首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack 虚假数据注入攻击下交直流混合微电网的分布式弹性恢复策略
IF 1.5 Q1 Engineering Pub Date : 2023-05-15 DOI: 10.1049/cps2.12060
Yihe Wang, Luyuan Wang, Xiang Xiao, Haoran Cui, Liangsheng Lan

The AC/DC hybrid microgrid, which integrates AC microgrid and DC microgrid, greatly improves the flexibility of distributed energy. However, it is imperative to acknowledge that the microgrid in question is accompanied by a significantly elevated network security risk. To solve this problem, this article proposes a false data injection attack detection and alarm method based on active power output. The detection algorithm is capable of detecting attacks at any location within the microgrid and mitigating the impact of communication delay. Moreover, a distributed elastic recovery strategy based on the aforementioned detection algorithm is proposed. This strategy aims to expeditiously restore the compromised agent to its rated state. Finally, a simulation model is developed to demonstrate the effectiveness of the proposed strategy.

交直流混合微电网集成了交流微电网和直流微电网,大大提高了分布式能源的灵活性。然而,必须承认的是,这种微电网伴随着网络安全风险的大幅提升。为解决这一问题,本文提出了一种基于有功功率输出的虚假数据注入攻击检测和报警方法。该检测算法能够检测到微电网内任何位置的攻击,并减轻通信延迟的影响。此外,还提出了基于上述检测算法的分布式弹性恢复策略。该策略旨在将受攻击的代理迅速恢复到额定状态。最后,还开发了一个仿真模型来证明所提策略的有效性。
{"title":"Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack","authors":"Yihe Wang,&nbsp;Luyuan Wang,&nbsp;Xiang Xiao,&nbsp;Haoran Cui,&nbsp;Liangsheng Lan","doi":"10.1049/cps2.12060","DOIUrl":"10.1049/cps2.12060","url":null,"abstract":"<p>The AC/DC hybrid microgrid, which integrates AC microgrid and DC microgrid, greatly improves the flexibility of distributed energy. However, it is imperative to acknowledge that the microgrid in question is accompanied by a significantly elevated network security risk. To solve this problem, this article proposes a false data injection attack detection and alarm method based on active power output. The detection algorithm is capable of detecting attacks at any location within the microgrid and mitigating the impact of communication delay. Moreover, a distributed elastic recovery strategy based on the aforementioned detection algorithm is proposed. This strategy aims to expeditiously restore the compromised agent to its rated state. Finally, a simulation model is developed to demonstrate the effectiveness of the proposed strategy.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83245932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification 综述:监测智能电网网络物理系统的态势感知和关键资产识别
IF 1.5 Q1 Engineering Pub Date : 2023-05-12 DOI: 10.1049/cps2.12059
Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap

Cyber-Physical Systems (CPSs) are becoming more automated and aimed to be as efficient as possible by enabling integration between their operations and Information Technology (IT) resources. In combination with production automation, these systems need to identify their assets and the correlation between them; any potential threats or failures alert the relevant user/department and suggest the appropriate remediation plan. Moreover, identifying critical assets in these systems is essential. With numerous research and technologies available, assessing IT assets nowadays can be straightforward to implement. However, there is one significant issue of evaluating operational technology critical assets since they have different characteristics, and traditional solutions cannot work efficiently. This study presents the necessary background to attain the appropriate approach for monitoring critical assets in CPSs' Situational Awareness (SA). Additionally, the study presents a broad survey supported by an in-depth review of previous works in three important aspects. First, it reviews the applicability of possible techniques, tools and solutions that can be used to collect detailed information from such systems. Secondly, it covers studies that were implemented to evaluate the criticality of assets in CPSs, demonstrates requirements for critical asset identification, explores different risks and failure techniques utilised in these systems and delves into approaches to evaluate such methods in energy systems. Finally, this paper highlights and analyses SA gaps based on existing solutions, provides future directions and discusses open research issues.

