期刊文献+

基于虚假数据注入的发电厂汽轮机网络安全攻击研究 被引量:2

Research on False Data Injection Attack of Power Plant Steam Turbine
下载PDF
导出
摘要 近年来随着电力网络安全事件的频发和智慧能源技术的发展,电力系统及其控制系统正在面临越来越大的网络安全威胁。针对电力系统特别是电网的网络安全攻击中虚假数据注入攻击被认为是一种主要的攻击模式,在以往的研究中,网络安全攻击通常被认为是对控制系统的一种扰动。本文基于虚假数据注入攻击对以往研究较少的发电厂汽轮机网络安全攻击进行了分析和验证,验证了虚假数据注入攻击能够威胁发电厂汽轮机运行安全,同时提出了应将网络安全攻击视为对控制系统的输入而不是扰动这一观点。 In recent years,with the frequent occurrence of power network security incidents and the development of smart energy technology,power system and its control system are facing more and more network security threats.In the network security attacks of power system,especially power grid,the false data injection attack is considered as a main attack mode.In previous studies,the network security attack is usually considered as a disturbance to the control system.Based on the false data injection attack,this paper analyzes and verifies the network security attack of steam turbine in power plant which is less studied in the past,and erified that the false data injection attack can threaten the safety of steam turbine operation in power plant.An idea is proposed that network security attack is considered as input to control system rather than disturbance.
作者 袁晓舒 张愉菲 杨波 桑梓 谢云云 YUAN Xiaoshu;ZHANG Yufei;YANG Bo;SANG Zi;XIE Yunyun(DEC Academy of Science and Technology Co.,Ltd.,611731,Chengdu,China;Nanjing University of Science and Technology,210094,Nanjing,China)
出处 《东方电气评论》 2021年第3期17-24,共8页 Dongfang Electric Review
基金 四川省科技厅重点研发项目资助:汽轮机网络安全一体化保护系统关键技术研究与开发 项目编号:2019YFG0534。
关键词 虚假数据注入攻击 控制系统 网络安全 汽轮机 false data injection attack control system network security steam turbine
  • 相关文献

参考文献5

二级参考文献103

  • 1朱良根,张玉清,雷振甲.DoS攻击及其防范[J].计算机应用研究,2004,21(7):82-84. 被引量:20
  • 2尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 3李强,周京阳,于尔铿,刘树春,王磊.基于混合量测的电力系统状态估计混合算法[J].电力系统自动化,2005,29(19):31-35. 被引量:57
  • 4Rosinger C, Uslar M. Smart grid security: IEC 62351 and other relevant standards[M]. Berlin Heidelberg: Springer-Verlag, 2013: 129-146.
  • 5国家发展和改革委员会.电力监控系统安全防护规定[S]. http://www.sdpc.gov.cn/zctb/zcfol/201408/W020140814639049688238.pdf.
  • 6Liu Y, Ning P, Reiter M K. False data injection attacks against state estimation in electric power grids[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, Chicago : the 16th ACM Conference on Computer and Communications Security, 2009: 21-32.
  • 7Yuan Y, Li Z, Ren K. Modeling load redistribution attacks in power systems[J]. IEEE Transactions on Smart Grid, 2011, 2(2): 382-390.
  • 8Ancillotti E, Bruno R, Conti M. The role of communication systems in smart grids: architectures, technical solutions and research challenges[J]. Computer Communieations, 2013, 36(17718) : 1665-1697.
  • 9Liu Y, Ning P, Reiter M K. False data injection attacks against state estimation in electric power grids[J]. ACM Transactions on Information and System Security, 2011, 14(1): 1-33.
  • 10Hug G, Giampapa J A. Vulnerability assessment of AC stateestimation with respect to false data injection cyber-attacks[J]. IEEE Transactions on Smart Grid, 2012, 3(3): 1362-1370.

共引文献410

同被引文献22

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部