首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Counteractive control against cyber-attack uncertainties on frequency regulation in the power system 电网频率调节中网络攻击不确定性的反主动控制
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-11-24 DOI: 10.1049/iet-cps.2019.0097
Sheetla Prasad

In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack vulnerabilities and paid less attention on design of counteractive robust control scheme for LFC problem. Thus, observer based control scheme is designed here and provides robust performance against unknown input attack uncertainty and communication time-delay attack uncertainty. The generalized extended state observer (GESO) is used not only for state and disturbance estimation but also for disturbance rejection of the system. The said observer ensures accurate estimation of the actual states leading to convergence of estimation error to zero. So, the observer based linear quadratic regulator (LQR) is used to regulate the closed-loop damping ratio against cyber-attack uncertainty. In addition to fast response in terms of settling time and reduced over/undershoots, the proposed control scheme satisfactorily compensates the cyber-attack uncertainties in power system cyber physical networks and also compared with existing traditional PI and PID controllers. The simulation results demonstrate the robustness in terms of stability and effectiveness in terms of system security with proposed controller when subjected to cyber-attack uncertainties and load disturbances.

针对网络攻击的不确定性,提出了一种基于观测器的负载频率控制策略。大多数研究工作都集中在存在网络攻击漏洞的检测方案或延迟估计方案上,而很少关注LFC问题的反主动鲁棒控制方案的设计。因此,本文设计了基于观测器的控制方案,对未知输入攻击的不确定性和通信时延攻击的不确定性具有鲁棒性。广义扩展状态观测器(GESO)不仅用于系统的状态估计和扰动估计,而且用于系统的扰动抑制。所述观测器确保了对实际状态的准确估计,从而使估计误差收敛到零。因此,采用基于观测器的线性二次型调节器(LQR)来调节闭环阻尼比以应对网络攻击的不确定性。该控制方案不仅在稳定时间上响应速度快,而且在过欠冲量上减少,还能较好地补偿电力系统网络物理网络中网络攻击的不确定性,并与现有的传统PI和PID控制器进行了比较。仿真结果表明,该控制器在面对网络攻击的不确定性和负载干扰时,具有良好的稳定性和安全性。
{"title":"Counteractive control against cyber-attack uncertainties on frequency regulation in the power system","authors":"Sheetla Prasad","doi":"10.1049/iet-cps.2019.0097","DOIUrl":"10.1049/iet-cps.2019.0097","url":null,"abstract":"<div>\u0000 <p>In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack vulnerabilities and paid less attention on design of counteractive robust control scheme for LFC problem. Thus, observer based control scheme is designed here and provides robust performance against unknown input attack uncertainty and communication time-delay attack uncertainty. The generalized extended state observer (GESO) is used not only for state and disturbance estimation but also for disturbance rejection of the system. The said observer ensures accurate estimation of the actual states leading to convergence of estimation error to zero. So, the observer based linear quadratic regulator (LQR) is used to regulate the closed-loop damping ratio against cyber-attack uncertainty. In addition to fast response in terms of settling time and reduced over/undershoots, the proposed control scheme satisfactorily compensates the cyber-attack uncertainties in power system cyber physical networks and also compared with existing traditional PI and PID controllers. The simulation results demonstrate the robustness in terms of stability and effectiveness in terms of system security with proposed controller when subjected to cyber-attack uncertainties and load disturbances.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"394-408"},"PeriodicalIF":1.5,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126359742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Formal verification of ontology transformation for distribution network information model based on meta-model theory 基于元模型理论的配电网信息模型本体转换形式化验证
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-11-10 DOI: 10.1049/iet-cps.2020.0018
Boya Qin, Dong Liu, Yiming Lu

This study presents a formal description and verification method of the ontology transformation process of the distribution network information model based on the meta-model theory. By defining the dynamic change structures and model mapping constraints of the ontology transformation process of distribution network, a formalised specification for describing the key attributes of model updating and model mapping processes was constructed. The model updating and model mapping instances were specified using model checking verification tool SPIN. The method fundamentally guarantees the standardisation and reliability of the model ontology transformation process achieved by the meta-model.

