首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Cyber-physical component ranking for risk sensitivity analysis using betweenness centrality 使用中间性中心性进行风险敏感性分析的网络物理组件排序
IF 1.5 Q1 Engineering Pub Date : 2021-04-21 DOI: 10.1049/cps2.12010
Amarachi Umunnakwe, Abhijeet Sahu, Mohammad Rasoul Narimani, Katherine Davis, Saman Zonouz

This article proposes a model for critical component ranking in power system risk analysis using a proposed cyber-physical betweenness centrality (CPBC) index. Risk assessment, as part of the contingency analysis, is a critical activity that can identify and evaluate component outages that lead to system vulnerability, aiding operators to improve resilience. A power system cyber-physical risk assessment model is proposed that calculates and offers an efficient protection strategy to the system operator based on component vulnerability to adversaries and the impact of compromised assets on the system operation. We present the CPBC index, which traverses generated attack graphs to rank components according to their importance in reducing adversary impact on the power system. The CPBC extends upon betweenness centrality and integrates into analysis, the services and security cost of communications between system components, as well as the likelihood of component exploitation as an adversary medium to the target relays. The proposed model recommends actions, taking into account the interconnections between cyber and physical components as well as cyber-induced Common Vulnerabilities and Exposure scores associated with these connections, thus protecting critical components. The proposed model is implemented on the Cyber-Physical Situational Awareness 8-substation and extended IEEE 300-bus cyber-physical power system models, and results are presented on the impacts of the proposed component ranking model on the security-aware operation of the power system.

本文提出了一种基于网络物理中间性中心性(CPBC)指数的电力系统风险分析中关键部件排序模型。风险评估作为应急分析的一部分,是一项关键活动,可以识别和评估导致系统脆弱性的组件中断,帮助运营商提高弹性。提出了一种电力系统网络物理风险评估模型,该模型基于组件对攻击者的脆弱性和受损资产对系统运行的影响,计算并为系统运营商提供有效的保护策略。我们提出了CPBC指数,它遍历生成的攻击图,根据它们在减少对手对电力系统影响方面的重要性对组件进行排名。CPBC扩展了中间中心,并集成到分析中,系统组件之间通信的服务和安全成本,以及组件被利用为目标中继的对手媒介的可能性。拟议的模型建议采取行动,考虑到网络和物理组件之间的互连,以及网络引起的常见漏洞和与这些连接相关的暴露分数,从而保护关键组件。在网络物理态势感知8变电站和扩展的IEEE 300总线网络物理电力系统模型上实现了所提出的模型,并给出了所提出的组件排序模型对电力系统安全感知运行的影响结果。
{"title":"Cyber-physical component ranking for risk sensitivity analysis using betweenness centrality","authors":"Amarachi Umunnakwe,&nbsp;Abhijeet Sahu,&nbsp;Mohammad Rasoul Narimani,&nbsp;Katherine Davis,&nbsp;Saman Zonouz","doi":"10.1049/cps2.12010","DOIUrl":"https://doi.org/10.1049/cps2.12010","url":null,"abstract":"<p>This article proposes a model for critical component ranking in power system risk analysis using a proposed cyber-physical betweenness centrality (CPBC) index. Risk assessment, as part of the contingency analysis, is a critical activity that can identify and evaluate component outages that lead to system vulnerability, aiding operators to improve resilience. A power system cyber-physical risk assessment model is proposed that calculates and offers an efficient protection strategy to the system operator based on component vulnerability to adversaries and the impact of compromised assets on the system operation. We present the CPBC index, which traverses generated attack graphs to rank components according to their importance in reducing adversary impact on the power system. The CPBC extends upon betweenness centrality and integrates into analysis, the services and security cost of communications between system components, as well as the likelihood of component exploitation as an adversary medium to the target relays. The proposed model recommends actions, taking into account the interconnections between cyber and physical components as well as cyber-induced Common Vulnerabilities and Exposure scores associated with these connections, thus protecting critical components. The proposed model is implemented on the Cyber-Physical Situational Awareness 8-substation and extended IEEE 300-bus cyber-physical power system models, and results are presented on the impacts of the proposed component ranking model on the security-aware operation of the power system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91856047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Strategy for distributed controller defence: Leveraging controller roles and control support groups to maintain or regain control in cyber-adversarial power systems 分布式控制器防御策略:利用控制器角色和控制支持小组来维持或重新获得对网络对抗电力系统的控制
IF 1.5 Q1 Engineering Pub Date : 2021-04-09 DOI: 10.1049/cps2.12006
Shamina Hossain-McKenzie, Kaushik Raghunath, Katherine Davis, Sriharsha Etigowni, Saman Zonouz

