進階搜尋


下載電子全文  
系統識別號 U0026-2308201313583900
論文名稱(中文) 利用PCA近似法對智慧電網作假數據注入攻擊
論文名稱(英文) False Data Injection Attack Using PCA Approximation Method in Smart Grid
校院名稱 成功大學
系所名稱(中) 工程科學系碩博士班
系所名稱(英) Department of Engineering Science
學年度 101
學期 2
出版年 102
研究生(中文) 余宗翰
研究生(英文) Zong-Han Yu
學號 n96001070
學位類別 碩士
語文別 中文
論文頁數 58頁
口試委員 指導教授-卿文龍
口試委員-陳曉華
口試委員-陳紹基
口試委員-賴癸江
口試委員-郭文光
中文關鍵字 智慧電網  假數據注入攻擊  主成分分析  狀態估測 
英文關鍵字 Smart Grid  False Data Injection Attack  Principal Component Analysis (PCA)  State Estimation 
學科別分類
中文摘要 智慧電網中的資訊安全問題日趨重要,特別是其資料作雙向傳輸時所產生的風險,其中最具代表的即為假數據注入攻擊(False Data Injection Attack, FDIA)。而後有人提出進階的假數據注入攻擊─不需得知此電力系統的架構。然而此方法依舊有部分條件限制,如電力系統的狀態需為非高斯(non-Gaussian)的隨機訊號,這限制使得它的攻擊層面不夠廣泛。本篇論文嘗試提出能應用在更廣泛環境下的攻擊演算法,利用主成分分析(Principal Component Analysis, PCA)對電錶量測資料(meter measurements)作分析拆解,並依照此資料的特性忽略部分元素,得到新攻擊矩陣。利用兩次投射矩陣的概念,說明新變數與原系統狀態(states)間的關係,並達到注入隨機數據攻擊的目的。文章末段的模擬實驗說明,除了在原環境下(non-Gaussian)可進行攻擊,在電力系統狀態均為高斯隨機訊號的環境下,依舊能達到不被系統偵測出的攻擊,達到攻擊層面更加廣泛的目的。
英文摘要 In smart grid, the security problems become more and more important owing to the vulnerability of two-way communication. Among them, the false data injection attack (FDIA) is the most common issue. Some people try to tackle these problems from protectors’ perspective, while others stand on the opposite side. Recently, advanced FDIA algorithms were proposed without needing the prior knowledge of the power system. But they still have some restrictions. For example, the states of power system need to be non-Gaussian distributed. This restriction limits advanced FDIA applications. In this thesis, we try to propose a general attack algorithm. We use principal component analysis (PCA) method to analyze meter measurements and get a matrix of the power system, which is then used to find the attack vector. Because of the characteristics of meter measurements, we can ignore partial part of the matrix of the power system. Applying the vector projection twice, we can find the relationship between power system and the attack vector by PCA. From simulations, we can observe that the new algorithm has more general applications for both Gaussian and non-Gaussian measurements.
