Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks

被引:6
|
作者
Wu, Yingjun [1 ]
Chen, Jinfan [1 ]
Ru, Yingtao [1 ]
Xu, Hao [2 ]
Roger, Mbonyineza [1 ]
Ni, Ming [3 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Nanjing 210023, Peoples R China
[3] NARI Grp Corp, State Grid Elect Power Res Inst, Nanjing 211106, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 02期
关键词
Communication networks; Planning; Network topology; Information processing; Topology; Power grids; Cyber-attack; game theory; power communication network; reachability; topology planning; DATA INJECTION ATTACKS; SYSTEMS;
D O I
10.1109/JSYST.2020.3026997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deep integration of computing, communication, and information technologies not only improves the operation level of the power grid, but also brings the threat of cyber-attacks on the power grid. This article studies power communication network topology planning problem considering both the normal operation level and the ability to against cyber-attacks from the perspective of information transmission reachability. First, by analyzing the game relationship between ensuring the normal operation level and defending against cyber-attacks, a framework of power communication network topology planning based on game theory is proposed. In this framework, the traditional planner tries to maximize the information transmission reachability of normal operation, while the anti-cyber-attack planner wants to minimize the information transmission reachability of cyber-attacks. Second, considering whether there are uncertainties in the planning, a deterministic topology planning model is proposed for the traditional planner, and an uncertainty topology planning model is proposed for the anti-cyber-attack planner. Third, considering the competition between the two planners, an improved particle swarm algorithm is introduced to solve the models. Finally, a standard example and a practical power communication network are used to verify the correction and effectiveness of the method.
引用
收藏
页码:2883 / 2894
页数:12
相关论文
共 50 条
  • [21] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [22] A Review on Research of Cyber-attacks and Defense in Cyber Physical Power Systems Part Two Detection and Protection
    Tang Y.
    Li M.
    Wang Q.
    Ni M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (10): : 1 - 9and18
  • [23] Observer-based adaptive ISMC for connected vehicles against cyber-attacks
    Yue, Wei
    Shen, Hongxia
    Guo, Xiangjun
    Wang, Liyuan
    MEASUREMENT & CONTROL, 2023, 56 (3-4): : 638 - 653
  • [24] The Countermeasure Strategy Based on Big Data against North Korean Cyber-attacks
    Lee, Yong-joon
    Kwon, Hyuk-jin
    Lee, Jae-il
    Shin, Dong-kyoo
    KOREAN JOURNAL OF DEFENSE ANALYSIS, 2018, 30 (03): : 437 - 454
  • [25] Multivariate Gaussian-Based False Data Detection Against Cyber-Attacks
    An, Yu
    Liu, Dong
    IEEE ACCESS, 2019, 7 : 119804 - 119812
  • [26] A Resilient Frequency Regulation for Enhancing Power System Security Against Hybrid Cyber-Attacks
    Saxena, Abhishek
    Shankar, Ravi
    Kumar, Chandan
    Parida, S. K.
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2024, 60 (03) : 4583 - 4597
  • [27] PDE-based Analysis of Automotive Cyber-Attacks in Imperfect Information Scenarios
    Kashyap, Abhishek
    Ghanavati, Meysam
    Chakravarthy, Animesh
    Menon, Prathyush P.
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 1478 - 1484
  • [28] Adversarial training-based robust model for transmission line's insulator defect classification against cyber-attacks
    Mahapatra, Uttam
    Rahman, M. A.
    Islam, Md. Rashidul
    Hossain, Md. Alamgir
    Sheikh, Md. Rafiqul Islam
    Hossain, M. J.
    ELECTRIC POWER SYSTEMS RESEARCH, 2025, 245
  • [29] Impact of Crash Override and Tampering Communication Data Cyber-Attacks on the Power Quality of the Hybrid System
    Ghosh, Sagnika
    Ali, Mohd Hasan
    2018 IEEE INTERNATIONAL CONFERENCE ON POWER ELECTRONICS, DRIVES AND ENERGY SYSTEMS (PEDES), 2018,
  • [30] Attack-Tolerant Network Control System Based on the Deception for the Cyber-Attacks
    Yaseen, Amer Atta
    Bayart, Mireille
    2015 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2015, : 37 - 44