Distributed controllers play a prominent role in electric power grid operation. The coordinated failure or malfunction of these controllers is a serious threat, where the resulting mechanisms and consequences are not yet well-known and planned against. If certain controllers are maliciously compromised by an adversary, they can be manipulated to drive the system to an unsafe state. The authors present a strategy for distributed controller defence (SDCD) for improved grid tolerance under conditions of distributed controller compromise. The work of the authors’ first formalises the roles that distributed controllers play and their control support groups using controllability analysis techniques. With these formally defined roles and groups, the authors then present defence strategies for maintaining or regaining system control during such an attack. A general control response framework is presented here for the compromise or failure of distributed controllers using the remaining, operational set. The SDCD approach is successfully demonstrated with a 7-bus system and the IEEE 118-bus system for single and coordinated distributed controller compromise; the results indicate that SDCD is able to significantly reduce system stress and mitigate compromise consequences.

分布式控制器在电网运行中起着十分重要的作用。这些控制器的协调故障或故障是一个严重的威胁,其中产生的机制和后果尚不为人所知和计划。如果某些控制器被攻击者恶意破坏,则可以操纵它们将系统驱动到不安全状态。作者提出了一种分布式控制器防御(SDCD)策略,以提高分布式控制器妥协条件下的网格容忍度。作者的第一个工作是使用可控性分析技术形式化分布式控制器所扮演的角色和它们的控制支持组。通过这些正式定义的角色和组,作者随后提出了在此类攻击期间维护或重新获得系统控制的防御策略。这里提出了一个通用的控制响应框架,用于使用剩余的操作集的分布式控制器的妥协或失败。SDCD方法在7总线系统和IEEE 118总线系统中成功地演示了单个和协调分布式控制器折衷;结果表明,SDCD能够显著降低系统压力并减轻折衷后果。
{"title":"Strategy for distributed controller defence: Leveraging controller roles and control support groups to maintain or regain control in cyber-adversarial power systems","authors":"Shamina Hossain-McKenzie,&nbsp;Kaushik Raghunath,&nbsp;Katherine Davis,&nbsp;Sriharsha Etigowni,&nbsp;Saman Zonouz","doi":"10.1049/cps2.12006","DOIUrl":"https://doi.org/10.1049/cps2.12006","url":null,"abstract":"<p>Distributed controllers play a prominent role in electric power grid operation. The coordinated failure or malfunction of these controllers is a serious threat, where the resulting mechanisms and consequences are not yet well-known and planned against. If certain controllers are maliciously compromised by an adversary, they can be manipulated to drive the system to an unsafe state. The authors present a strategy for distributed controller defence (SDCD) for improved grid tolerance under conditions of distributed controller compromise. The work of the authors’ first formalises the roles that distributed controllers play and their control support groups using controllability analysis techniques. With these formally defined roles and groups, the authors then present defence strategies for maintaining or regaining system control during such an attack. A general control response framework is presented here for the compromise or failure of distributed controllers using the remaining, operational set. The SDCD approach is successfully demonstrated with a 7-bus system and the IEEE 118-bus system for single and coordinated distributed controller compromise; the results indicate that SDCD is able to significantly reduce system stress and mitigate compromise consequences.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91846028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection attacks 孤岛微电网二次频率控制抵御虚假数据注入攻击的博弈论漏洞管理
IF 1.5 Q1 Engineering Pub Date : 2021-04-08 DOI: 10.1049/cps2.12011
Shichao Liu, Qingyang Li, Bo Chen

While most existing works ignore securing the communication of control signals in microgrids' centralized secondary frequency control, here, a stochastic game between the microgrid control centre (MGCC) and the attacker for enhancing the vulnerability of the MGCC to false data injection (FDI) attack (wireless spoof attack) is proposed. The vulnerability to wireless spoof attack is assessed based on the controllability Gramian when the FDI attack is modelled as the malicious control input that aims to drive the microgrid state to undesired values. In the formulated zero-sum two-player Markov game, the state is uniquely associated with the vulnerability index defined by the trace of the controllability Gramian with respect to the attack input. Moreover, the utility function of the stochastic game includes not only the costs related to conducting spoof attack and encryption actions but also the possible remedy costs associated with the resulted vulnerability levels. In turn, the potential impacts of the cyber-layer action choices on the performance of the physical power system are considered when designing the optimal attack and defence strategies. A distribution feeder system with four distributed generators (DGs) is used for simulation studies. The vulnerability assessment results show that the vulnerability level increases when the attacker compromises more on the communication links between the MGCC and DGs. In the simulated game, mixed stationary attack and defence strategies are predominate when considering the uncertainty of the other player.

