logoGlobal Energy Interconnection

Analysis of cascading failures of power cyber-physical systems considering false data injection attacks

阅读原文 阅读原文

文章导读

信息物理系统是一个综合计算、网络和物理环境的多维复杂系统,旨在通过计算、通信、控制等技术达成物理与信息系统的互通与深度融合,实现大型工程系统的实时感知、动态控制和信息服务,从而获得超越传统应用系统的运行效果与性能水平。信息物理系统的理论与技术被认为是工业4.0时代的互联网+应用的技术基础,电力信息物理系统深度融合被认为是建设能源互联网的核心基础和关键所在。本文研究虚假数据注入攻击对电力信息物理系统连锁故障的影响,辨识系统中的脆弱节点,建立了电力信息物理系统模型。本文从理论上分析了信息网通信过程遭受虚假数据攻击对决策和控制过程的影响,定义了脆弱性评估指标,通过对比节点潮流介数与脆弱性评估指标,验证信息物理环境下潮流介数评估脆弱节点的有效性。

Analysis of cascading failures of power cyber-physical systems considering false data injection attacks

考虑虚假数据注入攻击的电力信息物理系统的连锁故障分析

Jian Li, Chaowei Sun, Qingyu Su

Northeast Electric Power University, Jilin, 132000, P.R. China

一分钟语音讲解

Abstract

This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system, and identifies vulnerable nodes. First, considering the monitoring and control functions of a cyber network and power flow characteristics of a power network, a power cyber-physical system model is established. Then, the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied, and a cascading failure analysis process is proposed for the cyber-attack environment. In addition, a vulnerability evaluation index is defined from two perspectives, i.e., the topology integrity and power network operation characteristics. Moreover, the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyber- physical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index. Finally, an IEEE14-bus power network is selected for constructing a power cyber-physical system. Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks, which affect the ability of the cyber network to suppress the propagation of cascading failures, and expand the scale of the cascading failures. The vulnerability evaluation index is calculated for each node, so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness.

Keywords

Power cyber-physical systems, False date injection attack, Cascading failure, Vulnerability, Power flow betweenness.

图片

Fig.1 Simplified diagram of power cyber-physical system (CPS)

图片

Fig.2Cascading failure analysis flowchart

图片

Fig.3 IEEE14-node power CPS

图片

Fig.4Line transmission power and topology diagram at t + 1 when the system communication is normal

图片

Fig.5 Line transmission power and topology diagram at t+3 when the system communication is normal

图片

Fig.6 Line transmission power and topology diagram at t + 5 when the system communication is normal

图片

Fig.7 Comparison chart of system losses under the two modes

图片

Fig.8 Vulnerability assessment results for each node

图片

Fig.9 Comparison chart between Bf(n) and Vpn

本文引文信息

Li J, Sun C, Su Q J (2021) Analysis of cascading failures of power cyber-physical systems considering false data injection attacks. Global Energy Interconnection, 4(2): 204-213

李健,孙超维,苏庆宇 (2021) 考虑虚假数据注入攻击的电力信息物理系统的连锁故障分析. 全球能源互联网(英文),4(2): 204-213

Biographies

图片

Jian Li

Jian Li received a PhD degree from Northeastern University, Shengyang, in 2013. She is working at Northeast Electric Power University, Jilin. Her research interests include microgrid security control and power cyber-physical systems.

图片

Chaowei Sun

Chaowei Sun received a bachelor degree from Weifang University, Weifang, in 2017. He is studying at Northeast Electric Power University, JiLin. His research interests include power cyber-physical systems and complex networks.

图片

Qingyu Su

Qingyu Su received a PhD degree from Northeastern University, Shengyang, in 2013. He is working at Northeast Electric Power University, Jilin. His research interests include microgrid security control and power cyber- physical systems.

编辑:王闻昊 王彦博

审核:王 伟

郑重声明

根据国家版权局相关规定,纸媒、网站、微博、微信公众号转载、摘编本网站作品,需包含本网站名称、二维码等关键信息,并在文首注明《全球能源互联网》原创。
个人请按本网站原文转发、分享。