本文提出了一种基于元模型理论的配电网信息模型本体转换过程的形式化描述和验证方法。通过定义配电网本体转换过程的动态变化结构和模型映射约束,构建了描述模型更新和模型映射过程关键属性的形式化规范。使用模型检查验证工具SPIN指定模型更新和模型映射实例。该方法从根本上保证了元模型实现的模型本体转换过程的规范化和可靠性。
{"title":"Formal verification of ontology transformation for distribution network information model based on meta-model theory","authors":"Boya Qin,&nbsp;Dong Liu,&nbsp;Yiming Lu","doi":"10.1049/iet-cps.2020.0018","DOIUrl":"10.1049/iet-cps.2020.0018","url":null,"abstract":"<div>\u0000 <p>This study presents a formal description and verification method of the ontology transformation process of the distribution network information model based on the meta-model theory. By defining the dynamic change structures and model mapping constraints of the ontology transformation process of distribution network, a formalised specification for describing the key attributes of model updating and model mapping processes was constructed. The model updating and model mapping instances were specified using model checking verification tool SPIN. The method fundamentally guarantees the standardisation and reliability of the model ontology transformation process achieved by the meta-model.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"388-393"},"PeriodicalIF":1.5,"publicationDate":"2020-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2020.0018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126191633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wyner wiretap-like encoding scheme for cyber-physical systems 用于网络物理系统的Wyner窃听式编码方案
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-30 DOI: 10.1049/iet-cps.2020.0012
Walter Lucia, Amr Youssef

In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop operations typical of feedback control systems. Specifically, by resorting to the control concept of one-step reachable sets, they first show that a wiretap-like encoding scheme exists whenever there is an asymmetry in the plant model knowledge available to control system (the defender) and to the eavesdropper. The effectiveness of the proposed scheme is confirmed by means of a numerical example. Finally, they conclude the study by presenting open design challenges that can be addressed by the research community to improve, in different directions, the secrete message exchange problem in CPSs.

在这项研究中,作者考虑了在网络物理系统(cps)中交换秘密消息而不诉诸加密解决方案的问题。特别是,他们考虑了一个CPS,其中联网控制器想要向工厂发送秘密消息。他们表明,这种问题可以通过利用反馈控制系统典型的闭环操作的Wyner窃听式编码方案来解决。具体而言,通过采用一步可达集的控制概念,他们首先表明,只要控制系统(防御者)和窃听者可用的植物模型知识存在不对称,就存在类似窃听的编码方案。通过算例验证了该方法的有效性。最后,他们通过提出开放设计挑战来总结研究,这些挑战可以由研究界解决,从不同的方向改进cps中的秘密消息交换问题。
{"title":"Wyner wiretap-like encoding scheme for cyber-physical systems","authors":"Walter Lucia,&nbsp;Amr Youssef","doi":"10.1049/iet-cps.2020.0012","DOIUrl":"10.1049/iet-cps.2020.0012","url":null,"abstract":"<div>\u0000 <p>In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop operations typical of feedback control systems. Specifically, by resorting to the control concept of one-step reachable sets, they first show that a wiretap-like encoding scheme exists whenever there is an asymmetry in the plant model knowledge available to control system (the defender) and to the eavesdropper. The effectiveness of the proposed scheme is confirmed by means of a numerical example. Finally, they conclude the study by presenting open design challenges that can be addressed by the research community to improve, in different directions, the secrete message exchange problem in CPSs.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"359-365"},"PeriodicalIF":1.5,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2020.0012","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127539766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unified Smith predictor-based loop-shaping H ∞ damping controller for mitigating inter-area oscillations in power system 基于统一Smith预测器的环整形H∞阻尼控制器缓解电力系统区域间振荡
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-21 DOI: 10.1049/iet-cps.2020.0030
Mithu Sarkar, Bidyadhar Subudhi