論文目次 中文摘要 ...................................................i
英文摘要 ..................................................ii
誌謝 ..................................................iii
目錄 ...................................................iv
圖目錄 ..................................................vii
符號說明 ..................................................ix
第一章 導論 ............................................1
1.1 背景知識 ...........................................1
1.2 研究動機 ...........................................3
1.3 文獻探討 ...........................................4
1.4 論文架構 ...........................................6
第二章 系統架構 ...........................................7
2.1 電力潮流 ...........................................7
2.2 狀態估測 ...........................................9
2.3 電力系統不良資料之偵測 ..........................12
第三章 假數據注入攻擊 ..................................13
3.1 傳統假數據注入攻擊 ..................................13
3.1.1 系統簡介與定義 ..................................13
3.1.2 攻擊演算法 ..................................15
3.2 有限資源下的隨機假數據注入攻擊 ..................16
第四章 進階假數據注入攻擊 ..................................18
4.1 資訊不完全下假數據注入攻擊 ..........................18
4.2 獨立成份分析介紹 ..................................19
4.2.1 獨立成份分析之概念與說明 ..........................19
4.2.2 中央極限定理 ..................................21
4.2.3 非高斯的測量值 ..................................22
4.2.4 資料前處理 ..................................26
4.2.5 FastICA演算法 ..................................26
4.3 利用ICA尋找假數據注入攻擊 ..........................28
第五章 利用主成份分析產生攻擊向量 ..........................29
5.1 主成份分析 ..................................29
5.1.1 背景介紹 ..........................................29
5.1.2 理論基礎 ..........................................30
5.1.3 投射矩陣證明推導 ..................................32
5.2 利用PCA作進階假數據注入攻擊 ..........................35
5.3 模擬與討論 ..................................39
5.3.1 非高斯訊號 ..................................39
5.3.2 高斯訊號 ..........................................47
5.3.3 混合訊號 ..........................................49
第六章 結論與未來展望 ..................................56
參考文獻 ..................................................57
參考文獻 [1] B. Zhu, A. Joseph, and S. Sastry, "A taxonomy of cyber attacks on SCADA systems," Proc. IEEE CPSCom, pp. 380-388, 2011.
[2] Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," Proc. ACM TISSEC, vol. 14, no. 1, pp. 546-551, 2011.
[3] T. T. Kim and H. V. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. on Smart Grid, vol. 2, no. 2, pp. 326-333, June 2011.
[4] S. Cui, H. Zhu, S. Kar, T. T. Kim, H. V. Poor, and A. Tajer, "Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions," IEEE Signal Processing Mag., vol. 29, no. 5, pp. 106-115, 2012.
[5] S. Bi and Y. J. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," Proc. IEEE Globecom, pp. 1162-1167, 2011.
[6] H. Yi, L. Husheng, K. A. Campbell, and H. Zhu, "Defending false data injection
attack on smart grid network using adaptive CUSUM test," Proc. IEEE CISS, pp. 1-6, 2011.
[7] M. Esmalifalak, N. Huy, Z. Rong, and H. Zhu, "Stealth false data injection using independent component analysis in smart grid," IEEE Conf. Smart Grid Commun., pp. 244-248, 2011.
[8] P. D. P. Bickel, S. Fienberg, K. Krickeberg, I. Olkin, N. Wermuth and S. Zeger, "Principle Component Analysis: Spring Series in Statistics," 2nd edition ed.: I. T. Jolli
e, 2002.
[9] O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Limiting false data attacks on power system state estimation," Proc. Conf. Inf. Sci. Syst., pp. 1-6, 2010.
[10] G. Hug, and J. A. Giampapa, "Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks," IEEE Trans. on Smart Grid, vol. 3, pp. 1362-1370, 2012.
[11] O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Malicious data attacks on the smart grid," IEEE Trans. on Smart Grid, vol. 2, pp. 645-658, 2011.
[12] M. A. Rahman and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart power grids," Proc. IEEE Globecom, pp. 3153-3158, 2012.
[13] A. Wood ,and B. Wollenberg, "Power Generation, Operation, and Control," 2nd edition ed.: John Wiley and Sons, 1996.
[14] A. G. Exposito, and A. Abur, "Power System State Estimation: Theory and Implementation," Marcel Dekker, 2004.
[15] C. Meyer, "Matrix Analysis and Applied Linear Algebra," SIAM, 2001.
[16] A. Hyvarinen, "Fast and robust xed-point algorithms for independent component analysis," IEEE Trans. on Neural Network, vol. 10, pp. 626-634, 1999.
[17] A. Hyvarinen, J. Karhunen, E. Oja, "Independent component analysis," John Wiley and Sons, 2001.
[18] P.S.T.C.A.- UWEE. Available: http://www.ee.washington.edu/research/pstca/
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2018-08-30起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2018-08-30起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw