on malicious data attacks on power system state estimation

17

Upload: faizan-ali

Post on 19-Jul-2015

32 views

Category:

Engineering


3 download

TRANSCRIPT

𝑧 = 𝐻𝑥 + 𝑎 + 𝑒

𝑒 ~ 𝑁 0, ∑𝑒

𝑎 𝜖 𝐴𝑘 = 𝑎 𝜖 𝑅𝑚: 𝑎0≤ 𝑘

• 𝑧 𝜖 𝑅𝑚

• 𝑥 𝜖 𝑅𝑚

• 𝑒• ∑𝑒

• 𝑎 𝑘

• 𝑎 = 𝐻𝑐 𝑐

• 𝑎

• 𝑁(𝜇𝑥, ∑𝑥

• 𝑎 = 0 𝑧, 𝑥 ∈ 𝑁(𝜇(𝑥,𝑧), ∑(𝑥,𝑧)

휀0 = 𝑚𝑖𝑛𝑥 𝐸 𝑥 − 𝑥 𝑧2

= 𝑇𝑟 (∑𝑥 − 𝐾𝑥𝐻∑𝑥)

• 𝑎 𝑝𝑟𝑖𝑜𝑟𝑖 𝑎• 𝑎

𝐻0: 𝒂 = 𝟎 𝐻1: 𝑎 ∈ 𝐴𝑘 \ *0+

𝛿: 𝑅𝑚 → *0,1+

𝛿 𝑧 = 1 (𝐻1) 𝛿 𝑧 = 0

• ⇒ •

𝐻0 ∶ 𝑧 ~ 𝑁(0, ∑𝑧)

𝐻1 ∶ 𝑧 ~ 𝑁 𝑎, ∑𝑧 , 𝑎 ∈ 𝐴𝑘 \ *0+

∑𝑧 ≜ 𝐻∑𝑥𝐻𝑇 + ∑𝑒

𝐿 𝑧 ≜𝑚𝑎𝑥𝑎∈𝐴𝑘

𝑓 𝑧 𝑎

𝑓 𝑧 𝑎 = 0

𝐿 𝑧 > 𝜏 ⇒ 𝐻1 𝐿 𝑧 < 𝜏 ⇒ 𝐻0

Pr 𝛿 𝑧 = 1 𝑎 )

• 𝜎2𝑥𝐼

• 𝜎2𝑒

• ≜ 10𝑙𝑜𝑔𝜎2

𝑥

𝜎2𝑒

J 𝑥

J 𝑥