Mo Y L, Sinopoli B.Integrity data attacks in power market operations.IEEE Transactions on Smart Grid, 2011, 2(4):659-666 doi: 10.1109/TSG.2011.2161892
    [33] Jia L Y, Kim J, Thomas R J, Tong L.Impact of data quality on real-time locational marginal price.IEEE Transactions on Power Systems, 2014, 29(2):627-636 doi: 10.1109/TPWRS.59
    [34] Mousavian S, Valenzuela J, Wang J H.A probabilistic risk mitigation model for cyber-attacks to PMU networks.IEEE Transactions on Power Systems, 2015, 30(1):156-165 doi: 10.1109/TPWRS.2014.2320230
    [35] Zhao J B, Zhang G X, La Scala M, Wang Z Y.Enhanced robustness of state estimator to bad data processing through multi-innovation analysis.IEEE Transactions on Industrial Informatics, 2017, 13(4):1610-1619 doi: 10.1109/TII.2016.2626782
    [36] 王先培, 朱国威, 贺瑞娟, 田猛, 董政呈, 代荡荡, 等.复杂网络理论在电力CPS连锁故障研究中的应用综述.电网技术, 2017, 41(9):2947-2956 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=QKC20172017091300081478

    Wang Xian-Pei, Zhu Guo-Wei, He Rui-Juan, Tian Meng, Dong Zheng-Cheng, Dai Dang-Dang, et al.Survey of cascading failures in cyber physical power system based on complex network theory.Power System Technology, 2017, 41(9):2947-2956 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=QKC20172017091300081478
    [37] Liu R, Vellaithurai C, Biswas S S, Gamage T T, Srivastava A K.Analyzing the cyber-physical impact of cyber events on the power grid.IEEE Transactions on Smart Grid, 2015, 6(5):2444-2453 doi: 10.1109/TSG.2015.2432013
    [38] Deng R L, Zhuang P, Liang H.CCPA:coordinated cyber-physical attacks and countermeasures in smart grid.IEEE Transactions on Smart Grid, 2017, 8(5):2420-2430 doi: 10.1109/TSG.2017.2702125
    [39] Bo Z Q, Lin X N, Wang Q P, Yi Y H, Zhou F Q.Developments of power system protection and control.Protection and Control of Modern Power Systems, 2016, 1:Article No.7 doi: 10.1186/s41601-016-0012-2
    [40] Smart Grid Interoperability Panel Cyber Security Working Group.Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security.Technical Standard, NIST Special Publication, 2010, 154
    [41] Hu Z S, Wang Y, Tian X X, Yang X L, Meng D J, Fan R S.False data injection attacks identification for smart grids.In:Proceedings of the 3rd International Conference on Technological Advances in Electrical, Electronics and Computer Engineering.Beirut, Lebanon:IEEE, 2015.139-143
    [42] Bobba R B, Rogers K M, Wang Q Y, Khurana H, Nahrstedt K, Overbye T J.Detecting false data injection attacks on DC state estimation.In:Proceedings of the 1st Workshop on Secure Control Systems.Urbana-Champaign, USA, 2010.1-9
    [43] Chakhchoukh Y, Ishii H.Enhancing robustness to cyber-attacks in power systems through multiple least trimmed squares state estimations.IEEE Transactions on Power Systems, 2016, 31(6):4395-4405 doi: 10.1109/TPWRS.2015.2503736
    [44] Gu Y, Liu T, Wang D, Guan X H, Xu Z B.Bad data detection method for smart grids based on distributed state estimation.In:Proceedings of the 2013 IEEE International Conference on Communications.Budapest, Hungary:IEEE, 2013.4483-4487
