电力信息与通信技术2026,Vol.24Issue(1):79-85,7.DOI:10.16543/j.2095-641x.electric.power.ict.2026.01.09
考虑潮流和拓扑约束的电力系统虚拟数据注入攻击生成方法
A Method for Generating Virtual Data Injection Attacks in Power Systems Considering Power Flow and Topological Constraints
摘要
Abstract
To address the limitations of traditional false data injection attacks—such as approximating the nonlinear relationship between measurements and state variables as a DC model without considering AC power flow and incomplete topology information,this paper proposes a virtual data injection attack generation method.First,it conducts a detailed analysis of AC state estimation and bad data detection methods to provide a theoretical foundation for subsequent virtual data injection attack generation.Second,it introduces a DDIA generation method that accounts for AC power flow and topology constraints,while also leveraging the virtual nature of DDIA by selecting the measurement data point with the smallest distance to the attacked data to construct tampered measurements.Finally,attack simulations are conducted on the IEEE 14 bus,IEEE 118 bus,and IEEE 300 bus systems,demonstrating that the proposed virtual data injection attack is highly covert and severely impacts the stable operation of power systems.关键词
信息物理系统/虚假数据注入攻击/电力系统/交流潮流/拓扑约束Key words
cyber-physical systems/false data injection attack/power system/AC power flow/topology constraints分类
信息技术与安全科学引用本文复制引用
凌颖,黎新,谢铭,董运昌..考虑潮流和拓扑约束的电力系统虚拟数据注入攻击生成方法[J].电力信息与通信技术,2026,24(1):79-85,7.基金项目
中国南方电网有限责任公司创新项目"社会工程学的电力信息网络安全风险智能感知及动态防护技术研究"(GXKJXM20222017). (GXKJXM20222017)