网络物理系统(CPSs)正变得更加自动化,并旨在通过实现其运营与信息技术(IT)资源之间的集成来尽可能高效。结合生产自动化,这些系统需要识别其资产及其之间的相关性;任何潜在的威胁或故障都会提醒相关用户/部门,并提出适当的补救计划。此外,确定这些系统中的关键资产至关重要。有了大量的研究和技术,现在评估IT资产可以很容易地实现。然而,评估运营技术关键资产有一个重要问题,因为它们具有不同的特征,传统的解决方案无法有效工作。本研究提供了必要的背景,以获得适当的方法来监测CPSs的态势感知(SA)中的关键资产。此外,该研究提供了一个广泛的调查,并在三个重要方面对以前的工作进行了深入回顾。首先,它审查了可用于从此类系统收集详细信息的可能技术、工具和解决方案的适用性。其次,它涵盖了为评估消费品安全系统中资产的关键性而实施的研究,展示了关键资产识别的要求,探索了这些系统中使用的不同风险和故障技术,并深入探讨了评估能源系统中此类方法的方法。最后,本文在现有解决方案的基础上强调和分析了SA差距,提出了未来的方向,并讨论了开放的研究问题。
{"title":"A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification","authors":"Yazeed Alrowaili,&nbsp;Neetesh Saxena,&nbsp;Anurag Srivastava,&nbsp;Mauro Conti,&nbsp;Pete Burnap","doi":"10.1049/cps2.12059","DOIUrl":"https://doi.org/10.1049/cps2.12059","url":null,"abstract":"<p>Cyber-Physical Systems (CPSs) are becoming more automated and aimed to be as efficient as possible by enabling integration between their operations and Information Technology (IT) resources. In combination with production automation, these systems need to identify their assets and the correlation between them; any potential threats or failures alert the relevant user/department and suggest the appropriate remediation plan. Moreover, identifying critical assets in these systems is essential. With numerous research and technologies available, assessing IT assets nowadays can be straightforward to implement. However, there is one significant issue of evaluating operational technology critical assets since they have different characteristics, and traditional solutions cannot work efficiently. This study presents the necessary background to attain the appropriate approach for monitoring critical assets in CPSs' Situational Awareness (SA). Additionally, the study presents a broad survey supported by an in-depth review of previous works in three important aspects. First, it reviews the applicability of possible techniques, tools and solutions that can be used to collect detailed information from such systems. Secondly, it covers studies that were implemented to evaluate the criticality of assets in CPSs, demonstrates requirements for critical asset identification, explores different risks and failure techniques utilised in these systems and delves into approaches to evaluate such methods in energy systems. Finally, this paper highlights and analyses SA gaps based on existing solutions, provides future directions and discusses open research issues.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection 利用分层特征聚类和激励加权异常检测检测智能电表虚假数据攻击
IF 1.5 Q1 Engineering Pub Date : 2023-05-09 DOI: 10.1049/cps2.12057
Martin Higgins, Bruce Stephen, David Wallom

Spot pricing is often suggested as a method of increasing demand-side flexibility in electrical power load. However, few works have considered the vulnerability of spot pricing to financial fraud via false data injection (FDI) style attacks. The authors consider attacks which aim to alter the consumer load profile to exploit intraday price dips. The authors examine an anomaly detection protocol for cyber-attacks that seek to leverage spot prices for financial gain. In this way the authors outline a methodology for detecting attacks on industrial load smart meters. The authors first create a feature clustering model of the underlying business, segregated by business type. The authors then use these clusters to create an incentive-weighted anomaly detection protocol for false data attacks against load profiles. This clustering-based methodology incorporates both the load profile and spot pricing considerations for the detection of injected load profiles. To reduce false positives, the authors model incentive-based detection, which includes knowledge of spot prices, into the anomaly tracking, enabling the methodology to account for changes in the load profile which are unlikely to be attacks.

