...
首页> 外文期刊>Energies >Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Considering Network Topology and Power Flow Properties
【24h】

Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Considering Network Topology and Power Flow Properties

机译:考虑网络拓扑和潮流特性的网络物理电力系统建模与漏洞分析

获取原文
           

摘要

Conventional power systems are developing into cyber-physical power systems (CPPS) with wide applications of communication, computer and control technologies. However, multiple practical cases show that the failure of cyber layers is a major factor leading to blackouts. Therefore, it is necessary to discuss the cascading failure process considering cyber layer failures and analyze the vulnerability of CPPS. In this paper, a CPPS model, which consists of cyber layer, physical layer and cyber-physical interface, is presented using complex network theory. Considering power flow properties, the impacts of cyber node failures on the cascading failure propagation process are studied. Moreover, two vulnerability indices are established from the perspective of both network structure and power flow properties. A vulnerability analysis method is proposed, and the CPPS performance before and after cascading failures is analyzed by the proposed method to calculate vulnerability indices. In the case study, three typical scenarios are analyzed to illustrate the method, and vulnerabilities under different interface strategies and attack strategies are compared. Two thresholds are proposed to value the CPPS vulnerability roughly. The results show that CPPS is more vulnerable under malicious attacks and cyber nodes with high indices are vulnerable points which should be reinforced.
机译:常规电源系统正在发展为具有通信,计算机和控制技术的广泛应用的网络物理电源系统(CPPS)。但是,多个实际案例表明,网络层的故障是导致停电的主要因素。因此,有必要讨论考虑网络层故障的级联故障过程并分析CPPS的脆弱性。本文采用复杂网络理论,提出了由网络层,物理层和网络物理接口组成的CPPS模型。考虑潮流特性,研究了网络节点故障对级联故障传播过程的影响。此外,从网络结构和潮流特性两个角度建立了两个脆弱性指数。提出了一种脆弱性分析方法,并通过该方法分析了级联故障前后的CPPS性能,计算出脆弱性指标。在案例研究中,分析了三种典型情况来说明该方法,并比较了不同接口策略和攻击策略下的漏洞。建议使用两个阈值来粗略评估CPPS漏洞。结果表明,CPPS更容易受到恶意攻击,高索引的网络节点是易受攻击的点,应予以加强。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号