Low-frequency inter-area oscillation is one of the major problems to transfer the bulk power from one area to another area in an interconnected large power system. A wide-area signal-based controller is more effective to improve the damping of the inter-area oscillation than a local area signal-based controller. A wide-area measurement system makes it easier to transmit the wide-area signal through the communication system from the remote location to the controller site. However, the involvement of the unavoidable time delay in the wide-area signal transmission from a remote area to a controller site is to possess a great deal of challenge to design a damping controller. In this study, a unified Smith predictor (USP)-based loop shaping controller is designed to handle the negative effect of the delay using the wide-area signal. The robust stabilization normalised co-prime factor problem is converted into a generalised H optimisation problem for additional pole placement constraints. The performances of the USP-based loop-shaping H controller are compared with the USP-based H controller. From the obtained results, it is verified that the proposed controller gives an excellent damping performance and handles the effect of time delay.

在大型互联电力系统中,低频区域间振荡是大容量电力从一个区域传输到另一个区域的主要问题之一。基于广域信号的控制器比基于局部信号的控制器更有效地改善了区域间振荡的阻尼。广域测量系统使广域信号通过通信系统从远程位置传输到控制器站点变得更加容易。然而,广域信号从遥远的区域传输到控制器站点时,不可避免的时间延迟给阻尼控制器的设计带来了很大的挑战。在本研究中,设计了一个统一的基于Smith预测器(USP)的环路整形控制器来处理使用广域信号的延迟的负面影响。将鲁棒镇定归一化协素因子问题转化为具有附加极点布置约束的广义H∞优化问题。比较了基于usp的环整形H∞控制器与基于usp的H∞控制器的性能。仿真结果表明,所设计的控制器具有良好的阻尼性能,并能有效地处理时延的影响。
{"title":"Unified Smith predictor-based loop-shaping H ∞ damping controller for mitigating inter-area oscillations in power system","authors":"Mithu Sarkar,&nbsp;Bidyadhar Subudhi","doi":"10.1049/iet-cps.2020.0030","DOIUrl":"10.1049/iet-cps.2020.0030","url":null,"abstract":"<div>\u0000 <p>Low-frequency inter-area oscillation is one of the major problems to transfer the bulk power from one area to another area in an interconnected large power system. A wide-area signal-based controller is more effective to improve the damping of the inter-area oscillation than a local area signal-based controller. A wide-area measurement system makes it easier to transmit the wide-area signal through the communication system from the remote location to the controller site. However, the involvement of the unavoidable time delay in the wide-area signal transmission from a remote area to a controller site is to possess a great deal of challenge to design a damping controller. In this study, a unified Smith predictor (USP)-based loop shaping controller is designed to handle the negative effect of the delay using the wide-area signal. The robust stabilization normalised co-prime factor problem is converted into a generalised <i>H</i> <sub>∞</sub> optimisation problem for additional pole placement constraints. The performances of the USP-based loop-shaping <i>H</i> <sub>∞</sub> controller are compared with the USP-based <i>H</i> <sub>∞</sub> controller. From the obtained results, it is verified that the proposed controller gives an excellent damping performance and handles the effect of time delay.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"366-375"},"PeriodicalIF":1.5,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2020.0030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134578953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data privacy-based coordinated placement method of workflows and data 基于数据隐私的工作流和数据协调放置方法
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-21 DOI: 10.1049/iet-cps.2020.0007
Tao Huang, Shengjun Xue, Yumei Hu, Yiran Shi, Wei Jin

With the rapid development of data acquisition technology, many industries data already have the characteristics of big data and cloud technology has provided strong support for the storage and complex calculations of these massive data. The meteorological department established the cloud data centre based on the existing storage and computing resources and re-arranged the historical data to reduce the historical data access time of applications. However, the placement of each workflow and input data also affects the average data access time, which in turn affects the computing efficiency of the cloud data centre. At the same time, because of the collaborative processing of multiple nodes, the resource utilisation of cloud data centre has also been paid more and more attention. In addition, with the increase of data security requirements, some privacy conflict data should avoid being placed on the same or neighbouring nodes. In response to this challenge, based on the fat-tree network topology, this study proposes a data privacy protection-based collaborative placement strategy of workflow and data to jointly optimise the average data access time, the average resource utilisation, and the data conflict degree. Finally, a large number of experimental evaluations and comparative analyses verify the efficiency of the proposed method.