人们经常建议将现货定价作为提高电力负荷需求方灵活性的一种方法。然而,很少有著作考虑到现货定价容易受到通过虚假数据注入 (FDI) 式攻击进行金融欺诈的影响。作者考虑了旨在改变用户负荷状况以利用日内价格下跌的攻击。作者研究了一种异常检测协议,用于检测试图利用现货价格获取经济利益的网络攻击。因此,作者概述了一种检测工业负荷智能电表攻击的方法。作者首先创建了一个按业务类型划分的底层业务特征聚类模型。然后,作者利用这些聚类创建了一个激励加权异常检测协议,用于检测针对负载配置文件的虚假数据攻击。这种基于聚类的方法同时考虑了负荷曲线和现货定价因素,用于检测注入的负荷曲线。为了减少误报,作者将基于激励的检测(包括现货价格知识)建模到异常跟踪中,使该方法能够考虑到不可能是攻击的负载曲线变化。
{"title":"Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection","authors":"Martin Higgins,&nbsp;Bruce Stephen,&nbsp;David Wallom","doi":"10.1049/cps2.12057","DOIUrl":"10.1049/cps2.12057","url":null,"abstract":"<p>Spot pricing is often suggested as a method of increasing demand-side flexibility in electrical power load. However, few works have considered the vulnerability of spot pricing to financial fraud via false data injection (FDI) style attacks. The authors consider attacks which aim to alter the consumer load profile to exploit intraday price dips. The authors examine an anomaly detection protocol for cyber-attacks that seek to leverage spot prices for financial gain. In this way the authors outline a methodology for detecting attacks on industrial load smart meters. The authors first create a feature clustering model of the underlying business, segregated by business type. The authors then use these clusters to create an incentive-weighted anomaly detection protocol for false data attacks against load profiles. This clustering-based methodology incorporates both the load profile and spot pricing considerations for the detection of injected load profiles. To reduce false positives, the authors model incentive-based detection, which includes knowledge of spot prices, into the anomaly tracking, enabling the methodology to account for changes in the load profile which are unlikely to be attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79538771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on eigenparameters and detection methods for single-phase-to-ground faults in non-effectively grounded distribution systems 非有效接地配电系统单相接地故障特征参数及检测方法研究
IF 1.5 Q1 Engineering Pub Date : 2023-05-02 DOI: 10.1049/cps2.12055
Wanxing Sheng, Xiaohui Song

Non-effectively grounded power distribution systems (NGDS) are widely used in China and other countries. However, over a long time, single-phase-to-ground faults (SGF) have been misjudged or omitted by the monitoring system, threatening the security of the power supply system and human safety. Based on the reason analysis for the omitted and misjudged SGFs in NGDS, the concept of NGDS fault eigenparameters to correctly reflect fault characteristics and a method of SGF detection based on fault eigenparameters are proposed. Then, the detection mechanism of phase voltage and fault current resistive elements for SGF is revealed. The variation characteristics of typical fault parameters changing with distribution system scale (parameter) and fault transition resistance, such as residual voltage and Zero-sequence current (iA-iO), are analysed. The eigenparameters of SGF in certain NGDS with specific scales/parameters are also proposed, which can correctly reflect the fault characteristics under different transition resistances.

非有效接地配电系统(NGDS)在中国和其他国家得到了广泛的应用。然而,长期以来,单相接地故障一直被监测系统误判或忽略,威胁着供电系统的安全和人身安全。在分析NGDS中SGF遗漏和误判的原因的基础上,提出了正确反映故障特征的NGDS故障特征参数概念和基于故障特征参数的SGF检测方法。然后,揭示了SGF中相电压和故障电流电阻元件的检测机理。分析了典型故障参数随配电系统规模(参数)和故障过渡电阻(如剩余电压和零序电流)的变化特征。还提出了特定尺度/参数的NGDS中SGF的本征参数,可以正确地反映不同过渡电阻下的故障特征。
{"title":"Research on eigenparameters and detection methods for single-phase-to-ground faults in non-effectively grounded distribution systems","authors":"Wanxing Sheng,&nbsp;Xiaohui Song","doi":"10.1049/cps2.12055","DOIUrl":"https://doi.org/10.1049/cps2.12055","url":null,"abstract":"<p>Non-effectively grounded power distribution systems (NGDS) are widely used in China and other countries. However, over a long time, single-phase-to-ground faults (SGF) have been misjudged or omitted by the monitoring system, threatening the security of the power supply system and human safety. Based on the reason analysis for the omitted and misjudged SGFs in NGDS, the concept of NGDS fault eigenparameters to correctly reflect fault characteristics and a method of SGF detection based on fault eigenparameters are proposed. Then, the detection mechanism of phase voltage and fault current resistive elements for SGF is revealed. The variation characteristics of typical fault parameters changing with distribution system scale (parameter) and fault transition resistance, such as residual voltage and Zero-sequence current (iA-iO), are analysed. The eigenparameters of SGF in certain NGDS with specific scales/parameters are also proposed, which can correctly reflect the fault characteristics under different transition resistances.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50118487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital farming based on a smart and user-friendly IoT irrigation system: A conifer nursery case study 基于智能和用户友好型物联网灌溉系统的数字农业:针叶树苗圃案例研究
IF 1.5 Q1 Engineering Pub Date : 2023-04-27 DOI: 10.1049/cps2.12054
Adrian Florea, Daniel-Ioan Popa, Daniel Morariu, Ionela Maniu, Lasse Berntzen, Ugo Fiore

