Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks

被引:6
|
作者
Wu, Yingjun [1 ]
Chen, Jinfan [1 ]
Ru, Yingtao [1 ]
Xu, Hao [2 ]
Roger, Mbonyineza [1 ]
Ni, Ming [3 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Nanjing 210023, Peoples R China
[3] NARI Grp Corp, State Grid Elect Power Res Inst, Nanjing 211106, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 02期
关键词
Communication networks; Planning; Network topology; Information processing; Topology; Power grids; Cyber-attack; game theory; power communication network; reachability; topology planning; DATA INJECTION ATTACKS; SYSTEMS;
D O I
10.1109/JSYST.2020.3026997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deep integration of computing, communication, and information technologies not only improves the operation level of the power grid, but also brings the threat of cyber-attacks on the power grid. This article studies power communication network topology planning problem considering both the normal operation level and the ability to against cyber-attacks from the perspective of information transmission reachability. First, by analyzing the game relationship between ensuring the normal operation level and defending against cyber-attacks, a framework of power communication network topology planning based on game theory is proposed. In this framework, the traditional planner tries to maximize the information transmission reachability of normal operation, while the anti-cyber-attack planner wants to minimize the information transmission reachability of cyber-attacks. Second, considering whether there are uncertainties in the planning, a deterministic topology planning model is proposed for the traditional planner, and an uncertainty topology planning model is proposed for the anti-cyber-attack planner. Third, considering the competition between the two planners, an improved particle swarm algorithm is introduced to solve the models. Finally, a standard example and a practical power communication network are used to verify the correction and effectiveness of the method.
引用
收藏
页码:2883 / 2894
页数:12
相关论文
共 50 条
  • [41] Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks
    Liu, Yonggui
    Li, Ziyuan
    Shen, Zhiping
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (05): : 2780 - 2800
  • [42] Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
    Abdelkader, Sobhy
    Amissah, Jeremiah
    Kinga, Sammy
    Mugerwa, Geofrey
    Emmanuel, Ebinyu
    Mansour, Diaa-Eldin A.
    Bajaj, Mohit
    Blazek, Vojtech
    Prokop, Lukas
    RESULTS IN ENGINEERING, 2024, 23
  • [43] Assessment of Cyber-Physical Inverter-Based Microgrid Control Performance under Communication Delay and Cyber-Attacks
    Ali, Ola
    Nguyen, Tung-Lam
    Mohammed, Osama A.
    APPLIED SCIENCES-BASEL, 2024, 14 (03):
  • [44] Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns
    Yang, Shaohua
    Lao, Keng-Weng
    Hui, Hongxun
    Chen, Yulin
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (06) : 7277 - 7290
  • [45] Robust Observer-Based Defense Strategy Against Actuator and Sensor Cyber-Attacks in DCMGs
    Kachhwaha, Mohit
    Modi, Himani
    Nehra, Mahesh Kumar
    Fulwani, Deepak
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (10) : 11687 - 11696
  • [46] CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
    Jiang, Feng
    Qi, Buren
    Wu, Tianhao
    Zhu, Konglin
    Zhang, Lin
    2019 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2019, : 3218 - 3223
  • [47] A Learning-Based Framework for Detecting Cyber-Attacks Against Line Current Differential Relays
    Ameli, Amir
    Ayad, Abdelrahman
    El-Saadany, Ehab F.
    Salama, Magdy
    Youssef, Amr
    IEEE TRANSACTIONS ON POWER DELIVERY, 2021, 36 (04) : 2274 - 2286
  • [48] An IoT-Based Deep Learning Approach for Online Fault Detection Against Cyber-Attacks
    Rajkumar S.
    Sheeba S.L.
    Sivakami R.
    Prabu S.
    Selvarani A.
    SN Computer Science, 4 (4)
  • [49] Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants
    Park, Jong Woo
    Lee, Seung Jun
    NUCLEAR ENGINEERING AND TECHNOLOGY, 2019, 51 (01) : 138 - 145
  • [50] Research on security of mobile communication information transmission based on heterogeneous network
    Chen, Jing
    Zhao, Feng
    Xing, Haiyan
    International Journal of Network Security, 2020, 22 (01): : 145 - 149