on malicious data attacks on power system state estimation
Post on 19-Jul-2015
32 Views
Preview:
TRANSCRIPT
•
• 𝑎 = 𝐻𝑐 𝑐
• 𝑎
•
• 𝑁(𝜇𝑥, ∑𝑥
• 𝑎 = 0 𝑧, 𝑥 ∈ 𝑁(𝜇(𝑥,𝑧), ∑(𝑥,𝑧)
휀0 = 𝑚𝑖𝑛𝑥 𝐸 𝑥 − 𝑥 𝑧2
= 𝑇𝑟 (∑𝑥 − 𝐾𝑥𝐻∑𝑥)
• ⇒ •
•
𝐻0 ∶ 𝑧 ~ 𝑁(0, ∑𝑧)
𝐻1 ∶ 𝑧 ~ 𝑁 𝑎, ∑𝑧 , 𝑎 ∈ 𝐴𝑘 \ *0+
∑𝑧 ≜ 𝐻∑𝑥𝐻𝑇 + ∑𝑒
𝐿 𝑧 ≜𝑚𝑎𝑥𝑎∈𝐴𝑘
𝑓 𝑧 𝑎
𝑓 𝑧 𝑎 = 0
𝐿 𝑧 > 𝜏 ⇒ 𝐻1 𝐿 𝑧 < 𝜏 ⇒ 𝐻0
top related