    [45] Wang D, Guan X H, Liu T, Gu Y, Shen C, Xu Z B.Extended distributed state estimation:a detection method against tolerable false data injection attacks in smart grids.Energies, 2014, 7(3):1517-1538 doi: 10.3390/en7031517
    [46] Zhao J B, Zhang G X, La Scala M, Dong Z Y, Chen C, Wang J H.Short-term state forecasting-aided method for detection of smart grid general false data injection attacks.IEEE Transactions on Smart Grid, 2017, 8(4):1580-1590 doi: 10.1109/TSG.2015.2492827
    [47] Li S, Yilmaz Y, Wang X D.Quickest detection of false data injection attack in wide-area smart grids.IEEE Transactions on Smart Grid, 2015, 6(6):2725-2735 doi: 10.1109/TSG.2014.2374577
    [48] Khalid H M, Peng J C H.Immunity toward data-injection attacks using multisensor track fusion-based model prediction.IEEE Transactions on Smart Grid, 2017, 8(2):697707 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=08222785e4546cb340e870dcf1295755
    [49] He Y B, Mendis G J, Wei J.Real-time detection of false data injection attacks in smart grid:a deep learning-based intelligent mechanism.IEEE Transactions on Smart Grid, 2017, 8(5):2505-2516 doi: 10.1109/TSG.2017.2703842
    [50] Ozay M, Esnaola I, Tunay F, Vural Y, Kulkarni S R, Poor H V.Machine learning methods for attack detection in the smart grid.IEEE Transactions on Neural Networks and Learning Systems, 2016, 27(8):1773-1786 doi: 10.1109/TNNLS.2015.2404803
    [51] Liu X, Li Z, Member S, Li Z, Member S.Optimal protection strategy against false data injection attacks in power systems.IEEE Transactions on Smart Grid, 2017, 8(4):18021810 doi: 10.1109/TSG.2015.2508449
    [52] Mishra S, Li X, Pan T Y, Kuhnle A, Thai M T, Seo J.Price modification attack and protection scheme in smart grid.IEEE Transactions on Smart Grid, 2017, 8(4):1864-1875 doi: 10.1109/TSG.2015.2509945
    [53] Sanjab A, Saad W.Data injection attacks on smart grids with multiple adversaries:a game-theoretic perspective.IEEE Transactions on Smart Grid, 2016, 7(4):2038-2049 doi: 10.1109/TSG.2016.2550218
    [54] Wei L F, Sarwat A I, Saad W, Biswas S.Stochastic games for power grid protection against coordinated cyber-physical attacks.IEEE Transactions on Smart Grid, 2018, 9(2):684694 doi: 10.1109/TSG.2016.2561266
    [55] Ma C Y T, Yau D K Y, Lou X, Rao N S V.Markov game analysis for attack-defense of power networks under possible misinformation.IEEE Transactions on Power Systems, 2013, 28(2):1676-1686 doi: 10.1109/TPWRS.2012.2226480
    [56] Wang C, Hou Y H, Ten C W.Determination of Nash Equilibrium based on plausible attack-defense dynamics.IEEE Transactions on Power Systems, 2017, 32(5):3670-3680 doi: 10.1109/TPWRS.2016.2635156
    [57] 汤奕, 王琦, 邰伟, 陈彬, 倪明.基于OPAL-RT和OPNET的电力信息物理系统实时仿真.电力系统自动化, 2016, 40(23):1521, 92 doi: 10.7500/AEPS20160515020

    Tang Yi, Wang Qi, Tai Wei, Chen Bin, Ni Ming.Real-time simulation of cyber-physical power system based on OPAL-RT and OPNET.Automation of Electric Power Systems, 2016, 40(23):15-21, 92 doi: 10.7500/AEPS20160515020
    [58] 王云, 刘东, 翁嘉明, 严光升, 雍军, 戴晖.电网信息物理系统建模与仿真验证平台研究.中国电机工程学报, 2018, 38(1):130-136 http://epub.cnki.net/grid2008/detail.aspx?filename=ZGDC201801012&dbname=DKFX2018

