面向电力信息物理系统的虚假数据注入攻击研究综述
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A Review on False Data Injection Attack Toward Cyber-physical Power System
  • 作者:王琦 ; 邰伟 ; 汤奕 ; 倪明
  • 英文作者:WANG Qi;TAI Wei;TANG Yi;NI Ming;School of Electrical Engineering,Southeast University;NARI Group Corporation (State Grid Electric Power Research Institute);NARI Technology Co. Ltd.;State Key Laboratory of Smart Grid Protection and Control;
  • 关键词:信息物理系统 ; 虚假数据注入 ; 安全监控 ; 联合仿真
  • 英文关键词:Cyber physical system(CPS);;false data injection;;security supervisory and control;;co-simulation
  • 中文刊名:MOTO
  • 英文刊名:Acta Automatica Sinica
  • 机构:东南大学电气工程学院;南瑞集团(国网电力科学研究院)有限公司;国电南瑞科技股份有限公司;智能电网保护和运行控制国家重点实验室;
  • 出版日期:2018-11-21 10:46
  • 出版单位:自动化学报
  • 年:2019
  • 期:v.45
  • 基金:国家重点研究发展计划(2017YFB0903000);; 国家自然科学基金(51577030,51707032);; 国家电网公司总部科技项目(针对网络攻击的电网信息物理系统协同运行态势感知与主动防御方法研究)资助~~
  • 语种:中文;
  • 页:MOTO201901006
  • 页数:12
  • CN:01
  • ISSN:11-2109/TP
  • 分类号:74-85
摘要
随着电力信息通信技术的发展与应用,电力流与信息流深度融合,共同实现对系统的全景状态感知与控制决策,电力系统转变成典型的信息物理系统(Cyber physical system, CPS).开放的通信环境与复杂的信息物理耦合交互过程,使得信息安全风险成为影响电力系统安全稳定运行的重要因素.其中,虚假数据注入攻击(False data injection attack, FDIA)通过破坏网络数据完整性以干扰控制决策,是一种典型的网络攻击方式.本文针对面向电力CPS的虚假数据注入的攻击过程和防御手段进行了分析与总结.从攻击者视角分析了FDIA的攻击目标、策略及后果;从防御者视角总结了保护与检测环节中的各类方法;最后基于联合仿真技术,提出了针对虚假数据攻防过程建模和评估的电力CPS联合攻防平台.
        With the development and application of information communication technology, the power flow and the information flow are becoming deeply integrated in order to achieve panoramic state awareness and control decision. Therefore the power system has been transformed into a typical cyber-physical system(CPS). Considering the open communication environment and complex cyber physical coupling mechanism, the information risk has become an important issue posing severe threats to the secure operation of power systems. False data injection attack(FDIA), as a typical attack mode destroying data integrity, can interfere with the control decision. In this paper, the attack process and defense method of false data injection are analyzed and summarized. Firstly, from the perspective of attackers, the goals, strategies and consequences of FDIA are comprehensively discussed. Then, from the perspective of defenders, the protection and detection countermeasures are discussed. Finally the co-simulation technology is utilized to construct associated attack-defense platform of cyber-physical power system(CPPS), which is aimed at modeling and assessment of the attack and defense processes of false data injection.
引文
1 Zhao Jun-Hua,Wen Fu-Shuan,Xue Yu-Sheng,Li Xue,Dong Zhao-Yang.Cyber physical power systems:architecture,implementation techniques and challenges.Automation of Electric Power Systems,2010,34(16):1-7(赵俊华,文福拴,薛禹胜,李雪,董朝阳.电力CPS的架构及其实现技术与挑战.电力系统自动化,2010,34(16):1-7)
    2 Ma Zhao,Zhou Xiao-Xin,Shang Yu-Wei,Sheng Wan-Xing.Exploring the concept,key technologies and development model of energy internet.Power System Technology,2015,39(11):3014-3022(马钊,周孝信,尚宇炜,盛万兴.能源互联网概念、关键技术及发展模式探索.电网技术,2015,39(11):3014-3022)
    3 Mo Y L,Kim T H J,Brancik K,Dickinson D,Lee H,Perrig A,et al.Cyber-physical security of a smart grid infrastructure.Proceedings of the IEEE,2012,100(1):195-209
    4 He H B,Yan J.Cyber-physical attacks and defences in the smart grid:a survey.IET Cyber-Physical Systems:Theory and Applications,2016,1(1):13-27
    5 Liu Dong,Sheng Wan-Xing,Wang Yun,Lu Yi-Ming,Sun Chen.Key technologies and trends of cyber physical system for power grid.Proceedings of the CSEE,2015,35(14):3522-3531(刘东,盛万兴,王云,陆一鸣,孙辰.电网信息物理系统的关键技术及其进展.中国电机工程学报,2015,35(14):3522-3531)
    6 Vellaithurai C,Srivastava A,Zonouz S,Berthier R.CPIndex:cyber-physical vulnerability assessment for power-grid infrastructures.IEEE Transactions on Smart Grid,2015,6(2):566-575
    7 Wang W Y,Lu Z.Cyber security in the smart grid:survey and challenges.Computer Networks,2013,57(5):1344-1371
    8 Miao Xin,Zhang Kai,Tian Shi-Ming,Li Jian-Qi,Yin Shu-Gang,Zhao Zi-Yan.Information communication system supporting smart grid.Power System Technology,2009,33(17):8-13(苗新,张恺,田世明,李建歧,殷树刚,赵子岩.支撑智能电网的信息通信体系.电网技术,2009,33(17):8-13)
    9 Liu S,Mashayekh S,Kundur D,Zourntos T,Butler-Purry K.A framework for modeling cyber-physical switching attacks in smart grid.IEEE Transactions on Emerging Topics in Computing,2013,1(2):273-285
    10 Ye Xia-Ming,Wen Fu-Shuan,Shang Jin-Cheng,He Yang.Propagation mechanism of cyber physical security risks in power systems.Power System Technology,2015,39(11):3072-3079(叶夏明,文福拴,尚金成,何洋.电力系统中信息物理安全风险传播机制.电网技术,2015,39(11):3072-3079)
    11 Hahn A,Govindarasu M.Cyber attack exposure evaluation framework for the smart grid.IEEE Transactions on Smart Grid,2011,2(4):835-843
    12 Tian Ji-Wei,Wang Bu-Hong,Li Xia.State-preserving topology attacks and its impact on economic operation of smart grid.Power System Protection and Control,2018,46(1):50-56(田继伟,王布宏,李夏.智能电网状态维持拓扑攻击及其对经济运行的影响.电力系统保护与控制,2018,46(1):50-56)
    13 Tang Yi,Chen Qian,Li Meng-Ya,Wang Qi,Ni Ming,Liang Yun.Overview on cyber-attacks against cyber physical power system.Automation of Electric Power Systems,2016,40(17):59-69(汤奕,陈倩,李梦雅,王琦,倪明,梁云.电力信息物理融合系统环境中的网络攻击研究综述.电力系统自动化,2016,40(17):59-69)
    14 Liang G Q,Weller S R,Zhao J H,Luo F J,Dong Z Y.The2015 Ukraine blackout:implications for false data injection attacks.IEEE Transactions on Power Systems,2017,32(4):3317-3318
    15 Li Zhong-Wei,Tong Wei-Ming,Jin Xian-Ji.Construction of cyber security defense hierarchy and cyber security testing system of smart grid:thinking and enlightenment for network attack events to national power grid of Ukraine and Israel.Automation of Electric Power Systems,2016,40(8):147-151(李中伟,佟为明,金显吉.智能电网信息安全防御体系与信息安全测试系统构建:乌克兰和以色列国家电网遭受网络攻击事件的思考与启示.电力系统自动化,2016,40(8):147-151)
    16 Zhao Jun-Hua,Liang Gao-Qi,Wen Fu-Shuan,Dong ZhaoYang.Lessons learnt from Ukrainian blackout:protecting power grids against false data injection attacks.Automation of Electric Power Systems,2016,40(7):149-151(赵俊华,梁高琪,文福拴,董朝阳.乌克兰事件的启示:防范针对电网的虚假数据注入攻击.电力系统自动化,2016,40(7):149-151)
    17 Ni Ming,Yan Jie,Bo Rui,Tang Yi.Power system cyber attack and its defense.Automation of Electric Power Systems,2016,40(5):148-151(倪明,颜诘,柏瑞,汤奕.电力系统防恶意信息攻击的思考.电力系统自动化,2016,40(5):148-151)
    18 Wei Zhi-Nong,Chen He-Sheng,Ni Ming,Sun Guo-Qiang,Sun Yong-Hui,Li Chao.Definition,construction and defense of false data in cyber physical system.Automation of Electric Power Systems,2016,40(17):70-78(卫志农,陈和升,倪明,孙国强,孙永辉,厉超.电力信息物理系统中恶性数据定义、构建与防御挑战.电力系统自动化,2016,40(17):70-78)
    19 Tang Yi,Wang Qi,Ni Ming,Liang Yun.Analysis of cyber attacks in cyber physical power system.Automation of Electric Power Systems,2016,40(6):148-151(汤奕,王琦,倪明,梁云.电力信息物理融合系统中的网络攻击分析.电力系统自动化,2016,40(6):148-151)
    20 Zhu Jie,Zhang Ge-Xiang,Wang Tao,Zhao Jun-Bo.Overview of fraudulent data attack on power system state estimation and defense mechanism.Power System Technology,2016,40(8):2406-2415(朱杰,张葛祥,王涛,赵俊博.电力系统状态估计欺诈性数据攻击及防御综述.电网技术,2016,40(8):2406-2415)
    21 Fan Y W,Zhang Z H,Trinkle M,Dimitrovski A D,Song J B,Li H S.A cross-layer defense mechanism against GPSspoofing attacks on PMUs in smart Grids.IEEE Transactions on Smart Grid,2015,6(6):2659-2668
    22 Liu X X,Zhu P D,Zhang Y,Chen K.A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure.IEEE Transactions on Smart Grid,2015,6(5):2435-2443
    23 Bishop A N,Savkin A V.On false-data attacks in robust multi-sensor-based estimation.In:Proceedings of the 9th IEEE International Conference on Control and Automation.Santiago,Chile:IEEE,2011.10-17
    24 Pal S,Sikdar B,Chow J H.An online mechanism for detection of gray-hole attacks on PMU data.IEEE Transactions on Smart Grid,2018,9(4):2498-2507
    25 Ji Xing-Pei,Wang Bo,Dong Zhao-Yang,Chen Guo,Liu Di-Chen,Wei Da-Qian,et al.Vulnerability evaluation and link addition protection strategy research of electrical cyberphysical interdependent networks.Power System Technology,2016,40(6):1867-1873(冀星沛,王波,董朝阳,陈果,刘涤尘,魏大千,等.电力信息-物理相互依存网络脆弱性评估及加边保护策略.电网技术,2016,40(6):1867-1873)
    26 Li Qiang,Zhou Jing-Yang,Yu Er-Keng,Liu Shu-Chun,Wang Lei.Hybrid algorithm for power system state estimation based on PMU measurement and SCADA measurement.Automation of Electric Power Systems,2005,29(19):31-35(李强,周京阳,于尔铿,刘树春,王磊.基于混合量测的电力系统状态估计混合算法.电力系统自动化,2005,29(19):31-35)
    27 Mo Y L,Sinopoli B.False data injection attacks in control systems.In:Proceedings of the 1st Workshop on Secure Control Systems.Stockholm,Sweden:Springer,2010.
    28 Wang Yu-Fei,Gao Kun-Lun,Zhao Ting,Qiu Jian.Assessing the harmfulness of cascading failures across space in electric cyber-physical system based on improved attack graph.Proceedings of the CSEE,2016,36(6):1490-1499(王宇飞,高昆仑,赵婷,邱健.基于改进攻击图的电力信息物理系统跨空间连锁故障危害评估.中国电机工程学报,2016,36(6):1490-1499)
    29 Tian Meng,Wang Xian-Pei,Dong Zheng-Cheng,Zhu GuoWei,Dai Dang-Dang,Zhao Le.Injected attack strategy for false data based on Lagrange multipliers method.Automation of Electric Power Systems,2017,41(11):26-32(田猛,王先培,董政呈,朱国威,代荡荡,赵乐.基于拉格朗日乘子法的虚假数据攻击策略.电力系统自动化,2017,41(11):26-32)
    30 Su Sheng,Wu Chang-Jiang,Ma Jun,Zeng Xiang-Jun.Attacker s perspective based analysis on cyber attack mode to cyber-physical system.Power System Technology,2014,38(11):3115-3120(苏盛,吴长江,马钧,曾祥君.基于攻击方视角的电力CPS网络攻击模式分析.电网技术,2014,38(11):3115-3120)
    31 Zhu Ze-Lei,Zhou Jing-Yang,Pan Yi,Yan Cui-Hui,Cui Hui,Li Wei-Gang.Security constrained economic dispatch considering balance of electric power and energy.Proceedings of the CSEE,2013,33(10):168-176(朱泽磊,周京阳,潘毅,闫翠会,崔晖,李伟刚.考虑电力电量平衡的安全约束经济调度.中国电机工程学报,2013,33(10):168-176)
    32 Xie L,Mo Y L,Sinopoli B.Integrity data attacks in power market operations.IEEE Transactions on Smart Grid,2011,2(4):659-666
    33 Jia L Y,Kim J,Thomas R J,Tong L.Impact of data quality on real-time locational marginal price.IEEE Transactions on Power Systems,2014,29(2):627-636