随着数据采集技术的快速发展,许多行业数据已经具备了大数据的特征,云技术为这些海量数据的存储和复杂计算提供了强有力的支持。气象部门在现有存储和计算资源的基础上建立了云数据中心,并对历史数据进行了重新排列,减少了应用程序对历史数据的访问时间。但是,每个工作流和输入数据的位置也会影响平均数据访问时间,从而影响云数据中心的计算效率。同时,由于多节点的协同处理,云数据中心的资源利用也越来越受到重视。此外,随着数据安全性要求的提高,一些隐私冲突的数据应避免放置在相同或相邻的节点上。针对这一挑战,本研究基于胖树网络拓扑,提出了一种基于数据隐私保护的工作流与数据协同放置策略,共同优化平均数据访问时间、平均资源利用率和数据冲突程度。最后,通过大量的实验评估和对比分析,验证了所提方法的有效性。
{"title":"Data privacy-based coordinated placement method of workflows and data","authors":"Tao Huang,&nbsp;Shengjun Xue,&nbsp;Yumei Hu,&nbsp;Yiran Shi,&nbsp;Wei Jin","doi":"10.1049/iet-cps.2020.0007","DOIUrl":"10.1049/iet-cps.2020.0007","url":null,"abstract":"<div>\u0000 <p>With the rapid development of data acquisition technology, many industries data already have the characteristics of big data and cloud technology has provided strong support for the storage and complex calculations of these massive data. The meteorological department established the cloud data centre based on the existing storage and computing resources and re-arranged the historical data to reduce the historical data access time of applications. However, the placement of each workflow and input data also affects the average data access time, which in turn affects the computing efficiency of the cloud data centre. At the same time, because of the collaborative processing of multiple nodes, the resource utilisation of cloud data centre has also been paid more and more attention. In addition, with the increase of data security requirements, some privacy conflict data should avoid being placed on the same or neighbouring nodes. In response to this challenge, based on the fat-tree network topology, this study proposes a data privacy protection-based collaborative placement strategy of workflow and data to jointly optimise the average data access time, the average resource utilisation, and the data conflict degree. Finally, a large number of experimental evaluations and comparative analyses verify the efficiency of the proposed method.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"342-350"},"PeriodicalIF":1.5,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2020.0007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agent system for the reactive fleet maintenance support planning of a fleet of mobile cyber–physical systems 基于多智能体的机动网络物理系统机队被动维护支持规划
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-21 DOI: 10.1049/iet-cps.2019.0063
John Mbuli, Tarik Chargui, Damien Trentesaux, Abdelghani Bekrar, Thierry Dailly

Improving the availability and reliability of a fleet of mobile cyber–physical systems as well as the ability to adapt the maintenance planning decisions when facing unexpected events at the fleet level is a major stake faced by the manufacturers and the operators. In the context of this study, the authors propose a reactive multi-agent system model for the fleet maintenance planning of mobile cyber–physical systems. For that purpose, the ANEMONA multi-agent design methodology is used. In this methodology, the agents are modelled and then their organisational and interaction views are described. Numerical experiments are carried out in static and dynamic contexts. In a static context, the proposed multi-agent system is compared with a mathematical programming model to validate the effectiveness of the former in satisfying the fleet's availability and reliability expectations. In a dynamic context, simulated perturbations are used to illustrate the reactivity of the proposed multi-agent system. Lastly, an application to rail transport for the maintenance of a fleet of trains at Bombardier Transportation France is proposed. For that purpose, the proposed multi-agent system is integrated in the model layer of a decision support system named ‘MainFleet’ which is currently under development.

