Guest editorial: Secure and resilient operations of cyber-physical urban energy systems

IF 1.6 Q4 ENERGY & FUELS IET Energy Systems Integration Pub Date : 2022-05-19 DOI:10.1049/esi2.12074
Yan Li
{"title":"Guest editorial: Secure and resilient operations of cyber-physical urban energy systems","authors":"Yan Li","doi":"10.1049/esi2.12074","DOIUrl":null,"url":null,"abstract":"<p>Security and resilience of energy systems have become major concerns in energy engineering. Several recent power grid attacks, including the first known devastating cyber-attack in 2015 and the first US ‘denial of service’ attack to the western power grid in March 2019, remind us of the global challenge represented by energy system attacks launched through the cyber-communication network. Meanwhile, attacks on energy systems are growing in number, causing severe impacts on public health and national security.</p><p>Resilience is playing an essential role in operating a dynamic cyber-physical energy system, such as microgirid. Thus, it is necessary to systematically understand the operation mechanism of a dynamic energy system, to implement proper strategies to improve its resilience subject to disturbances or attacks. To advance those fields, scientific research is needed to study and develop novel technologies, including but not limited to resilience study, resilient control, attack detection, defense strategies, machine learning, and data analytics.</p><p>This Special Issue of IET Energy Systems Integration focuses on Secure and Resilient Operations of Cyber-Physical Urban Energy Systems. Brief descriptions of each of the three papers in the Special Issue are provided below. We encourage the readers to refer to the papers for more details.</p><p>In “Resilience Assessment Methodologies and Enhancement Strategies of Multi-Energy Cyber Physical Systems of the Distribution Network”, Yang et al. introduced an extensive review on the state-of-the-art-research of power systems resilience. They give a definition of the Multi-Energy Cyber Physical Systems resilience and summarise its related characteristics, and the models of extreme disasters and equipment vulnerability are analysed. The qualitative resilience assessment curve, indexes and process of the Multi-Energy Cyber Physical Systems are developed. They present the key improvement measures for the planning and operation of MECPSs resilience and the focus of future research.</p><p>In “Attack and Defence methods in cyber-physical power system (CPPS)”, Yang and Liu focus on dealing with the attacks against complex CPPS, by profiling the structure of CPPS and the potential threats, conducting an in-depth analysis of CPPS attack modes from the cyber and physical subsystems, and summarising the three-level security defense methods for CPPS in detail. The future technological development prospects of CPPS security research are explicitly addressed, which will provide technical support for building reliable, safe, and robust energy systems. Overall, this paper analyses and summarises the typical attack patterns and multi-dimensional defense methods of CPPS and presents four problems that need to be deeply studied and solved in CPPs defense, so as to provide a reference for the subsequent technical development. First, the existing research studies on CPPS security are based on the attacks that have been detected or have been intercepted, but there is a lack of effective research on the identification and defense against unknown attacks. Therefore, the identification and active defense without a priori information of unknown attacks are of great significance to improve the security of CPPS. Second, Coordinated Cyber-Physical Attacks (CCPA) is more destructive and stealthier than network attacks due to the diversity of attack combinations and the difficulty of attack detection. However, there is little research on CCPA, so the new defense methods against CCPA are the interesting topic worth exploring. Third, with the development of the new generation of artificial intelligence technology, represented by deep learning and reinforcement learning, it has shown powerful and good application effects in the field of CPPS attack detection and security defense. It is necessary to establish a comprehensive information collection mechanism and a unified CPPS attack sample database. It can be collaboratively shared among countries around the world. Fourth, the off-line simulation is mainly used to study the dynamic process of CPPS attack and defense, but it hardly demonstrates the complex and fast dynamic evolution of both cyber and physical sub-systems in CPPS. Therefore, there is an urgent need to establish a real experimental field, which will play an extremely important role in promoting CPPS system risk analysis, chain fault propagation, resource deployment and dynamic arming.</p><p>In “Vulnerability Analysis of Secondary Control System when Microgrid Suffering from Sequential DoS Attacks”, Wang et al. proposed a vulnerability assessment method when the microgrid suffering denial-of-service (DoS) attacks. The sequence model of the attack actions and ‘N-1’ contingency actions are proposed to find the traversal expression. With the traversal method, vulnerable factors of the microgrid can be interpreted by the proposed comprehensive vulnerability metric which provides an intuitive and easy way to understand the vulnerability of microgrid secondary control system. The metric is composed by four basic indicators which concern not only final states of the microgrid when a DoS attack ends, but also the dynamic process of the microgrid. To test the proposed metric, two mitigation methods with the purpose of mitigating the impact on the physical system caused by the DoS attacks are also proposed: the self-adaptive coefficient method and the fault tolerance method. Finally, a 33-node microgrid platform with 8 DGs has been built to test the proposed vulnerability assessment method. The study results show that the nodes with high cyber degree are the vulnerable nodes and the fault-tolerance method can provide a better mitigation result with the average metric 9.41 than the self-adaptive coefficient method with 9.03.</p>","PeriodicalId":33288,"journal":{"name":"IET Energy Systems Integration","volume":"4 2","pages":"157-158"},"PeriodicalIF":1.6000,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/esi2.12074","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Energy Systems Integration","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/esi2.12074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENERGY & FUELS","Score":null,"Total":0}
引用次数: 0

