Innate Cyber-Immunity and Acquired Cyber-Immunity Across Multi-Area Power Systems

IF 7.2 1区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC IEEE Transactions on Power Systems Pub Date : 2025-03-17 DOI:10.1109/TPWRS.2025.3549732
Jiazuo Hou;Yue Song;Yunhe Hou;Jimmy Chih-Hsien Peng
{"title":"Innate Cyber-Immunity and Acquired Cyber-Immunity Across Multi-Area Power Systems","authors":"Jiazuo Hou;Yue Song;Yunhe Hou;Jimmy Chih-Hsien Peng","doi":"10.1109/TPWRS.2025.3549732","DOIUrl":null,"url":null,"abstract":"Organisms have evolved innate and acquired immune systems to defend against pathogens like coronaviruses. Similarly, power networks, threatened by cyber-attacks, desire cyber-immunity. Inspired by the immunology research, this study develops a cyber-immune strategy—characterizing <italic>innate cyber-immunity</i> and establishing <italic>acquired cyber-immunity</i>—for any selected portion of a power network (termed as <italic>power subnetwork</i>) against stealthy false data injection (FDI) cyber-attacks. Therein, without extrinsic protection and information asymmetry, this paper for the first time confirms the existence and provides closed-form conditions for power subnetworks that are innately immune to FDI cyber-attacks despite all measurements being compromised. Single-leader-multi-follower bi-level optimization models are then developed to strategically allocate measurement protection, leading to the acquired cyber-immunity, whose conditions for existence and the least cost are explicitly formulated. More importantly, a bi-directional cyber-immunity propagation mechanism is presented to provide the optimal spatial allocation of defense resources across adjacent subnetworks. It also explicitly determines the temporal allocation sequence, revealing its sequential and cumulative impacts on establishing cyber-immunity. This is achieved by designing recursive traversal algorithms, one of which is modelled as a post-order depth-first-search problem of a multi-fork tree. The proposed subnetwork-specific cyber-immune strategy is verified in a modified Australian National Electricity Market.","PeriodicalId":13373,"journal":{"name":"IEEE Transactions on Power Systems","volume":"40 5","pages":"3859-3873"},"PeriodicalIF":7.2000,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Power Systems","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10930732/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Organisms have evolved innate and acquired immune systems to defend against pathogens like coronaviruses. Similarly, power networks, threatened by cyber-attacks, desire cyber-immunity. Inspired by the immunology research, this study develops a cyber-immune strategy—characterizing innate cyber-immunity and establishing acquired cyber-immunity—for any selected portion of a power network (termed as power subnetwork) against stealthy false data injection (FDI) cyber-attacks. Therein, without extrinsic protection and information asymmetry, this paper for the first time confirms the existence and provides closed-form conditions for power subnetworks that are innately immune to FDI cyber-attacks despite all measurements being compromised. Single-leader-multi-follower bi-level optimization models are then developed to strategically allocate measurement protection, leading to the acquired cyber-immunity, whose conditions for existence and the least cost are explicitly formulated. More importantly, a bi-directional cyber-immunity propagation mechanism is presented to provide the optimal spatial allocation of defense resources across adjacent subnetworks. It also explicitly determines the temporal allocation sequence, revealing its sequential and cumulative impacts on establishing cyber-immunity. This is achieved by designing recursive traversal algorithms, one of which is modelled as a post-order depth-first-search problem of a multi-fork tree. The proposed subnetwork-specific cyber-immune strategy is verified in a modified Australian National Electricity Market.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
跨多区域电力系统的先天网络免疫和获得性网络免疫
生物已经进化出先天和获得性免疫系统来抵御冠状病毒等病原体。同样,受到网络攻击威胁的电力网络也希望获得网络豁免权。受免疫学研究的启发,本研究针对电力网络(称为电力子网)的任何选定部分,开发了一种网络免疫策略——表征先天网络免疫并建立获得性网络免疫,以抵御隐形虚假数据注入(FDI)网络攻击。其中,在没有外部保护和信息不对称的情况下,本文首次证实了电力子网的存在,并提供了在所有测量都被破坏的情况下,对FDI网络攻击天生免疫的封闭条件。在此基础上,建立了单先导-多跟随双级优化模型,对测量保护进行了策略分配,得到了获得性网络免疫的存在条件和最小代价。更重要的是,提出了一种双向网络免疫传播机制,以提供相邻子网间防御资源的最优空间分配。明确确定了时间分配顺序,揭示了其对建立网络免疫的顺序和累积影响。这是通过设计递归遍历算法来实现的,其中一个算法被建模为多叉树的后阶深度优先搜索问题。提出的子网特定网络免疫策略在修改后的澳大利亚国家电力市场中得到验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Power Systems
IEEE Transactions on Power Systems 工程技术-工程:电子与电气
CiteScore
15.80
自引率
7.60%
发文量
696
审稿时长
3 months
期刊介绍: The scope of IEEE Transactions on Power Systems covers the education, analysis, operation, planning, and economics of electric generation, transmission, and distribution systems for general industrial, commercial, public, and domestic consumption, including the interaction with multi-energy carriers. The focus of this transactions is the power system from a systems viewpoint instead of components of the system. It has five (5) key areas within its scope with several technical topics within each area. These areas are: (1) Power Engineering Education, (2) Power System Analysis, Computing, and Economics, (3) Power System Dynamic Performance, (4) Power System Operations, and (5) Power System Planning and Implementation.
期刊最新文献
Integrated Primary-Secondary Distribution System State Estimation With Bimodal Error Distribution Speed and Generalization Testing of a Graph-Neural-Network-Based Cascading Blackout Model A Higher-Order Tensor Enhanced Algorithm For Synchrophasor Data Anomaly Identification An End-to-End Cost-Focused Wind Power Forecasting Framework Based on Convex Hulls Toward Realism: Sparse Matrix Statistics in the North American and Synthetic Electric Grid Models
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1