现有的研究大多忽略了微电网集中二次频率控制中控制信号的通信安全问题,本文提出了一种微电网控制中心(MGCC)与攻击者之间的随机博弈,以提高MGCC对虚假数据注入(FDI)攻击(无线欺骗攻击)的脆弱性。将FDI攻击建模为旨在将微电网状态驱动到不期望值的恶意控制输入,基于可控性Gramian来评估无线欺骗攻击的脆弱性。在公式化的零和二人马尔可夫博弈中,状态与由可控性格拉曼相对于攻击输入的轨迹所定义的漏洞指数唯一相关。此外,随机博弈的效用函数不仅包括与进行欺骗攻击和加密操作相关的成本,还包括与所产生的漏洞级别相关的可能补救成本。进而,在设计最优攻击和防御策略时,考虑网络层行动选择对物理电力系统性能的潜在影响。采用4台分布式发电机组成的配电馈线系统进行了仿真研究。漏洞评估结果表明,攻击者对MGCC和dg之间的通信链路的攻击越多,漏洞等级越高。在模拟博弈中,当考虑到对手的不确定性时,混合静止攻防策略占主导地位。
{"title":"Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection attacks","authors":"Shichao Liu,&nbsp;Qingyang Li,&nbsp;Bo Chen","doi":"10.1049/cps2.12011","DOIUrl":"10.1049/cps2.12011","url":null,"abstract":"<p>While most existing works ignore securing the communication of control signals in microgrids' centralized secondary frequency control, here, a stochastic game between the microgrid control centre (MGCC) and the attacker for enhancing the vulnerability of the MGCC to false data injection (FDI) attack (wireless spoof attack) is proposed. The vulnerability to wireless spoof attack is assessed based on the controllability Gramian when the FDI attack is modelled as the malicious control input that aims to drive the microgrid state to undesired values. In the formulated zero-sum two-player Markov game, the state is uniquely associated with the vulnerability index defined by the trace of the controllability Gramian with respect to the attack input. Moreover, the utility function of the stochastic game includes not only the costs related to conducting spoof attack and encryption actions but also the possible remedy costs associated with the resulted vulnerability levels. In turn, the potential impacts of the cyber-layer action choices on the performance of the physical power system are considered when designing the optimal attack and defence strategies. A distribution feeder system with four distributed generators (DGs) is used for simulation studies. The vulnerability assessment results show that the vulnerability level increases when the attacker compromises more on the communication links between the MGCC and DGs. In the simulated game, mixed stationary attack and defence strategies are predominate when considering the uncertainty of the other player.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12011","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114598438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of distributed control and optimization in energy internet: From traditional methods to artificial intelligence-based methods 能源互联网分布式控制与优化研究综述:从传统方法到基于人工智能的方法
IF 1.5 Q1 Engineering Pub Date : 2021-04-05 DOI: 10.1049/cps2.12007
Haochen Hua, Zhiqian Wei, Yuchao Qin, Tonghe Wang, Liuying Li, Junwei Cao

Energy internet (EI) can alleviate the arduous challenges brought about by the energy crisis and global warming and has aroused the concern of many scholars. In the research of EI control systems, the access of distributed energy causes the power system to exhibit complex nonlinearity, high uncertainty and strong coupling. Traditional control and optimization methods often have limited effectiveness in solving these problems. With the widespread application of distributed control technology and the maturity of artificial intelligence (AI) technology, the combination of distributed control and AI has become an effective method to break through current research bottlenecks. This study reviews the research progress of EI distributed control technologies based on AI in recent years. It can be found that AI-based distributed control methods have many advantages in maintaining EI stability and achieving optimal energy management. This combination of AI and distributed control makes EI control systems more intelligent, safe and efficient, which will be an important direction for future research. The purpose of this study is to provide a reference as well as useful research ideas for the study of EI control systems.

