Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks

被引:0
|
作者
Wu, Yingjun [1 ,2 ,3 ]
Xu, Hao [2 ,3 ]
Ni, Ming [4 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Coll Automat, Nanjing, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Coll Artificial Intelligence, Nanjing, Peoples R China
[4] NARI Grp Corp, State Grid Elect Power Res Inst, Nanjing, Peoples R China
关键词
Cyber-physical power system (CPPS); cyber-attacks; survivability evaluation; communication and information system; defensive resource; DATA INJECTION ATTACKS;
D O I
10.35833/mpce.2019.000148
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the widespread use of communication and information technology, power system has been evolving into cyber-physical power system (CPPS) and becoming more vulnerable to cyber-attacks. Therefore, it is necessary to enhance the ability of the communication and information system in CPPS to defend against cyber-attacks. This paper proposes a method to enhance the survivability of the communication and information system in CPPS. Firstly, the communication and information system for critical business of power system is decomposed into certain types of atomic services, and then the survivability evaluation indexes and their corresponding calculation method for the communication and information system are proposed. Secondly, considering the efficacy and cost defensive resources, a defensive resource allocation model is proposed to maximize the survivability of communication and information system in CPPS. Then, a modified genetic algorithm is adopted to solve the proposed model. Finally, the simulation results of CPPS for an IEEE 30-node system verify the proposed method.
引用
收藏
页码:750 / 759
页数:10
相关论文
共 42 条
  • [31] Parallel optimization method of service resource allocation in military information system
    Yu, Xiao-Hao
    Hu, Dan
    Luo, Xue-Shan
    Liu, Jun-Xian
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2012, 32 (09): : 2078 - 2086
  • [32] Surrogate Gradient-based Deep Reinforcement Learning for Power System Post-contingency Safety Control Against Cyber-attacks
    Zhu, Jizhong
    Huang, Linying
    Chen, Yixi
    Dianwang Jishu/Power System Technology, 2024, 48 (10): : 4041 - 4049
  • [33] A method for supporting the transformation of an existing production system with its integrated Enterprise Information Systems (EISs) into a Cyber Physical Production System (CPPS)
    Wu, Xuan
    Goepp, Virginie
    Siadat, Ali
    Vernadat, Francois
    COMPUTERS IN INDUSTRY, 2021, 131
  • [34] Integrating the Safety Control Against Cyber-Attacks on the Global Information in Coupled Map Car-Following Model Under Connected Vehicles Platoon Environment
    Peng, Guanghan
    Li, Xinhai
    Tan, Huili
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (10) : 13914 - 13925
  • [35] Reliable Deep Learning and IoT-Based Monitoring System for Secure Computer Numerical Control Machines Against Cyber-Attacks With Experimental Verification
    Tran, Minh-Quang
    Elsisi, Mahmoud
    Liu, Meng-Kun
    Vu, Viet Q.
    Mahmoud, Karar
    Darwish, Mohamed M. F.
    Abdelaziz, Almoataz Y.
    Lehtonen, Matti
    IEEE ACCESS, 2022, 10 : 23186 - 23197
  • [36] Method of Improving the Resource Utilization Based on Signal Extrapolation in Wireless Communication System
    Jiang Laiwei
    Sha Xuejun
    Zhang Naitong
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 88 - 92
  • [37] Edge Computing Resource Allocation Method for Mining 5G Communication System
    Zhang, Liya
    Yang, Wei
    Hao, Bonan
    Yang, Zhifang
    Zhao, Qing
    IEEE ACCESS, 2023, 11 : 49730 - 49737
  • [38] Cyber-Physical Coordinated Defense Method Against Malicious Attacks for Security and Stability Control System
    Li M.
    Ni M.
    Yan Y.
    Si Q.
    Xue F.
    Xu J.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2021, 45 (18): : 113 - 121
  • [40] A Two-Stages Relay Selection And Resource Allocation Joint Method for D2D Communication System
    Zhao, Ming
    Gu, Xinyu
    Wu, Di
    Ren, Luming
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,