提高移动网络物理系统车队的可用性和可靠性,以及在车队层面面对意外事件时适应维护计划决策的能力,是制造商和运营商面临的主要问题。在本研究的背景下,作者提出了一个反应性多智能体系统模型,用于移动网络物理系统的车队维护计划。为此,使用了ANEMONA多智能体设计方法。在这种方法中,对代理进行建模,然后描述它们的组织和交互视图。在静态和动态环境下进行了数值实验。在静态环境下,将所提出的多智能体系统与数学规划模型进行了比较,验证了前者在满足车队可用性和可靠性期望方面的有效性。在动态环境中,模拟扰动用于说明所提出的多智能体系统的反应性。最后,提出了庞巴迪法国运输公司在铁路运输中维护一批列车的应用。为此,提议的多智能体系统被集成到一个名为“MainFleet”的决策支持系统的模型层中,该系统目前正在开发中。
{"title":"Multi-agent system for the reactive fleet maintenance support planning of a fleet of mobile cyber–physical systems","authors":"John Mbuli,&nbsp;Tarik Chargui,&nbsp;Damien Trentesaux,&nbsp;Abdelghani Bekrar,&nbsp;Thierry Dailly","doi":"10.1049/iet-cps.2019.0063","DOIUrl":"10.1049/iet-cps.2019.0063","url":null,"abstract":"<div>\u0000 <p>Improving the availability and reliability of a fleet of mobile cyber–physical systems as well as the ability to adapt the maintenance planning decisions when facing unexpected events at the fleet level is a major stake faced by the manufacturers and the operators. In the context of this study, the authors propose a reactive multi-agent system model for the fleet maintenance planning of mobile cyber–physical systems. For that purpose, the ANEMONA multi-agent design methodology is used. In this methodology, the agents are modelled and then their organisational and interaction views are described. Numerical experiments are carried out in static and dynamic contexts. In a static context, the proposed multi-agent system is compared with a mathematical programming model to validate the effectiveness of the former in satisfying the fleet's availability and reliability expectations. In a dynamic context, simulated perturbations are used to illustrate the reactivity of the proposed multi-agent system. Lastly, an application to rail transport for the maintenance of a fleet of trains at Bombardier Transportation France is proposed. For that purpose, the proposed multi-agent system is integrated in the model layer of a decision support system named ‘MainFleet’ which is currently under development.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"376-387"},"PeriodicalIF":1.5,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122311680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid 智能电网自动发电控制隐身网络攻击检测算法研究
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-15 DOI: 10.1049/iet-cps.2019.0074
Fatemeh Akbarian, Amin Ramezani, Mohammad-Taghi Hamidi-Beheshti, Vahid Haghighat

One of the basic requirements of today's sophisticated world is the availability of electrical energy, and neglect of this matter may have irreparable damages such as an extensive blackout. The problems which were introduced about the traditional power grid, and also, the growing advances in smart technologies make the traditional power grid go towards smart power grid. Although widespread utilisation of telecommunication networks in smart power grid enhances the efficiency of the system, it will create a critical platform for cyber attacks and penetration into the system. Automatic generation control (AGC) is a fundamental control system in the power grid, and it is responsible for controlling the frequency of the grid. An attack on the data transmitted through the telecommunications link from the sensors to the AGC will cause frequency deviation, resulting in disconnection of the load, generators and ultimately global blackout. In this study, by using a Kalman filter and a proposed detector, a solution has been presented to detect the attack before it can affect the system. Contrary to existing methods, this method is able to detect attacks that are stealthy from the area control error signal and χ2 -detector. Simulations confirm the effectiveness of this method.