Although digital technologies on farms bridge the productivity-sustainability gap, they are not yet widely adopted. Familiarising farmers with digital systems is as important as developing advanced technological platforms: As farmers become accustomed to and feel in control of digital systems, they will find it easier to accept, adapt and keep pace with technological developments. This article describes the design and implementation of a flexible, scalable, easy-to-use and extensible IoT embedded system to control sprinkler irrigation in an outdoor Thuja conifer nursery in an automated mode and under varying weather. Irrigation is controlled by Mamdani Fuzzy Inference Logic based on rainfall prediction and real-time monitoring of the plants. The IoT system provides a control dashboard and offers three operating modes: manual, automated or scheduled (daily, weekly, and monthly). The system is robust in the event of a power outage or loss of connectivity. The code is available on GitHub. Sensors, solenoid valves, Raspberry Pi microcontrollers, fuzzy logic systems, a web interface and a cloud service create a sustainable solution that makes water use more efficient, creates a healthy environment for crops (using just the right amount of water), makes life easier for farmers, and exposes them to the benefits of the IoT.

尽管农场数字技术弥补了生产力与可持续性之间的差距,但尚未得到广泛应用。让农民熟悉数字系统与开发先进的技术平台同样重要:当农民习惯并感觉能够控制数字系统时,他们会发现更容易接受、适应和跟上技术发展的步伐。本文介绍了一个灵活、可扩展、易用且可扩展的物联网嵌入式系统的设计与实施,该系统可在不同天气条件下以自动化模式控制室外针叶树苗圃的喷灌。灌溉由马姆达尼模糊推理逻辑(Mamdani Fuzzy Inference Logic)根据降雨预测和对植物的实时监控进行控制。物联网系统提供一个控制面板,并提供三种操作模式:手动、自动或计划(每天、每周和每月)。该系统在断电或失去连接的情况下也能正常运行。代码可在 GitHub 上获取。传感器、电磁阀、Raspberry Pi 微控制器、模糊逻辑系统、网络接口和云服务创造了一个可持续的解决方案,提高了用水效率,为作物创造了一个健康的环境(使用恰到好处的水),使农民的生活更轻松,并让他们享受到物联网的好处。
{"title":"Digital farming based on a smart and user-friendly IoT irrigation system: A conifer nursery case study","authors":"Adrian Florea,&nbsp;Daniel-Ioan Popa,&nbsp;Daniel Morariu,&nbsp;Ionela Maniu,&nbsp;Lasse Berntzen,&nbsp;Ugo Fiore","doi":"10.1049/cps2.12054","DOIUrl":"10.1049/cps2.12054","url":null,"abstract":"<p>Although digital technologies on farms bridge the productivity-sustainability gap, they are not yet widely adopted. Familiarising farmers with digital systems is as important as developing advanced technological platforms: As farmers become accustomed to and feel in control of digital systems, they will find it easier to accept, adapt and keep pace with technological developments. This article describes the design and implementation of a flexible, scalable, easy-to-use and extensible IoT embedded system to control sprinkler irrigation in an outdoor Thuja conifer nursery in an automated mode and under varying weather. Irrigation is controlled by Mamdani Fuzzy Inference Logic based on rainfall prediction and real-time monitoring of the plants. The IoT system provides a control dashboard and offers three operating modes: manual, automated or scheduled (daily, weekly, and monthly). The system is robust in the event of a power outage or loss of connectivity. The code is available on GitHub. Sensors, solenoid valves, Raspberry Pi microcontrollers, fuzzy logic systems, a web interface and a cloud service create a sustainable solution that makes water use more efficient, creates a healthy environment for crops (using just the right amount of water), makes life easier for farmers, and exposes them to the benefits of the IoT.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72762867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-supervised pre-training in photovoltaic systems via supervisory control and data acquisition data 通过监控和数据采集数据对光伏系统进行自我监督预培训
IF 1.5 Q1 Engineering Pub Date : 2023-04-27 DOI: 10.1049/cps2.12056
Dejun Wang, Zhenqing Duan, Wenbin Wang, Jingchun Chu, Qingru Cui, Runze Zhu, Yahui Cui, You Zhang, Zedong You

