用户名: 密码: 验证码:
目标冲突下电力信息物理协同攻击分析
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Analysis of Electrical Coordinated Cyber Physical Attacks Under Goal Conflict
  • 作者:田猛 ; 董政呈 ; 王先培 ; 赵乐 ; 简子倪
  • 英文作者:TIAN Meng;DONG Zhengcheng;WANG Xianpei;ZHAO Le;JIAN Zini;Electronic Information School, Wuhan University;School of Electrical Engineering and Automation, Wuhan University;
  • 关键词:智能电网 ; 电力信息物理协同攻击 ; 双层规划 ; KKT条件 ; 脆弱性
  • 英文关键词:smart grid;;CCPA;;bi-level programming;;KKT conditions;;vulnerability
  • 中文刊名:DWJS
  • 英文刊名:Power System Technology
  • 机构:武汉大学电子信息学院;武汉大学电气与自动化学院;
  • 出版日期:2019-07-05
  • 出版单位:电网技术
  • 年:2019
  • 期:v.43;No.428
  • 基金:国家自然科学基金项目(51707135,51807143);; 中央高校基本科研业务费专项资金项目(2042017kf0037)~~
  • 语种:中文;
  • 页:DWJS201907015
  • 页数:9
  • CN:07
  • ISSN:11-2410/TM
  • 分类号:119-127
摘要
电力信息物理协同攻击(coordinated cyber physicalattack,CCPA)是智能电网面临的新型网络攻击之一,攻击者和调度中心目标分别为最大化和最小化攻击效果,两者目标相互冲突。以直流潮流模型为基础,首先建立基于虚假数据攻击的电力信息物理协同攻击数学表达式,用于表征量测单元中注入的虚假数据、攻击前后电力系统拓扑和电气参数之间的关系。然后,考虑攻击者的目标在于最大化攻击破坏效果,基于双层规划理论建立考虑攻击者和调度中心交互关系的电力信息物理协同攻击分析模型。最后,采用KKT(Karush-Kuhn-Tucker)条件和Fortuny-Amat-McCarl方法,将双层规划模型转化为单层混合整数线性规划模型。以IEEE14节点测试系统为例,仿真结果表明,电力信息物理协同攻击通过在量测单元中注入虚假数据重新分配母线负荷,并倾向于增加负荷需求较大的母线负荷,造成切负荷,最终影响电力系统的运行状态。与负荷重分配攻击和物理攻击相比,电力信息物理协同攻击不仅可以增加发电机出力成本和切负荷损失,而且可能导致更多线路过载。同时,量测单元在双层规划模型解中出现的次数可以表征该量测单元的脆弱程度,出现次数越多,则该节点越脆弱。
        Electrical coordinated cyber physical attack(CCPA) is one of the emerging cyber attacks in smart grid. The goals of attackers and dispatch centers are to maximize and minimize destructive consequences, respectively, conflicting with each other. Based on DC power flow model, a mathematical formulation of false data injection attack-based CCPAs is built to express the relationship among false data injected to measurement unit, topology and electric parameters before and after attacks. Furthermore, because the attackers' objective is to maximize the damages of power system, a bi-level programming model of CCPAs is proposed to express the interaction between attackers and control center. Finally, the bi-level model is transformed to a single-level mixed integer linear programming problem using KKT(Karush–Kuhn–Tucker) conditions and Fortuny-Amat-McCarl method. The results of the bi-level model are demonstrated in IEEE 14-bus system, showing that the CCPAs redistribute loads in some buses by injecting false data to measurement unit and tend to increase loads in the buses with larger load demands, causing load shedding and affecting power system operation. Compared with load redistribution attacks and physical attacks, CCPAs increase generation cost and load shedding losses, and possibly cause more lines overloaded. Moreover, it is found out that the number of bi-level programming models containing specific measurement unit can reflect vulnerability of the unit, namely, the larger the number is, the more vulnerable the specific measurement unit will be.
引文
[1]董朝阳,赵俊华,文福拴,等.从智能电网到能源互联网:基本概念与研究框架[J].电力系统自动化,2014,38(15):1-11.Dong Zhaoyang,Zhao Junhua,Wen Fushuan,et al.From smart grid to energy internet:basic concept and research framework[J].Automation of Electric Power System,2014,38(15):1-11(in Chinese).
    [2]He H,Yan J.Cyber-physical attacks and defences in the smart grid:a survey[J].IET Cyber-Physical Systems:Theory&Applications,2016,1(1):13-27.
