陈雄欣, 罗萍萍, 苑开波. 基于非凸矩阵分解的电网欺骗性数据注入攻击检测方法[J]. 现代电力, 2020, 37(3): 263-269. DOI: 10.19725/j.cnki.1007-2322.2019.0447
引用本文: 陈雄欣, 罗萍萍, 苑开波. 基于非凸矩阵分解的电网欺骗性数据注入攻击检测方法[J]. 现代电力, 2020, 37(3): 263-269. DOI: 10.19725/j.cnki.1007-2322.2019.0447
CHEN Xiongxin, LUO Pingping, YUAN Kaibo. Power System False Data Attack Detection Method Based on Nonconvex Matrix Decomposition[J]. Modern Electric Power, 2020, 37(3): 263-269. DOI: 10.19725/j.cnki.1007-2322.2019.0447
Citation: CHEN Xiongxin, LUO Pingping, YUAN Kaibo. Power System False Data Attack Detection Method Based on Nonconvex Matrix Decomposition[J]. Modern Electric Power, 2020, 37(3): 263-269. DOI: 10.19725/j.cnki.1007-2322.2019.0447

基于非凸矩阵分解的电网欺骗性数据注入攻击检测方法

Power System False Data Attack Detection Method Based on Nonconvex Matrix Decomposition

  • 摘要: 电力系统状态估计中的量测数据容易受到欺骗性数据注入攻击的恶意篡改,使状态估计的稳定性受到影响。根据量测数据在连续时间段内的低维特性以及欺骗性数据攻击的稀疏特性,提出了一种基于非凸矩阵分解的电网欺骗性数据注入攻击检测方法。首先,将欺骗性数据注入攻击的检测问题视为稀疏低秩矩阵分解问题,并将分解问题转化为非凸优化问题,通过改进的交替方向乘子法求解此非凸问题,将受攻击的数据矩阵分解为正常量测矩阵和攻击矩阵;其次,利用分解出的攻击矩阵检测出欺骗性数据注入攻击的数值和位置,并以分解出的正常量测矩阵作为参考量测量,进行状态估计获得正确的状态变量;最后,通过IEEE-14节点系统分析了不同攻击幅值下的检测结果,验证了所提方法的准确性。

     

    Abstract: The measurement data in the state estimation is vulnerable to malicious tampering by false data injection attacks, which reduces the reliability of the state estimation. Based on the low-dimension characteristics of measurement data and the sparse characteristics of data attacks, this paper proposed a method detecting power system false data attack by using nonconvex matrix decomposition. First, the false data injection attacks detection was regarded as a sparse and low-rank matrix decomposition problem and then transformed into a nonconvex optimization, which was solved by the improved alternating direction multiplier method. The normal measurement matrix and attack matrix were separated from the attacked data matrix. Then, the attack matrix was used to detect the value and location of the false data injection attacks, and the measurement matrix was used to obtain the correct state variables. Finally, the detection results of IEEE14-bus system were analyzed by different attack amplitudes and verified the accurateness of the proposed method.

     

/

返回文章
返回