Owing to the availability of sensor data, the operation and maintenance (O&M) of sustainable energy systems have become more intelligent. In particular, data-driven approaches have gained growing interest in supporting intelligent O&M. However, this is not a simple task, as the deficiency of labelled data poses a major challenge. This work proposes a self-supervised pre-training approach for autonomous learning of the Supervisory Control and Data Acquisition (SCADA) data representations for photovoltaic (PV) systems. Specifically, the proposed method first constructs the sample pairs using reasonable assumptions from a large volume of unlabelled SCADA data. Then, it designs a deep Siamese network to extract the representations of the input sample pair and sets the pretext task to measure whether the input pair is similar. The proposed method has been deployed in a PV system with nominal power 2.5 MW located in North China. Experimental results show that the proposed approach achieves accurate similarity assessment for the sample pairs and can potentially support downstream tasks regarding intelligent O&M.

由于传感器数据的可用性,可持续能源系统的运行和维护(O&M)变得更加智能化。特别是,数据驱动方法在支持智能运行和维护方面获得了越来越多的关注。然而,这并不是一项简单的任务,因为标记数据的缺乏构成了一项重大挑战。本研究提出了一种自监督预培训方法,用于自主学习光伏(PV)系统的监控和数据采集(SCADA)数据表示。具体来说,所提出的方法首先利用大量未标记的 SCADA 数据中的合理假设构建样本对。然后,设计一个深度连体网络来提取输入样本对的表示,并设置借口任务来衡量输入对是否相似。所提出的方法已在华北地区一个标称功率为 2.5 兆瓦的光伏系统中进行了部署。实验结果表明,所提出的方法能够对样本对进行准确的相似性评估,并有可能支持智能运行和监测方面的下游任务。
{"title":"Self-supervised pre-training in photovoltaic systems via supervisory control and data acquisition data","authors":"Dejun Wang,&nbsp;Zhenqing Duan,&nbsp;Wenbin Wang,&nbsp;Jingchun Chu,&nbsp;Qingru Cui,&nbsp;Runze Zhu,&nbsp;Yahui Cui,&nbsp;You Zhang,&nbsp;Zedong You","doi":"10.1049/cps2.12056","DOIUrl":"10.1049/cps2.12056","url":null,"abstract":"<p>Owing to the availability of sensor data, the operation and maintenance (O&amp;M) of sustainable energy systems have become more intelligent. In particular, data-driven approaches have gained growing interest in supporting intelligent O&amp;M. However, this is not a simple task, as the deficiency of labelled data poses a major challenge. This work proposes a self-supervised pre-training approach for autonomous learning of the Supervisory Control and Data Acquisition (SCADA) data representations for photovoltaic (PV) systems. Specifically, the proposed method first constructs the sample pairs using reasonable assumptions from a large volume of unlabelled SCADA data. Then, it designs a deep Siamese network to extract the representations of the input sample pair and sets the pretext task to measure whether the input pair is similar. The proposed method has been deployed in a PV system with nominal power 2.5 MW located in North China. Experimental results show that the proposed approach achieves accurate similarity assessment for the sample pairs and can potentially support downstream tasks regarding intelligent O&amp;M.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91061760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variational mode decomposition enabled temporal convolutional network model for state of charge estimation 用于电荷状态估计的变分模式分解时间卷积网络模型
IF 1.5 Q1 Engineering Pub Date : 2023-04-20 DOI: 10.1049/cps2.12053
Zhaocheng Zhang, Tao Cai, Aote Yuan

Due to the fast growth of electric vehicles (EVs) , estimation for Battery's State-of-charge (SOC) received significant research interests. The reason is that an accurate SOC estimation can significantly contribute to the reliability of EVs. A Variational Mode Decomposition (VMD) technique enabled Temporal Convolutional Network (TCN) model is proposed by the authors for SOC estimation. The proposed method first adopts time-frequency analysis techniques to decompose voltage values into different frequency domains, each of which is analysed with the VMD technique to obtain its features as the input for the TCN model. Then, the proposed method combines outputs of different frequency domains with an attention module as the final output of the TCN model. Experiments on real battery datasets indicate that the proposed method outperforms the existing methods by 7.2% in mean absolute error and 6.13% in root mean square error. In addition, the error between the estimated and actual values using the proposed method is bounded by 2%.

由于电动汽车(EV)的快速增长,电池充电状态(SOC)的估计受到了极大的研究兴趣。原因是准确的SOC估计可以显著提高电动汽车的可靠性。提出了一种基于变分模式分解(VMD)技术的时间卷积网络(TCN)SOC估计模型。该方法首先采用时频分析技术将电压值分解到不同的频域,并使用VMD技术对每个频域进行分析,以获得其特征作为TCN模型的输入。然后,所提出的方法将不同频域的输出与注意力模块相结合,作为TCN模型的最终输出。在实际电池数据集上的实验表明,该方法的平均绝对误差和均方根误差分别比现有方法高7.2%和6.13%。此外,使用所提出的方法的估计值和实际值之间的误差在2%以内。
{"title":"Variational mode decomposition enabled temporal convolutional network model for state of charge estimation","authors":"Zhaocheng Zhang,&nbsp;Tao Cai,&nbsp;Aote Yuan","doi":"10.1049/cps2.12053","DOIUrl":"https://doi.org/10.1049/cps2.12053","url":null,"abstract":"<p>Due to the fast growth of electric vehicles (EVs) , estimation for Battery's State-of-charge (SOC) received significant research interests. The reason is that an accurate SOC estimation can significantly contribute to the reliability of EVs. A Variational Mode Decomposition (VMD) technique enabled Temporal Convolutional Network (TCN) model is proposed by the authors for SOC estimation. The proposed method first adopts time-frequency analysis techniques to decompose voltage values into different frequency domains, each of which is analysed with the VMD technique to obtain its features as the input for the TCN model. Then, the proposed method combines outputs of different frequency domains with an attention module as the final output of the TCN model. Experiments on real battery datasets indicate that the proposed method outperforms the existing methods by 7.2% in mean absolute error and 6.13% in root mean square error. In addition, the error between the estimated and actual values using the proposed method is bounded by 2%.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discrete-time modelling methodology of networked control systems under packet delay and dropout 分组时延和丢包情况下网络控制系统的离散时间建模方法
IF 1.5 Q1 Engineering Pub Date : 2023-04-20 DOI: 10.1049/cps2.12050
Kamran Mohajeri, Ali Madadi, Babak Tavassoli, Wan Rahiman

Models and control techniques for networked control systems (NCSs) can be divided into continuous-time and discrete-time types. Unlike the continuous-time analysis, literature on discrete-time analysis and control of NCSs under packet delay and dropout shows a variety of different models. However, a systematic study of these models is absent in the literature. This article is a methodology for these models. Different factors involved in making this variety are discussed. The models are described and it is shown how they are different or related to each other. The models are from the existing literature. However, to complete the methodology some of the models are introduced by the authors. Furthermore, the concept of sequence matrix is introduced which helps to differentiate some models and should be considered when NCS is analysed as a switched linear system. This methodology can be used as a basis for selecting the suitable model in analysis and design of NCSs. Denial of service (DoS) attack and time delay switch (TDS) attack can be considered as packet dropout and packet delay respectively. Thus, this methodology can also be used in analysis and design of NCS under these cyber-physical attacks.

网络控制系统的模型和控制技术可分为连续时间型和离散时间型。与连续时间分析不同,关于网络控制系统在数据包延迟和丢失情况下的离散时间分析和控制的文献显示了各种不同的模型。然而,文献中缺乏对这些模型的系统研究。本文是这些模型的方法论。讨论了制作这种品种所涉及的不同因素。对这些模型进行了描述,并展示了它们是如何不同或相互关联的。这些模型来自现有文献。然而,为了完成该方法,作者引入了一些模型。此外,引入了序列矩阵的概念,这有助于区分一些模型,并且在将NCS作为切换线性系统进行分析时应该考虑序列矩阵。该方法可作为网络控制系统分析和设计中选择合适模型的依据。拒绝服务(DoS)攻击和时延切换(TDS)攻击可以分别被认为是数据包丢失和数据包延迟。因此,该方法也可以用于这些网络物理攻击下的网络控制系统的分析和设计。
{"title":"Discrete-time modelling methodology of networked control systems under packet delay and dropout","authors":"Kamran Mohajeri,&nbsp;Ali Madadi,&nbsp;Babak Tavassoli,&nbsp;Wan Rahiman","doi":"10.1049/cps2.12050","DOIUrl":"https://doi.org/10.1049/cps2.12050","url":null,"abstract":"<p>Models and control techniques for networked control systems (NCSs) can be divided into continuous-time and discrete-time types. Unlike the continuous-time analysis, literature on discrete-time analysis and control of NCSs under packet delay and dropout shows a variety of different models. However, a systematic study of these models is absent in the literature. This article is a methodology for these models. Different factors involved in making this variety are discussed. The models are described and it is shown how they are different or related to each other. The models are from the existing literature. However, to complete the methodology some of the models are introduced by the authors. Furthermore, the concept of sequence matrix is introduced which helps to differentiate some models and should be considered when NCS is analysed as a switched linear system. This methodology can be used as a basis for selecting the suitable model in analysis and design of NCSs. Denial of service (DoS) attack and time delay switch (TDS) attack can be considered as packet dropout and packet delay respectively. Thus, this methodology can also be used in analysis and design of NCS under these cyber-physical attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space vector pulse width modulation strategy for modular multilevel converters in power system 电力系统中模块化多电平变换器的空间矢量脉宽调制策略
IF 1.5 Q1 Engineering Pub Date : 2023-04-18 DOI: 10.1049/cps2.12052
Shengyang Lu, Yan Zhenhong, Xiong Yongsheng, Zhang Jianhao, Wang Tong, Zhu Yu, Sui Yuqiu, Yang Junyou, Li Zhang, Haixin Wang

As a superior modulation strategy, space vector pulse width modulation (SVPWM) provides redundant voltage vectors and adjustable action time, which can achieve multi-objective control of modular multilevel converter (MMC). An SVPWM strategy suitable for MMC is proposed. The strategy is divided into three stages. In the first stage, the appropriate voltage vector, the action time and the basic sub-module (SM) input number are quickly calculated to ensure the output quality by equating MMC as a 2-level inverter. In the second stage, a finite set of the circulating current suppression is established on the basis of the basic SM input number. The optimal SM input number is selected through rolling optimisation. In the last stage, according to the SM voltage sorting and the optimal SM input number, the optimal switching state is determined to realise the SM voltage balance control. The proposed control strategy simplifies the design of the control system, reduces the computational burden and can be easily extended to MMC with any SM number. The simulation and experimental results show that the proposed SVPWM strategy can reduce the circulating current and balance the SM capacitor voltage while ensuring the output quality.

空间矢量脉宽调制(SVPWM)作为一种优越的调制策略,提供了冗余的电压矢量和可调节的动作时间,可以实现模块化多电平变换器(MMC)的多目标控制。提出了一种适用于MMC的SVPWM策略。该战略分为三个阶段。在第一阶段,通过将MMC等效为2电平逆变器,快速计算适当的电压矢量、动作时间和基本子模块(SM)输入数量,以确保输出质量。在第二阶段,基于基本SM输入数建立循环电流抑制的有限集。通过滚动优化来选择最佳SM输入数量。在最后一阶段,根据SM电压排序和最佳SM输入数,确定最佳开关状态,实现SM电压平衡控制。所提出的控制策略简化了控制系统的设计,减少了计算负担,并且可以很容易地扩展到任何SM数的MMC。仿真和实验结果表明,所提出的SVPWM策略可以在保证输出质量的同时,降低循环电流,平衡SM电容器电压。
{"title":"Space vector pulse width modulation strategy for modular multilevel converters in power system","authors":"Shengyang Lu,&nbsp;Yan Zhenhong,&nbsp;Xiong Yongsheng,&nbsp;Zhang Jianhao,&nbsp;Wang Tong,&nbsp;Zhu Yu,&nbsp;Sui Yuqiu,&nbsp;Yang Junyou,&nbsp;Li Zhang,&nbsp;Haixin Wang","doi":"10.1049/cps2.12052","DOIUrl":"https://doi.org/10.1049/cps2.12052","url":null,"abstract":"<p>As a superior modulation strategy, space vector pulse width modulation (SVPWM) provides redundant voltage vectors and adjustable action time, which can achieve multi-objective control of modular multilevel converter (MMC). An SVPWM strategy suitable for MMC is proposed. The strategy is divided into three stages. In the first stage, the appropriate voltage vector, the action time and the basic sub-module (SM) input number are quickly calculated to ensure the output quality by equating MMC as a 2-level inverter. In the second stage, a finite set of the circulating current suppression is established on the basis of the basic SM input number. The optimal SM input number is selected through rolling optimisation. In the last stage, according to the SM voltage sorting and the optimal SM input number, the optimal switching state is determined to realise the SM voltage balance control. The proposed control strategy simplifies the design of the control system, reduces the computational burden and can be easily extended to MMC with any SM number. The simulation and experimental results show that the proposed SVPWM strategy can reduce the circulating current and balance the SM capacitor voltage while ensuring the output quality.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50145302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring adversarial behaviour in cyber-physical power systems using a Bayesian attack graph approach 使用贝叶斯攻击图方法推断网络物理电力系统中的对抗行为
IF 1.5 Q1 Engineering Pub Date : 2023-02-11 DOI: 10.1049/cps2.12047
Abhijeet Sahu, Katherine Davis

Highly connected smart power systems are subject to increasing vulnerabilities and adversarial threats. Defenders need to proactively identify and defend new high-risk access paths of cyber intruders that target grid resilience. However, cyber-physical risk analysis and defense in power systems often requires making assumptions on adversary behaviour, and these assumptions can be wrong. Thus, this work examines the problem of inferring adversary behaviour in power systems to improve risk-based defense and detection. To achieve this, a Bayesian approach for inference of the Cyber-Adversarial Power System (Bayes-CAPS) is proposed that uses Bayesian networks (BNs) to define and solve the inference problem of adversarial movement in the grid infrastructure towards targets of physical impact. Specifically, BNs are used to compute conditional probabilities to queries, such as the probability of observing an event given a set of alerts. Bayes-CAPS builds initial Bayesian attack graphs for realistic power system cyber-physical models. These models are adaptable using collected data from the system under study. Then, Bayes-CAPS computes the posterior probabilities of the occurrence of a security breach event in power systems. Experiments are conducted that evaluate algorithms based on time complexity, accuracy and impact of evidence for different scales and densities of network. The performance is evaluated and compared for five realistic cyber-physical power system models of increasing size and complexities ranging from 8 to 300 substations based on computation and accuracy impacts.

高度互联的智能电力系统面临越来越多的漏洞和对抗性威胁。防御者需要主动识别和防御针对电网弹性的网络入侵者的新的高风险访问路径。然而,电力系统中的网络物理风险分析和防御通常需要对对手的行为做出假设,而这些假设可能是错误的。因此,这项工作研究了推断电力系统中对手行为的问题,以改进基于风险的防御和检测。为了实现这一点,提出了一种用于网络对抗性电力系统推理的贝叶斯方法(贝叶斯CAPS),该方法使用贝叶斯网络(BN)来定义和解决电网基础设施中对抗性运动向物理影响目标的推理问题。具体来说,BN用于计算查询的条件概率,例如在给定一组警报的情况下观察事件的概率。贝叶斯CAPS为现实的电力系统网络物理模型构建初始贝叶斯攻击图。这些模型可使用所研究系统收集的数据进行调整。然后,贝叶斯CAPS计算电力系统安全漏洞事件发生的后验概率。针对不同规模和密度的网络,进行了基于时间复杂性、准确性和证据影响的算法评估实验。基于计算和精度影响,评估并比较了从8到300个变电站规模和复杂性不断增加的五个现实网络物理电力系统模型的性能。
{"title":"Inferring adversarial behaviour in cyber-physical power systems using a Bayesian attack graph approach","authors":"Abhijeet Sahu,&nbsp;Katherine Davis","doi":"10.1049/cps2.12047","DOIUrl":"https://doi.org/10.1049/cps2.12047","url":null,"abstract":"<p>Highly connected smart power systems are subject to increasing vulnerabilities and adversarial threats. Defenders need to proactively identify and defend new high-risk access paths of cyber intruders that target grid resilience. However, cyber-physical risk analysis and defense in power systems often requires making assumptions on adversary behaviour, and these assumptions can be wrong. Thus, this work examines the problem of inferring adversary behaviour in power systems to improve risk-based defense and detection. To achieve this, a Bayesian approach for inference of the Cyber-Adversarial Power System (Bayes-CAPS) is proposed that uses Bayesian networks (BNs) to define and solve the inference problem of adversarial movement in the grid infrastructure towards targets of physical impact. Specifically, BNs are used to compute conditional probabilities to queries, such as the probability of observing an event given a set of alerts. Bayes-CAPS builds initial Bayesian attack graphs for realistic power system cyber-physical models. These models are adaptable using collected data from the system under study. Then, Bayes-CAPS computes the posterior probabilities of the occurrence of a security breach event in power systems. Experiments are conducted that evaluate algorithms based on time complexity, accuracy and impact of evidence for different scales and densities of network. The performance is evaluated and compared for five realistic cyber-physical power system models of increasing size and complexities ranging from 8 to 300 substations based on computation and accuracy impacts.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12047","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50128539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1