Cyber-Physical Security Assessment and Simulation Based on Graph Database

被引:0
|
作者
Wang, Di [1 ]
Guo, Qinglai [1 ]
Song, Yan [2 ]
Gao, Kunlun [3 ]
Zhou, Aihua [3 ]
机构
[1] Tsinghua Univ, Dept Elect Engn, State Key Lab Power Syst, Beijing 100084, Peoples R China
[2] State Grid Shanghai Municipal Elect Power Co, Elect Power Res Inst, Shanghai 200437, Peoples R China
[3] Global Energy Interconnect Res Inst, SGCC, Adv Comp & Big Data Lab, Beijing 102209, Peoples R China
关键词
Cyber-physical system; graph database; cyber-contingency assessment; secondary-voltage control;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
With the development of information technology, the operation of power grid increasingly depends upon the support of strong communication network. The power system consisting of grids infrastructure and communication equipment is a typical cyber-physical system(CPS). In recent years, power accidents that information-side failure impacts on physical operation happen at times. In order to simulate the impacts of information failure on grid operation, we develop a cyber-physical simulation tool for the secondary-voltage control of power system to implement the reasonable analysis and evaluation of the influence of different types of information failure on voltage control effect. In this paper, the graph database is introduced to construct the basic cyber-physical data model as an important part of the simulation tool, whose graphical modeling and management is friendly for users. In addition, the importance of different types of information is analyzed with the tool. It can be seen that the voltage information is more fragile and critical than the non-independent generator reactive information.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Cyber-physical systems and their security issues
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    [J]. COMPUTERS IN INDUSTRY, 2018, 100 : 212 - 223
  • [32] A survey on the security of cyber-physical systems
    Wu G.
    Sun J.
    Chen J.
    [J]. Control Theory and Technology, 2016, 14 (1) : 2 - 10
  • [33] A Survey on Cyber-Physical Systems Security
    Yu, Zhenhua
    Gao, Hongxia
    Cong, Xuya
    Wu, Naiqi
    Song, Houbing Herbert
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 21670 - 21686
  • [34] Security Enumerations for Cyber-Physical Systems
    Schlette, Daniel
    Menges, Florian
    Baumer, Thomas
    Pernul, Guenther
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 64 - 76
  • [35] The Importance Of Security In Cyber-Physical System
    alrefaei, Faisal
    [J]. 2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [36] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [37] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    [J]. Science China Technological Sciences, 2017, (12) : 1975 - 1977
  • [38] Safety and security of cyber-physical systems
    Biro, Miklos
    Mashkoor, Atif
    Sametinger, Johannes
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (07)
  • [39] Cyber-Physical Systems: A Security Perspective
    Konstantinou, Charalambos
    Maniatakos, Michail
    Saqib, Fareena
    Hu, Shiyan
    Plusquellic, Jim
    Jin, Yier
    [J]. 2015 20TH IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2015,
  • [40] Cyber-Physical Systems Security and Privacy
    Henkel, Jorg
    [J]. IEEE DESIGN & TEST, 2017, 34 (04) : 4 - 4