Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks

被引:6
|
作者
Wu, Yingjun [1 ]
Chen, Jinfan [1 ]
Ru, Yingtao [1 ]
Xu, Hao [2 ]
Roger, Mbonyineza [1 ]
Ni, Ming [3 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Nanjing 210023, Peoples R China
[3] NARI Grp Corp, State Grid Elect Power Res Inst, Nanjing 211106, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 02期
关键词
Communication networks; Planning; Network topology; Information processing; Topology; Power grids; Cyber-attack; game theory; power communication network; reachability; topology planning; DATA INJECTION ATTACKS; SYSTEMS;
D O I
10.1109/JSYST.2020.3026997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deep integration of computing, communication, and information technologies not only improves the operation level of the power grid, but also brings the threat of cyber-attacks on the power grid. This article studies power communication network topology planning problem considering both the normal operation level and the ability to against cyber-attacks from the perspective of information transmission reachability. First, by analyzing the game relationship between ensuring the normal operation level and defending against cyber-attacks, a framework of power communication network topology planning based on game theory is proposed. In this framework, the traditional planner tries to maximize the information transmission reachability of normal operation, while the anti-cyber-attack planner wants to minimize the information transmission reachability of cyber-attacks. Second, considering whether there are uncertainties in the planning, a deterministic topology planning model is proposed for the traditional planner, and an uncertainty topology planning model is proposed for the anti-cyber-attack planner. Third, considering the competition between the two planners, an improved particle swarm algorithm is introduced to solve the models. Finally, a standard example and a practical power communication network are used to verify the correction and effectiveness of the method.
引用
收藏
页码:2883 / 2894
页数:12
相关论文
共 50 条
  • [31] Worst-case performance of Kalman filtering against cyber-attacks with true and contaminated information
    Yang, Yake
    Li, Zhi
    Zhao, Xudong
    Li, Yuzhe
    AUTOMATICA, 2025, 176
  • [32] An End-to-End Security Framework for Smart Healthcare Information Sharing against Botnet-based Cyber-Attacks
    Quamara, Megha
    Gupta, B. B.
    Yamaguchi, Shingo
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [33] An Ensemble Learning-Based Cyber-Attacks Detection Method of Cyber-Physical Power Systems
    Lu, Kang-Di
    Wu, Zheng-Guang
    2022 INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS AND MECHATRONICS (ICARM 2022), 2022, : 1029 - 1034
  • [34] Security Against Communication Network Attacks of Cyber-Physical Systems
    Públio Macedo Lima
    Marcos Vinícius Silva Alves
    Lilian Kawakami Carvalho
    Marcos Vicente Moreira
    Journal of Control, Automation and Electrical Systems, 2019, 30 : 125 - 135
  • [35] GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks
    Zarzycki, Krzysztof
    Chaber, Patryk
    Cabaj, Krzysztof
    Lawrynczuk, Maciej
    Marusak, Piotr
    Nebeluk, Robert
    Plamowski, Sebastian
    Wojtulewicz, Andrzej
    IEEE ACCESS, 2023, 11 : 49587 - 49600
  • [36] Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM
    Diaz Lopez, Daniel
    Blanco Uribe, Maria
    Santiago Cely, Claudia
    Vega Torres, Andres
    Moreno Guataquira, Nicolas
    Moron Castro, Stefany
    Nespoli, Pantaleone
    Gomez Marmol, Felix
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [37] Security Against Communication Network Attacks of Cyber-Physical Systems
    Lima, Publio Macedo
    Silva Alves, Marcos Vinicius
    Carvalho, Lilian Kawakami
    Moreira, Marcos Vicente
    JOURNAL OF CONTROL AUTOMATION AND ELECTRICAL SYSTEMS, 2019, 30 (01) : 125 - 135
  • [38] A Cooperative Control Strategy against Cyber-attacks for Power System with High Penetration Wind Farm
    Yang, Kai
    Li, Jian
    Zhang, Guangdou
    Xing, Yankai
    Bamisile, Olusola
    Huang, Qi
    2022 4TH ASIA ENERGY AND ELECTRICAL ENGINEERING SYMPOSIUM (AEEES 2022), 2022, : 321 - 327
  • [39] Transient Stability Enhancement of Power Grid by Neural Network Controlled BFCL Considering Cyber-Attacks
    Sadi, Mohammad Ashraf Hossain
    Zheng, Huaxi
    Ali, Mohd. Hasan
    SOUTHEASTCON 2017, 2017,
  • [40] Event-based model predictive damping control for power systems with cyber-attacks
    Liu, Yuezhi
    Chen, Yong
    Li, Meng
    ISA TRANSACTIONS, 2023, 136 : 687 - 700