Abstract

Security and resilience of energy systems have become major concerns in energy engineering. Several recent power grid attacks, including the first known devastating cyber-attack in 2015 and the first US ‘denial of service’ attack to the western power grid in March 2019, remind us of the global challenge represented by energy system attacks launched through the cyber-communication network. Meanwhile, attacks on energy systems are growing in number, causing severe impacts on public health and national security.

Resilience is playing an essential role in operating a dynamic cyber-physical energy system, such as microgirid. Thus, it is necessary to systematically understand the operation mechanism of a dynamic energy system, to implement proper strategies to improve its resilience subject to disturbances or attacks. To advance those fields, scientific research is needed to study and develop novel technologies, including but not limited to resilience study, resilient control, attack detection, defense strategies, machine learning, and data analytics.

This Special Issue of IET Energy Systems Integration focuses on Secure and Resilient Operations of Cyber-Physical Urban Energy Systems. Brief descriptions of each of the three papers in the Special Issue are provided below. We encourage the readers to refer to the papers for more details.

In “Resilience Assessment Methodologies and Enhancement Strategies of Multi-Energy Cyber Physical Systems of the Distribution Network”, Yang et al. introduced an extensive review on the state-of-the-art-research of power systems resilience. They give a definition of the Multi-Energy Cyber Physical Systems resilience and summarise its related characteristics, and the models of extreme disasters and equipment vulnerability are analysed. The qualitative resilience assessment curve, indexes and process of the Multi-Energy Cyber Physical Systems are developed. They present the key improvement measures for the planning and operation of MECPSs resilience and the focus of future research.

In “Attack and Defence methods in cyber-physical power system (CPPS)”, Yang and Liu focus on dealing with the attacks against complex CPPS, by profiling the structure of CPPS and the potential threats, conducting an in-depth analysis of CPPS attack modes from the cyber and physical subsystems, and summarising the three-level security defense methods for CPPS in detail. The future technological development prospects of CPPS security research are explicitly addressed, which will provide technical support for building reliable, safe, and robust energy systems. Overall, this paper analyses and summarises the typical attack patterns and multi-dimensional defense methods of CPPS and presents four problems that need to be deeply studied and solved in CPPs defense, so as to provide a reference for the subsequent technical development. First, the existing research studies on CPPS security are based on the attacks that have been detected or have been intercepted, but there is a lack of effective research on the identification and defense against unknown attacks. Therefore, the identification and active defense without a priori information of unknown attacks are of great significance to improve the security of CPPS. Second, Coordinated Cyber-Physical Attacks (CCPA) is more destructive and stealthier than network attacks due to the diversity of attack combinations and the difficulty of attack detection. However, there is little research on CCPA, so the new defense methods against CCPA are the interesting topic worth exploring. Third, with the development of the new generation of artificial intelligence technology, represented by deep learning and reinforcement learning, it has shown powerful and good application effects in the field of CPPS attack detection and security defense. It is necessary to establish a comprehensive information collection mechanism and a unified CPPS attack sample database. It can be collaboratively shared among countries around the world. Fourth, the off-line simulation is mainly used to study the dynamic process of CPPS attack and defense, but it hardly demonstrates the complex and fast dynamic evolution of both cyber and physical sub-systems in CPPS. Therefore, there is an urgent need to establish a real experimental field, which will play an extremely important role in promoting CPPS system risk analysis, chain fault propagation, resource deployment and dynamic arming.

