Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks

被引:6
|
作者
Wu, Yingjun [1 ]
Chen, Jinfan [1 ]
Ru, Yingtao [1 ]
Xu, Hao [2 ]
Roger, Mbonyineza [1 ]
Ni, Ming [3 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Nanjing 210023, Peoples R China
[3] NARI Grp Corp, State Grid Elect Power Res Inst, Nanjing 211106, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 02期
关键词
Communication networks; Planning; Network topology; Information processing; Topology; Power grids; Cyber-attack; game theory; power communication network; reachability; topology planning; DATA INJECTION ATTACKS; SYSTEMS;
D O I
10.1109/JSYST.2020.3026997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deep integration of computing, communication, and information technologies not only improves the operation level of the power grid, but also brings the threat of cyber-attacks on the power grid. This article studies power communication network topology planning problem considering both the normal operation level and the ability to against cyber-attacks from the perspective of information transmission reachability. First, by analyzing the game relationship between ensuring the normal operation level and defending against cyber-attacks, a framework of power communication network topology planning based on game theory is proposed. In this framework, the traditional planner tries to maximize the information transmission reachability of normal operation, while the anti-cyber-attack planner wants to minimize the information transmission reachability of cyber-attacks. Second, considering whether there are uncertainties in the planning, a deterministic topology planning model is proposed for the traditional planner, and an uncertainty topology planning model is proposed for the anti-cyber-attack planner. Third, considering the competition between the two planners, an improved particle swarm algorithm is introduced to solve the models. Finally, a standard example and a practical power communication network are used to verify the correction and effectiveness of the method.
引用
收藏
页码:2883 / 2894
页数:12
相关论文
共 50 条
  • [1] Cyber-Attacks in PMU-Based Power Network and Countermeasures
    Tu, Chunming
    He, Xi
    Liu, Xuan
    Li, Peng
    IEEE ACCESS, 2018, 6 : 65594 - 65603
  • [2] Secure SCADA Communication Network for Detecting and Preventing Cyber-Attacks on Power Systems
    Chalamasetty, Goutham K.
    Mandal, Paras
    Tseng, Tzu-Liang
    2016 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2016,
  • [3] INVESTIGATION ON CYBER-ATTACKS AGAINST IN-VEHICLE NETWORK
    Kumar, S. Vishnu
    Mary, G. Aloy Anuja
    Suresh, P.
    Uthirasamy, R.
    2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES), 2021, : 305 - 311
  • [4] Research on Cyber Attacks and Defensive Measures of Power Communication Network
    Wu, Yingjun
    Ru, Yingtao
    Lin, Zhiwei
    Liu, Chengjun
    Xue, Tao
    Zhao, Xiang
    Chen, Jinfan
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 7613 - 7635
  • [5] Research on secure control and communication for cyber-physical systems under cyber-attacks
    Li, Wei
    Shi, Yahong
    Li, Yajie
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 41 (12) : 3421 - 3437
  • [6] How to prevent cyber-attacks in inter-vehicle communication network?
    Sedjelmaci, Hichem
    Bouali, Tarek
    Messous, Mohamed-Ayoub
    Senouci, Sidi Mohammed
    2015 INTERNATIONAL CONFERENCE ON PROTOCOL ENGINEERING (ICPE) AND INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF DISTRIBUTED SYSTEMS (NTDS), 2015,
  • [7] Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks
    Wu, Yingjun
    Xu, Hao
    Ni, Ming
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2020, 8 (04) : 750 - 759
  • [8] Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks
    Yingjun Wu
    Hao Xu
    Ming Ni
    Journal of Modern Power Systems and Clean Energy, 2020, 8 (04) : 750 - 759
  • [9] Interaction network-based resilient consensus of connected vehicles against cyber-attacks
    Liu, Yonggui
    Li, Zeming
    Guo, Ge
    IET CONTROL THEORY AND APPLICATIONS, 2023, 17 (06): : 744 - 756
  • [10] Economic Information Warfare: Classifying Cyber-Attacks Against Commodity Value Chains
    van Niekerk, Brett
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 448 - 456