当今复杂世界的基本要求之一是电能的可用性,忽视这一问题可能会造成无法弥补的损害,例如大面积停电。传统电网存在的问题以及智能技术的不断发展,使传统电网向着智能电网的方向发展。尽管在智能电网中广泛使用电信网络提高了系统的效率,但它将为网络攻击和渗透系统创造一个关键平台。自动发电控制(AGC)是电网中的一项基本控制系统,它负责控制电网的频率。对通过电信链路从传感器传输到AGC的数据进行攻击将导致频率偏差,导致负载和发电机断开连接,最终导致全球停电。在本研究中,通过使用卡尔曼滤波器和提出的检测器,提出了在攻击影响系统之前检测攻击的解决方案。与现有方法不同的是,该方法能够从区域控制误差信号和χ2检测器中检测出隐蔽的攻击。仿真结果验证了该方法的有效性。
{"title":"Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid","authors":"Fatemeh Akbarian,&nbsp;Amin Ramezani,&nbsp;Mohammad-Taghi Hamidi-Beheshti,&nbsp;Vahid Haghighat","doi":"10.1049/iet-cps.2019.0074","DOIUrl":"10.1049/iet-cps.2019.0074","url":null,"abstract":"<div>\u0000 <p>One of the basic requirements of today's sophisticated world is the availability of electrical energy, and neglect of this matter may have irreparable damages such as an extensive blackout. The problems which were introduced about the traditional power grid, and also, the growing advances in smart technologies make the traditional power grid go towards smart power grid. Although widespread utilisation of telecommunication networks in smart power grid enhances the efficiency of the system, it will create a critical platform for cyber attacks and penetration into the system. Automatic generation control (AGC) is a fundamental control system in the power grid, and it is responsible for controlling the frequency of the grid. An attack on the data transmitted through the telecommunications link from the sensors to the AGC will cause frequency deviation, resulting in disconnection of the load, generators and ultimately global blackout. In this study, by using a Kalman filter and a proposed detector, a solution has been presented to detect the attack before it can affect the system. Contrary to existing methods, this method is able to detect attacks that are stealthy from the area control error signal and χ<sup>2</sup> -detector. Simulations confirm the effectiveness of this method.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"351-358"},"PeriodicalIF":1.5,"publicationDate":"2020-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115587470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Private routing and ride-sharing using homomorphic encryption 使用同态加密的私有路由和乘车共享
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-13 DOI: 10.1049/iet-cps.2019.0042
Farhad Farokhi, Iman Shames, Karl H. Johansson

A framework for private and secure communication and interaction between agents interacting in transportation services is developed. An agent, i.e. a user, can ask questions or submit queries regarding whether the other agents, i.e. drivers, use the desired road at specific times of the day in an encrypted fashion. The authors developed the framework using semi-homomorphic encryption (namely, the Paillier's encryption method) to enable the algebraic manipulation of plain data without the need for decryption using appropriate computations over the encrypted data. Strong privacy and security guarantees are proved for the agents. Subsequently, the semi-homomorphic encryption method is utilised to develop privacy-aware ride-sharing and routing algorithms without the need for disclosing the origin and destination of the user.

开发了一个用于运输服务中交互代理之间的私有和安全通信和交互的框架。代理(即用户)可以以加密的方式询问或提交有关其他代理(即司机)是否在一天中的特定时间使用所需道路的问题或查询。作者开发了使用半同态加密(即Paillier加密方法)的框架,以实现对普通数据的代数操作,而无需对加密数据使用适当的计算进行解密。为代理提供了强大的隐私和安全保障。随后,利用半同态加密方法开发隐私感知的拼车和路由算法,而无需披露用户的来源和目的地。
{"title":"Private routing and ride-sharing using homomorphic encryption","authors":"Farhad Farokhi,&nbsp;Iman Shames,&nbsp;Karl H. Johansson","doi":"10.1049/iet-cps.2019.0042","DOIUrl":"10.1049/iet-cps.2019.0042","url":null,"abstract":"<div>\u0000 <p>A framework for private and secure communication and interaction between agents interacting in transportation services is developed. An agent, i.e. a user, can ask questions or submit queries regarding whether the other agents, i.e. drivers, use the desired road at specific times of the day in an encrypted fashion. The authors developed the framework using semi-homomorphic encryption (namely, the Paillier's encryption method) to enable the algebraic manipulation of plain data without the need for decryption using appropriate computations over the encrypted data. Strong privacy and security guarantees are proved for the agents. Subsequently, the semi-homomorphic encryption method is utilised to develop privacy-aware ride-sharing and routing algorithms without the need for disclosing the origin and destination of the user.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"311-320"},"PeriodicalIF":1.5,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0042","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114536400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT cloud-based cyber-physical system for efficient solid waste management in smart cities: a novel cost function based route optimisation technique for waste collection vehicles using dustbin sensors and real-time road traffic informatics 智能城市中高效固体废物管理的基于物联网云的网络物理系统:一种基于成本函数的新型路线优化技术,用于使用垃圾箱传感器和实时道路交通信息的废物收集车辆
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-12 DOI: 10.1049/iet-cps.2019.0110
Ayaskanta Mishra, Arun Kumar Ray