In “Vulnerability Analysis of Secondary Control System when Microgrid Suffering from Sequential DoS Attacks”, Wang et al. proposed a vulnerability assessment method when the microgrid suffering denial-of-service (DoS) attacks. The sequence model of the attack actions and ‘N-1’ contingency actions are proposed to find the traversal expression. With the traversal method, vulnerable factors of the microgrid can be interpreted by the proposed comprehensive vulnerability metric which provides an intuitive and easy way to understand the vulnerability of microgrid secondary control system. The metric is composed by four basic indicators which concern not only final states of the microgrid when a DoS attack ends, but also the dynamic process of the microgrid. To test the proposed metric, two mitigation methods with the purpose of mitigating the impact on the physical system caused by the DoS attacks are also proposed: the self-adaptive coefficient method and the fault tolerance method. Finally, a 33-node microgrid platform with 8 DGs has been built to test the proposed vulnerability assessment method. The study results show that the nodes with high cyber degree are the vulnerable nodes and the fault-tolerance method can provide a better mitigation result with the average metric 9.41 than the self-adaptive coefficient method with 9.03.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
嘉宾评论:网络物理城市能源系统的安全和弹性运行
能源系统的安全性和弹性已成为能源工程中的主要问题。最近几次电网攻击,包括2015年首次已知的破坏性网络攻击和2019年3月美国对西方电网的首次“拒绝服务”攻击,提醒我们通过网络通信网络发起的能源系统攻击所代表的全球挑战。与此同时,针对能源系统的攻击越来越多,对公众健康和国家安全造成了严重影响。弹性在运行动态网络-物理能源系统(如微电网)中起着至关重要的作用。因此,有必要系统地了解动态能源系统的运行机制,实施适当的策略,以提高其在受到干扰或攻击时的弹性。为了推进这些领域,需要科学研究来研究和开发新技术,包括但不限于弹性研究、弹性控制、攻击检测、防御策略、机器学习和数据分析。本期IET能源系统集成特刊重点关注网络物理城市能源系统的安全和弹性运行。以下是特刊中三篇论文的简要介绍。我们鼓励读者参考论文了解更多细节。在“配电网多能网络物理系统的弹性评估方法和增强策略”中,Yang等人对电力系统弹性的最新研究进行了广泛的回顾。给出了多能网络物理系统弹性的定义,总结了其相关特征,分析了极端灾害和设备脆弱性模型。建立了多能网络物理系统的定性弹性评估曲线、指标和流程。提出了mecps弹性规划与运行的关键改进措施和未来研究的重点。Yang和Liu在“网络物理电力系统(CPPS)的攻击与防御方法”一文中,通过对CPPS的结构和潜在威胁进行分析,从网络子系统和物理子系统深入分析了CPPS的攻击方式,并详细总结了CPPS的三级安全防御方法,重点研究了针对复杂CPPS的攻击处理。明确了CPPS安全研究的未来技术发展前景,为建设可靠、安全、稳健的能源系统提供技术支撑。总体而言,本文对CPPS的典型攻击模式和多维防御方法进行了分析和总结,提出了CPPS防御中需要深入研究和解决的四个问题,为后续技术发展提供参考。首先,现有的CPPS安全研究都是基于已检测到或已拦截的攻击,缺乏对未知攻击的识别和防御的有效研究。因此,对未知攻击进行无先验信息的识别和主动防御,对提高CPPS的安全性具有重要意义。其次,由于攻击组合的多样性和攻击检测的难度,协同网络物理攻击(CCPA)比网络攻击更具破坏性和隐蔽性。然而,针对CCPA的研究很少,因此针对CCPA的新防御方法是一个值得探索的有趣话题。第三,随着以深度学习和强化学习为代表的新一代人工智能技术的发展,在CPPS攻击检测和安全防御领域显示出强大而良好的应用效果。有必要建立全面的信息收集机制和统一的CPPS攻击样本库。它可以在世界各国之间协作共享。其四,离线仿真主要用于研究CPPS攻防的动态过程,难以体现CPPS中网络子系统和物理子系统复杂、快速的动态演化。因此,迫切需要建立一个真实的试验场,这将对促进CPPS系统风险分析、链故障传播、资源调配和动态武装等方面发挥极其重要的作用。Wang等人在《微电网遭受连续DoS攻击时二次控制系统脆弱性分析》中提出了微电网遭受DoS攻击时的脆弱性评估方法。提出了攻击动作和“N-1”偶然性动作的序列模型来寻找遍历表达式。 通过遍历法,提出的综合脆弱性度量可以解释微网的脆弱性因素,为理解微网二次控制系统的脆弱性提供了一种直观、简便的方法。该指标由四个基本指标组成,这些指标不仅关系到DoS攻击结束时微电网的最终状态,而且关系到微电网的动态过程。为了验证所提出的度量,还提出了两种缓解方法:自适应系数法和容错法,以减轻DoS攻击对物理系统的影响。最后,构建了包含8个dg的33节点微网平台,对提出的脆弱性评估方法进行了测试。研究结果表明,网络程度高的节点是易受攻击的节点,容错方法的平均度量值为9.41,优于自适应系数法的平均度量值9.03。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IET Energy Systems Integration
IET Energy Systems Integration Engineering-Engineering (miscellaneous)
CiteScore
5.90
自引率
8.30%
发文量
29
审稿时长
11 weeks
期刊最新文献
A reinforcement learning method for two-layer shipboard real-time energy management considering battery state estimation Cover Image Guest Editorial: Identification, stability analysis, control, and situation awareness of power systems with high penetrations of renewable energy resources Transient overvoltage suppression of LCC-HVDC sending-end system based on DC current control optimisation Theoretical study on Stark effect of Rydberg atom in super low frequency electric field measurement
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1