基于检测约束的微电网虚假数据注入攻击策略
DOI:
CSTR:
作者:
作者单位:

华南理工大学电力学院 广州 510641

作者简介:

通讯作者:

中图分类号:

TM73; TN91

基金项目:

国家自然科学基金(52207106)、华南理工大学2024年“百步梯攀登计划”(j2tw202402115)项目资助


False data injection attacks strategy for microgrids based on detection constraints
Author:
Affiliation:

School of Electric Power Engineering,South China University of Technology,Guangzhou 510641,China

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    当前微电网频率控制系统的安全研究缺乏对强攻击场景的深入分析,尤其是在攻击者利用内部信息发起的高隐蔽性攻击下,系统脆弱性及其影响程度尚未得到充分评估。针对传统虚假数据注入攻击易被检测的问题,构建一种基于检测约束的微电网最优攻击策略,实现高隐蔽性强攻击。首先搭建了一个包含风光储的微电网频率控制模型,并对其通信层进行脆弱性分析,明确潜在的攻击路径。为考虑隐蔽性约束,通过引入松弛变量构建了可优化的攻击模型,将非线性优化问题转化为线性规划形式,实现快速求解并构建特定的攻击序列。最后在孤岛运行状态下的微电网中进行多次攻击测试,相比传统随机攻击方法,所提出的优化攻击序列在保持95%以上隐蔽性的同时,使攻击有效性提升了约40%。此外,分析了微电网关键系统参数、不同运行模式和可再生能源渗透率对最优攻击的影响。结果表明所提出的基于优化的攻击序列能够在保持攻击隐蔽性的同时,显著提升攻击的成功率和有效性,微电网系统面对精心设计的攻击时仍具有潜在脆弱性。

    Abstract:

    Existing security research on microgrid frequency control systems lacks a comprehensive analysis of severe attack scenarios, particularly high-concealment attacks executed by adversaries using internal information. The system vulnerabilities and the extent of their potential impact remain insufficiently assessed. This paper develops a load frequency control model of microgrid that incorporates wind, solar, and storage, and performs a vulnerability analysis of its communication layer to identify potential attack vectors. To address concealment constraints, an optimized attack model is formulated by introducing slack variables, which transforms the nonlinear optimization problem into a linear programming problem, enabling faster solutions and the generation of specific attack sequences. Finally, multiple attack tests are conducted on microgrids in islanded operation mode. Compared to traditional random attack methods, the proposed optimized attack sequence achieves approximately 40% improvement in attack effectiveness while maintaining over 95% stealth. The effects of key microgrid system parameters, different operation modes, and various renewable energy penetration rates on optimal attacks are analyzed. Results show that the proposed optimizationbased attack can significantly improve attack success rate and effectiveness while maintaining stealthy, indicating that microgrid systems remain potentially vulnerable to well-designed attacks.

    参考文献
    相似文献
    引证文献
引用本文

林鼎杰,夏候凯顺.基于检测约束的微电网虚假数据注入攻击策略[J].电子测量技术,2025,48(7):117-125

复制
相关视频

分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2025-05-12
  • 出版日期:
文章二维码