    [3]陈来军,梅生伟,陈颖.智能电网信息安全及其对电力系统生存性的影响[J].控制理论与应用,2012,29(2):240-244.Chen Laijun,Mei Shengwei,Chen Ying.Smart grid information security and its influence on power system survivability[J].Control Theory&Applications,2012,29(2):240-244(in Chinese).
    [4]汤奕,陈倩,李梦雅,等.电力信息物理融合系统环境中的网络攻击研究综述[J].电力系统自动化,2016,40(17):59-69.Tang Yi,Chen Qian,Li Mengya,et al.Overview on cyber-attacks against cyber physical power system[J].Automation of Electric Power System,2016,40(17):59-69(in Chinese).
    [5]Ma C Y T,Yau D K Y,Rao N S V.Scalable solutions of markov games for smart-grid infrastructure protection[J].IEEE Transactions on Smart Grid,2013,4(1):47-55.
    [6]Conti M,Dragoni N,Lesyk V.A survey of man in the middle attacks[J].IEEE Communications Surveys&Tutorials,2016,18(3):2027-2051.
    [7]李青芯,孙宏斌,盛同天,等.变电站状态估计中互感器虚假数据注入攻击分析[J].电力系统自动化,2016,40(17):79-86.Li Qingxin,Sun Hongbin,Sheng Tongtian,et al.Injection attack analysis of transformer false data in substation state estimate[J].Automation of Electric Power System,2016,40(17):79-86(in Chinese).
    [8]刘念,余星火,张建华.网络协同攻击:乌克兰停电事件的推演与启示[J].电力系统自动化,2016,40(6):1-4.Liu Nian,Yu Xinghuo,Zhang Jianhua.Coordinated cyber-attacks:inference and thinking of incidenton Ukrainian power grid[J].Automation of Electric Power System,2016,40(6):1-4(in Chinese).
    [9]Deng R,Zhuang P,Liang H.CCPA:coordinated cyber-physical attacks and countermeasures in Smart Grid[J].IEEE Transactions on Smart Grid,2017,8(5):2420-2430.
    [10]Li Z,Shahidehpour M,Alabdulwahab A,et al.Bilevel model for analyzing coordinated cyber-physical attacks on power systems[J].IEEE Transactions on Smart Grid,2016,7(5):2260-2272.
    [11]Li Z,Shahidehpour M,Abdulwhab A,et al.Analyzing locally coordinated cyber-physical at-tacks for undetectable line outages[J].IEEE Transactions on Smart Grid,2018,9(1):35-47.
    [12]Xiang Y,Wang L,Liu N.Coordinated attacks on electric power systems in a cyber-physical environment[J].Electric Power Systems Research,2017,149:156-168.
    [13]Liu X,Li Z,Liu X,et al.Masking transmission line outages via false data injection attacks[J].IEEE Transactions on Information Forensics and Security,2016,11(7):1592-1602.
    [14]Wei L,Sarwat A,Saad W,et al.Stochastic games for power grid protection against coordinated cyber-physical attacks[J].IEEETransactions on Smart Grid,2018,9(2):684-694.
    [15]Stephan D,Vyacheslav K,Gerardo A P,et al.Bilevel programming problems:theory,algorithms and applications to energy networks[M].New York:Springer,2015.
    [16]Ali A,Antonio G E.Power system state estimation theory and implementation[M].New York:Marcel Dekker,Inc.2004.
    [17]Liu Y,Ning P,Reiter M K.False data injection attacks against state estimation in electric power grids[J].ACM Transactions on Information and System Security,2011,14(1):1-33.
    [18]Kim J,Tong L.On topology attack of a smart grid:undetectable attacks and countermeasures[J].IEEE Journal on Selected Areas in Communications,2013,31(7):1294-1305.
    [19]Yuan Y,Li Z,Ren K.Modeling load redistribution attacks in power systems[J].IEEE Transactions on Smart Grid,2011,2(2):382-390.
    [20]Lu J,Han J,Hu Y,et al.Multilevel decision-making:a survey[J].Information Sciences,2016,346:463-487.
    [21]Wood A J,Wollenberg B F.Power generation,operation,and control[M].John Wiley&Sons,2012.
    [22]Arroyo J M,Galiana F D.On the solution of the bilevel programming formulation of the terrorist threat problem[J].IEEE Transactions on Power Systems,2005,20(2):789-797.
    [23]Eppstein M J,Hines P D H.A“random chemistry”algorithm for identifying collections of multiple contingencies that initiate cascading failure[J].IEEE Transactions on Power Systems,2012,27(3):1698-1705.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700