针对网络攻击的简单鲁棒线路电流差动保护

Mohamed E. Kotb, A. M. Saber, T. Boghdady
{"title":"针对网络攻击的简单鲁棒线路电流差动保护","authors":"Mohamed E. Kotb, A. M. Saber, T. Boghdady","doi":"10.1109/MEPCON55441.2022.10021802","DOIUrl":null,"url":null,"abstract":"Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.","PeriodicalId":174878,"journal":{"name":"2022 23rd International Middle East Power Systems Conference (MEPCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Simple Robust Line Current Differential Protection Against Cyberattacks\",\"authors\":\"Mohamed E. Kotb, A. M. Saber, T. Boghdady\",\"doi\":\"10.1109/MEPCON55441.2022.10021802\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.\",\"PeriodicalId\":174878,\"journal\":{\"name\":\"2022 23rd International Middle East Power Systems Conference (MEPCON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 23rd International Middle East Power Systems Conference (MEPCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MEPCON55441.2022.10021802\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 23rd International Middle East Power Systems Conference (MEPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MEPCON55441.2022.10021802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

线路电流差分中继(lcdr)依赖于广域通信网络(wan)和全球定位系统(GPS),这是一个重大挑战,因为广域通信网络和GPS信号都容易受到网络攻击。例如,攻击者可能使用虚假数据注入(FDI)来篡改从一条线路终端发送给LCDR的信号,导致LCDR做出错误的决策。这种错误的决定可能会断开正常线路或无法跳闸故障线路,严重损害系统。本文提出了两种技术:(i)检测FDI攻击,(ii)区分误跳闸攻击和健康线路,以及(iv)确保LCDR仅在存在真正故障时才发送跳闸命令。在第一种技术中,在LCDR被触发后,它通过使用本地瞬时电压和电流测量来评估从另一个终端接收到的数据。第二种技术基于发送加密的预定义值的信号,该信号仅在远程LCDR检测到故障后发送。对该信号的操纵是入侵的标志,它会激活备份保护。这两种技术都可以在lcdr中实现,以检测对lcdr的网络攻击,并确保最佳的可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Simple Robust Line Current Differential Protection Against Cyberattacks
Line current differential relays (LCDRs) depend on wide area communication networks (WANs) and global positioning systems (GPS), which is a major challenge since both WANs and GPS signals are vulnerable to cyberattacks. For instance, attackers may use false data injection (FDI) to tamper with the signals sent from one line terminal to the LCDR, causing the LCDR to make the incorrect decision. This wrong decision may disconnect a healthy line or fail to trip a faulty line, seriously harming the system. This paper proposes two techniques to (i) detect FDI attacks, (ii) distinguish between missed-tripping attacks and a healthy line, and (iv) ensure that the trip order is sent by the LCDR only when there is a real fault. In the first technique, after the LCDR is triggered, it evaluates the data received from the other terminal by using the local instantaneous voltage and current measurements. The second technique is based on sending a signal of an encrypted predefined value, which is only sent after the remote LCDR senses a fault. Manipulation of this signal is a sign of intrusion, which activates backup protection. Both techniques can be implemented in LCDRs to detect cyberattacks on LCDRs and ensure optimum dependability.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Optimal Allocation and Size of FACTS Devices Using Several Optimizers: a Comprehensive Study A Droop-Based Frequency Controller for Parallel Operation of VSCs and SG in Isolated Microgrids A Centralized Protection Scheme for Microgrids with Artificial Neural Network-Based on Fault Detection and Location Development of Fault Ride Through (FRT) Criteria from System Operator Perspective with Large-scale Wind Integration Consensus-Based Tracking Control of Energy Storage for Microgrid Energy Management
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1