    34 Mousavian S,Valenzuela J,Wang J H.A probabilistic risk mitigation model for cyber-attacks to PMU networks.IEEETransactions on Power Systems,2015,30(1):156-165
    35 Zhao J B,Zhang G X,La Scala M,Wang Z Y.Enhanced robustness of state estimator to bad data processing through multi-innovation analysis.IEEE Transactions on Industrial Informatics,2017,13(4):1610-1619
    36 Wang Xian-Pei,Zhu Guo-Wei,He Rui-Juan,Tian Meng,Dong Zheng-Cheng,Dai Dang-Dang,et al.Survey of cascading failures in cyber physical power system based on complex network theory.Power System Technology,2017,41(9):2947-2956(王先培,朱国威,贺瑞娟,田猛,董政呈,代荡荡,等.复杂网络理论在电力CPS连锁故障研究中的应用综述.电网技术,2017,41(9):2947-2956)
    37 Liu R,Vellaithurai C,Biswas S S,Gamage T T,Srivastava A K.Analyzing the cyber-physical impact of cyber events on the power grid.IEEE Transactions on Smart Grid,2015,6(5):2444-2453
    38 Deng R L,Zhuang P,Liang H.CCPA:coordinated cyberphysical attacks and countermeasures in smart grid.IEEETransactions on Smart Grid,2017,8(5):2420-2430
    39 Bo Z Q,Lin X N,Wang Q P,Yi Y H,Zhou F Q.Developments of power system protection and control.Protection and Control of Modern Power Systems,2016,1:Article No.7
    40 Smart Grid Interoperability Panel Cyber Security Working Group.Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security.Technical Standard,NIST Special Publication,2010,154
    41 Hu Z S,Wang Y,Tian X X,Yang X L,Meng D J,Fan R S.False data injection attacks identification for smart grids.In:Proceedings of the 3rd International Conference on Technological Advances in Electrical,Electronics and Computer Engineering.Beirut,Lebanon:IEEE,2015.139-143
    42 Bobba R B,Rogers K M,Wang Q Y,Khurana H,Nahrstedt K,Overbye T J.Detecting false data injection attacks on DC state estimation.In:Proceedings of the 1st Workshop on Secure Control Systems.Urbana-Champaign,USA,2010.1-9
    43 Chakhchoukh Y,Ishii H.Enhancing robustness to cyberattacks in power systems through multiple least trimmed squares state estimations.IEEE Transactions on Power Systems,2016,31(6):4395-4405
    44 Gu Y,Liu T,Wang D,Guan X H,Xu Z B.Bad data detection method for smart grids based on distributed state estimation.In:Proceedings of the 2013 IEEE International Conference on Communications.Budapest,Hungary:IEEE,2013.4483-4487
    45 Wang D,Guan X H,Liu T,Gu Y,Shen C,Xu Z B.Extended distributed state estimation:a detection method against tolerable false data injection attacks in smart grids.Energies,2014,7(3):1517-1538
    46 Zhao J B,Zhang G X,La Scala M,Dong Z Y,Chen C,Wang J H.Short-term state forecasting-aided method for detection of smart grid general false data injection attacks.IEEE Transactions on Smart Grid,2017,8(4):1580-1590
    47 Li S,Y?lmaz Y,Wang X D.Quickest detection of false data injection attack in wide-area smart grids.IEEE Transactions on Smart Grid,2015,6(6):2725-2735
    48 Khalid H M,Peng J C H.Immunity toward data-injection attacks using multisensor track fusion-based model prediction.IEEE Transactions on Smart Grid,2017,8(2):697-707
    49 He Y B,Mendis G J,Wei J.Real-time detection of false data injection attacks in smart grid:a deep learning-based intelligent mechanism.IEEE Transactions on Smart Grid,2017,8(5):2505-2516
    50 Ozay M,Esnaola I,Tunay F,Vural Y,Kulkarni S R,Poor H V.Machine learning methods for attack detection in the smart grid.IEEE Transactions on Neural Networks and Learning Systems,2016,27(8):1773-1786
    51 Liu X,Li Z,Member S,Li Z,Member S.Optimal protection strategy against false data injection attacks in power systems.IEEE Transactions on Smart Grid,2017,8(4):1802-1810
