Cyber-attack Detection Strategy Based on Distribution System State Estimation

被引:0
|
作者
Huan Long [1 ,2 ]
Zhi Wu [1 ,2 ]
Chen Fang [3 ]
Wei Gu [1 ,2 ]
Xinchi Wei [3 ]
Huiyu Zhan [4 ]
机构
[1] IEEE
[2] School of Electrical Engineering, Southeast University
[3] State Grid Shanghai Electric Power Company,Electric Power Research Institute
[4] China Electric Power Research Institute
关键词
D O I
暂无
中图分类号
TM73 [电力系统的调度、管理、通信];
学科分类号
080802 ;
摘要
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system. This paper proposes a cyber-attack detection strategy based on distribution system state estimation(DSSE). The uncertainty of the distribution network is represented by the interval of each state variable. A three-phase interval DSSE model is proposed to construct the interval of each state variable. An improved iterative algorithm(IIA) is developed to solve the interval DSSE model and to obtain the lower and upper bounds of the interval. A cyber-attack is detected when the value of the state variable estimated by the traditional DSSE is out of the corresponding interval determined by the interval DSSE. To validate the proposed cyber-attack detection strategy, the basic principle of the cyber-attack is studied, and its general model is formulated. The proposed cyber-attack model and detection strategy are conducted on the IEEE 33-bus and 123-bus systems. Comparative experiments of the proposed IIA, Monte Carlo simulation algorithm, and interval Gauss elimination algorithm prove the validation of the proposed method.
引用
收藏
页码:669 / 678
页数:10
相关论文
共 50 条
  • [1] Cyber-attack Detection Strategy Based on Distribution System State Estimation
    Long, Huan
    Wu, Zhi
    Fang, Chen
    Gu, Wei
    Wei, Xinchi
    Zhan, Huiyu
    [J]. JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2020, 8 (04) : 669 - 678
  • [2] Multi-Agent-Based Fault Location and Cyber-Attack Detection in Distribution System
    Albarakati, Aiman J.
    Azeroual, Mohamed
    Boujoudar, Younes
    EL Iysaouy, Lahcen
    Aljarbouh, Ayman
    Tassaddiq, Asifa
    EL Markhi, Hassane
    [J]. ENERGIES, 2023, 16 (01)
  • [3] A Stealth Cyber-Attack Detection Strategy for DC Microgrids
    Sahoo, Subham
    Mishra, Sukumar
    Peng, Jimmy Chih-Hsien
    Dragicevic, Tomislav
    [J]. IEEE TRANSACTIONS ON POWER ELECTRONICS, 2019, 34 (08) : 8162 - 8174
  • [4] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [5] Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation
    Dong Zhang
    Chen Lv
    Tianci Yang
    Peng Hang
    [J]. Automotive Innovation, 2021, 4 : 262 - 273
  • [6] Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation
    Zhang, Dong
    Lv, Chen
    Yang, Tianci
    Hang, Peng
    [J]. AUTOMOTIVE INNOVATION, 2021, 4 (03) : 262 - 273
  • [7] A Flow Attack Strategy based on Critical Links for Cyber-attack
    Qi, Jiming
    Zhang, Jiazheng
    Liu, Qingxia
    Wang, Bang
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
  • [8] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    [J]. 系统仿真技术, 2017, 13 (02) : 90 - 104
  • [9] Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link
    Wang, Lei
    Xu, Pengcheng
    Qu, Zhaoyang
    Bo, Xiaoyong
    Dong, Yunchang
    Zhang, Zhenming
    Li, Yang
    [J]. FRONTIERS IN ENERGY RESEARCH, 2021, 9
  • [10] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280