    Wang Yun, Liu Dong, Weng Jia-Ming, Yan Guang-Sheng, Yong Jun, Dai Hui.The research of power CPS modeling and simulation verification platform.Proceedings of the CSEE, 2018, 38(1):130-136 http://epub.cnki.net/grid2008/detail.aspx?filename=ZGDC201801012&dbname=DKFX2018
    [59] 李霞, 李勇, 曹一家, 施星宇.基于信息物理系统融合的广域互联电网阻尼控制策略.电力系统保护与控制, 2017, 45(21):35-42 doi: 10.7667/PSPC161610

    Li Xia, Li Yong, Cao Yi-Jia, Shi Xing-Yu.Wide-area damping control strategy of interconnected power grid based on cyber physical system.Power System Protection and Control, 2017, 45(21):35-42 doi: 10.7667/PSPC161610
    [60] 张志鹏, 李勇, 曹一家, 施星宇, 胡伟, 赵庆周.通信和电网联合仿真的配电网局部异常因子故障辨识算法.电力系统自动化, 2016, 40(17):44-50 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201617007

    Zhang Zhi-Peng, Li Yong, Cao Yi-Jia, Shi Xing-Yu, Hu Wei, Zhao Qing-Zhou.A local outlier factor fault identification algorithm based on the co-simulation between cyber and power system for distribution network.Automation of Electric Power Systems, 2016, 40(17):44-50 http://d.old.wanfangdata.com.cn/Periodical/dlxtzdh201617007
    [61] Pan K K, Teixeira A, López C D, Palensky P.Co-simulation for cyber security analysis:data attacks against energy management system.In:Proceedings of the 2007 IEEE International Conference on Smart Grid Communications.Dresden, Germany:IEEE, 2017.253-258
    [62] Lin H, Deng Y, Shukla S, Thorp J, Mili L.Cyber security impacts on all-PMU state estimator-a case study on co-simulation platform GECO.In:Proceedings of the 3rd IEEE International Conference on Smart Grid Communications.Tainan, China:IEEE, 2012.587-592
    [63] Cao Y J, Shi X Y, Li Y, Tan Y, Shahidehpour M, Shi S L.A simplified co-simulation model for investigating impacts of cyber-contingency on power system operations.IEEE Transactions on Smart Grid, 2018, 9(5):4893-4905 doi: 10.1109/TSG.2017.2675362
    [64] Sadi M A H, Ali M H, Dasgupta D, Abercrombie R K, Kher S.Co-simulation platform for characterizing cyber attacks in cyber physical systems.In:Proceedings of the 2015 IEEE Symposium Series on Computational Intelligence.Cape Town, South Africa:IEEE, 2015.1244-1251
    [65] Adhikari U, Morris T, Pan S Y.WAMS cyber-physical test bed for power system, cybersecurity study, and data mining.IEEE Transactions on Smart Grid, 2017, 8(6):2744-2753 doi: 10.1109/TSG.2016.2537210
    [66] Tang Y, Tai W, Liu Z J, Li M Y, Wang Q, Liang Y, et al.A hardware-in-the-loop based co-simulation platform of cyber-physical power systems for wide area protection applications.Applied Sciences, 2017, 7(12):Article No.1279 doi: 10.3390/app7121279
    [67] 贾驰千, 冯冬芹.基于多目标决策的工控系统设备安全评估方法研究.自动化学报, 2016, 42(5):706-714 http://www.aas.net.cn/CN/abstract/abstract18860.shtml

    Jia Chi-Qian, Feng Dong-Qin.Industrial control system devices security assessment with multi-objective decision.Acta Automatica Sinica, 2016, 42(5):706-714 http://www.aas.net.cn/CN/abstract/abstract18860.shtml
  • 加载中
图(6) / 表(1)
计量
  • 文章访问数:  2495
  • HTML全文浏览量:  1117
  • PDF下载量:  1541
  • 被引次数: 0
出版历程
  • 收稿日期:  2018-05-30
  • 录用日期:  2018-09-05
  • 刊出日期:  2019-01-20

目录

    /

    返回文章
    返回