    52 Mishra S,Li X,Pan T Y,Kuhnle A,Thai M T,Seo J.Price modification attack and protection scheme in smart grid.IEEE Transactions on Smart Grid,2017,8(4):1864-1875
    53 Sanjab A,Saad W.Data injection attacks on smart grids with multiple adversaries:a game-theoretic perspective.IEEE Transactions on Smart Grid,2016,7(4):2038-2049
    54 Wei L F,Sarwat A I,Saad W,Biswas S.Stochastic games for power grid protection against coordinated cyber-physical attacks.IEEE Transactions on Smart Grid,2018,9(2):684-694
    55 Ma C Y T,Yau D K Y,Lou X,Rao N S V.Markov game analysis for attack-defense of power networks under possible misinformation.IEEE Transactions on Power Systems,2013,28(2):1676-1686
    56 Wang C,Hou Y H,Ten C W.Determination of Nash Equilibrium based on plausible attack-defense dynamics.IEEETransactions on Power Systems,2017,32(5):3670-3680
    57 Tang Yi,Wang Qi,Tai Wei,Chen Bin,Ni Ming.Real-time simulation of cyber-physical power system based on OPAL-RT and OPNET.Automation of Electric Power Systems,2016,40(23):15-21,92(汤奕,王琦,邰伟,陈彬,倪明.基于OPAL-RT和OPNET的电力信息物理系统实时仿真.电力系统自动化,2016,40(23):15-21,92)
    58 Wang Yun,Liu Dong,Weng Jia-Ming,Yan Guang-Sheng,Yong Jun,Dai Hui.The research of power CPS modeling and simulation verification platform.Proceedings of the CSEE,2018,38(1):130-136(王云,刘东,翁嘉明,严光升,雍军,戴晖.电网信息物理系统建模与仿真验证平台研究.中国电机工程学报,2018,38(1):130-136)
    59 Li Xia,Li Yong,Cao Yi-Jia,Shi Xing-Yu.Wide-area damping control strategy of interconnected power grid based on cyber physical system.Power System Protection and Control,2017,45(21):35-42(李霞,李勇,曹一家,施星宇.基于信息物理系统融合的广域互联电网阻尼控制策略.电力系统保护与控制,2017,45(21):35-42)
    60 Zhang Zhi-Peng,Li Yong,Cao Yi-Jia,Shi Xing-Yu,Hu Wei,Zhao Qing-Zhou.A local outlier factor fault identification algorithm based on the co-simulation between cyber and power system for distribution network.Automation of Electric Power Systems,2016,40(17):44-50(张志鹏,李勇,曹一家,施星宇,胡伟,赵庆周.通信和电网联合仿真的配电网局部异常因子故障辨识算法.电力系统自动化,2016,40(17):44-50)
    61 Pan K K,Teixeira A,L′opez C D,Palensky P.Co-simulation for cyber security analysis:data attacks against energy management system.In:Proceedings of the 2007 IEEE International Conference on Smart Grid Communications.Dresden,Germany:IEEE,2017.253-258
    62 Lin H,Deng Y,Shukla S,Thorp J,Mili L.Cyber security impacts on all-PMU state estimator-a case study on co-simulation platform GECO.In:Proceedings of the 3rd IEEE International Conference on Smart Grid Communications.Tainan,China:IEEE,2012.587-592
    63 Cao Y J,Shi X Y,Li Y,Tan Y,Shahidehpour M,Shi S L.Asimplified co-simulation model for investigating impacts of cyber-contingency on power system operations.IEEE Transactions on Smart Grid,2018,9(5):4893-4905
    64 Sadi M A H,Ali M H,Dasgupta D,Abercrombie R K,Kher S.Co-simulation platform for characterizing cyber attacks in cyber physical systems.In:Proceedings of the2015 IEEE Symposium Series on Computational Intelligence.Cape Town,South Africa:IEEE,2015.1244-1251
    65 Adhikari U,Morris T,Pan S Y.WAMS cyber-physical test bed for power system,cybersecurity study,and data mining.IEEE Transactions on Smart Grid,2017,8(6):2744-2753
    66 Tang Y,Tai W,Liu Z J,Li M Y,Wang Q,Liang Y,et al.A hardware-in-the-loop based co-simulation platform of cyber-physical power systems for wide area protection applications.Applied Sciences,2017,7(12):Article No.1279
    67 Jia Chi-Qian,Feng Dong-Qin.Industrial control system devices security assessment with multi-objective decision.Acta Automatica Sinica,2016,42(5):706-714(贾驰千,冯冬芹.基于多目标决策的工控系统设备安全评估方法研究.自动化学报,2016,42(5):706-714)

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700