IoT cloud-based connected smart dustbins (equipped with sensors) are imperative for efficient waste management in smart city. Municipal agencies can reduce the use of both man and machine by cutting down their overall waste collection route distance as well as number of waste collection vehicles (WCVs) by deploying this proposed cyber-physical system for route optimization of WCVs with capacitated vehicle-routing model. A novel cost function is mathematically modelled using data from dustbin-sensors and real-time road-traffic with modified Dijkstra's algorithm for optimisation of WCVs routes. Amount of solid waste in the dustbin (GC in %), rate of the filling (ΔG) and real-time/dynamic road traffic information from Google distance matrix advanced application programming interface (API) are used for estimation of the optimised route for WCVs. Optimisation goal of this work is to reduce both capital expense (CapEx) and operational expense (OpEx) of solid waste collection in the city by cutting the WCV fleet size and reducing overall distance covered by WCVs. The proposed route optimisation technique is analytically simulated for Bhubaneswar smart city and the result shows 30.28% saving in overall WCVs route distance and hence reducing OpEx around 29.07% and CapEx around 26.83% by reducing WCV fleet size.

基于物联网云的智能垃圾箱(配备传感器)是智慧城市高效垃圾管理的必要条件。市政机构可以通过减少其废物收集路线的总距离以及废物收集车辆(wcv)的数量来减少人和机器的使用,通过部署该建议的网络物理系统来优化具有容量车辆路线模型的废物收集车辆的路线。利用垃圾箱传感器和实时道路交通的数据,利用改进的Dijkstra算法对wcv路线进行优化,建立了一个新的成本函数数学模型。利用垃圾桶中固体废物量(GC %)、填充率(ΔG)和来自Google距离矩阵高级应用程序编程接口(API)的实时/动态道路交通信息来估计wcv的优化路线。这项工作的优化目标是通过减少WCV车队规模和减少WCV覆盖的总距离来减少城市固体废物收集的资本支出(CapEx)和运营支出(OpEx)。所提出的路线优化技术对布巴内斯瓦尔智慧城市进行了分析模拟,结果显示,通过减少WCV车队规模,总体WCV路线距离节省了30.28%,从而减少了约29.07%的运营成本和约26.83%的资本支出。
{"title":"IoT cloud-based cyber-physical system for efficient solid waste management in smart cities: a novel cost function based route optimisation technique for waste collection vehicles using dustbin sensors and real-time road traffic informatics","authors":"Ayaskanta Mishra,&nbsp;Arun Kumar Ray","doi":"10.1049/iet-cps.2019.0110","DOIUrl":"10.1049/iet-cps.2019.0110","url":null,"abstract":"<div>\u0000 <p>IoT cloud-based connected smart dustbins (equipped with sensors) are imperative for efficient waste management in smart city. Municipal agencies can reduce the use of both man and machine by cutting down their overall waste collection route distance as well as number of waste collection vehicles (WCVs) by deploying this proposed cyber-physical system for route optimization of WCVs with capacitated vehicle-routing model. A novel cost function is mathematically modelled using data from dustbin-sensors and real-time road-traffic with modified Dijkstra's algorithm for optimisation of WCVs routes. Amount of solid waste in the dustbin (GC in %), rate of the filling (<i>ΔG</i>) and real-time/dynamic road traffic information from Google distance matrix advanced application programming interface (API) are used for estimation of the optimised route for WCVs. Optimisation goal of this work is to reduce both capital expense (CapEx) and operational expense (OpEx) of solid waste collection in the city by cutting the WCV fleet size and reducing overall distance covered by WCVs. The proposed route optimisation technique is analytically simulated for Bhubaneswar smart city and the result shows 30.28% saving in overall WCVs route distance and hence reducing OpEx around 29.07% and CapEx around 26.83% by reducing WCV fleet size.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"330-341"},"PeriodicalIF":1.5,"publicationDate":"2020-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0110","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131068222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cyber attacks in smart grid – dynamic impacts, analyses and recommendations 智能电网中的网络攻击——动态影响、分析和建议
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-10-02 DOI: 10.1049/iet-cps.2019.0103
B.M. Ruhul Amin, Seyedfoad Taghizadeh, Md. Shihanur Rahman, Md. Jahangir Hossain, Vijay Varadharajan, Zhiyong Chen

Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems. As a well-known practice, steady-state analysis is commonly used to identify cyber attacks and provide effective solutions. However, it cannot fully cover non-linear behaviours and cascaded blackouts of the system caused by dynamic perturbations, as well as provide a post-disturbance operating point. This study presents a novel approach based on dynamic analysis that excludes the limitations of the steady-state analysis and can be used in the events of various cyber attacks. Four types of common attacks are reviewed, and their dynamic impacts are shown on the IEEE benchmark model of the Western System Coordinating Council system implemented in MATLAB Simulink. Then, recommendations are provided to enhance the security of the future smart power grids from the possible cyber attacks.

网络攻击会导致智能电网的级联故障和停电。因此,明确网络攻击的类型、影响和解决方案,确保电力系统的安全运行是非常必要的。作为一种众所周知的实践,稳态分析通常用于识别网络攻击并提供有效的解决方案。然而,它不能完全覆盖由动态扰动引起的系统的非线性行为和级联停电,也不能提供扰动后的工作点。本研究提出了一种基于动态分析的新方法,排除了稳态分析的局限性,可用于各种网络攻击事件。综述了四种常见的攻击类型,并对MATLAB Simulink实现的西方系统协调委员会系统的IEEE基准模型进行了动态影响分析。在此基础上,提出了提高未来智能电网安全防范网络攻击的建议。
{"title":"Cyber attacks in smart grid – dynamic impacts, analyses and recommendations","authors":"B.M. Ruhul Amin,&nbsp;Seyedfoad Taghizadeh,&nbsp;Md. Shihanur Rahman,&nbsp;Md. Jahangir Hossain,&nbsp;Vijay Varadharajan,&nbsp;Zhiyong Chen","doi":"10.1049/iet-cps.2019.0103","DOIUrl":"10.1049/iet-cps.2019.0103","url":null,"abstract":"<div>\u0000 <p>Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems. As a well-known practice, steady-state analysis is commonly used to identify cyber attacks and provide effective solutions. However, it cannot fully cover non-linear behaviours and cascaded blackouts of the system caused by dynamic perturbations, as well as provide a post-disturbance operating point. This study presents a novel approach based on dynamic analysis that excludes the limitations of the steady-state analysis and can be used in the events of various cyber attacks. Four types of common attacks are reviewed, and their dynamic impacts are shown on the IEEE benchmark model of the Western System Coordinating Council system implemented in MATLAB Simulink. Then, recommendations are provided to enhance the security of the future smart power grids from the possible cyber attacks.</p>\u0000 </div>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"5 4","pages":"321-329"},"PeriodicalIF":1.5,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/iet-cps.2019.0103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1