能源互联网能够缓解能源危机和全球变暖带来的严峻挑战,引起了众多学者的关注。在EI控制系统的研究中,分布式能量的接入使电力系统呈现出复杂的非线性、高不确定性和强耦合。传统的控制和优化方法在解决这些问题时往往效果有限。随着分布式控制技术的广泛应用和人工智能(AI)技术的成熟,将分布式控制与AI相结合已成为突破当前研究瓶颈的有效方法。本文综述了近年来基于AI的EI分布式控制技术的研究进展。可以发现,基于人工智能的分布式控制方法在保持EI稳定性和实现最优能量管理方面具有诸多优势。这种人工智能与分布式控制的结合,使EI控制系统更加智能、安全、高效,将是未来研究的重要方向。本研究的目的是为EI控制系统的研究提供参考和有益的研究思路。
{"title":"Review of distributed control and optimization in energy internet: From traditional methods to artificial intelligence-based methods","authors":"Haochen Hua,&nbsp;Zhiqian Wei,&nbsp;Yuchao Qin,&nbsp;Tonghe Wang,&nbsp;Liuying Li,&nbsp;Junwei Cao","doi":"10.1049/cps2.12007","DOIUrl":"https://doi.org/10.1049/cps2.12007","url":null,"abstract":"<p>Energy internet (EI) can alleviate the arduous challenges brought about by the energy crisis and global warming and has aroused the concern of many scholars. In the research of EI control systems, the access of distributed energy causes the power system to exhibit complex nonlinearity, high uncertainty and strong coupling. Traditional control and optimization methods often have limited effectiveness in solving these problems. With the widespread application of distributed control technology and the maturity of artificial intelligence (AI) technology, the combination of distributed control and AI has become an effective method to break through current research bottlenecks. This study reviews the research progress of EI distributed control technologies based on AI in recent years. It can be found that AI-based distributed control methods have many advantages in maintaining EI stability and achieving optimal energy management. This combination of AI and distributed control makes EI control systems more intelligent, safe and efficient, which will be an important direction for future research. The purpose of this study is to provide a reference as well as useful research ideas for the study of EI control systems.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91821527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Energy management in a cloud-based cyber-physical system 基于云的网络物理系统中的能源管理
IF 1.5 Q1 Engineering Pub Date : 2021-04-05 DOI: 10.1049/cps2.12008
Efe F. Orumwense, Khaled M. Abo-Al-Ez

Cyber-physical systems (CPSs) are embodied systems of highly unified computational, control and communicational elements tightly fused with the physical world. Normally, CPSs are seen to have limited storage and computational abilities due to the fact that they are implemented across several platforms and also embedded into larger systems. The fusion of Cloud computing and CPS gives rise to Cloud-based CPS; Cloud computing will no doubt provide numerous opportunities for CPSs to increase their capabilities by taking advantage of the resources (applications, servers, storage and network capabilities). With this new addition, there will definitely be an increase in energy consumption in the system and this becomes a huge and daunting task that needs to be overcome in actualising this goal. Here, the energy consumption in the network system is being evaluated to ensure an effective data transmission amongst sensor nodes. A simulation environment is considered where a particle swarm optimization algorithm is introduced to optimise and balance the consumption of energy in the system network. To ensure an energy-efficient Cloud data control center, an energy consumption model is developed based on resource utilisation. This, however, assists in managing the amount of resources to be utilised for a specific amount of workload.

信息物理系统(cps)是高度统一的计算、控制和通信元素与物理世界紧密融合的具体化系统。通常,cps被认为具有有限的存储和计算能力,因为它们是跨多个平台实现的,并且还嵌入到更大的系统中。云计算与CPS的融合产生了基于云的CPS;毫无疑问,云计算将为cps提供许多机会,通过利用资源(应用程序、服务器、存储和网络功能)来提高其能力。有了这个新添加,系统中的能耗肯定会增加,这成为实现这一目标需要克服的巨大而艰巨的任务。在这里,正在评估网络系统中的能量消耗,以确保传感器节点之间有效的数据传输。在仿真环境中,引入粒子群优化算法对系统网络的能量消耗进行优化和平衡。为了保证云数据控制中心的高能效,建立了基于资源利用的能耗模型。但是,这有助于管理用于特定工作量的资源量。
{"title":"Energy management in a cloud-based cyber-physical system","authors":"Efe F. Orumwense,&nbsp;Khaled M. Abo-Al-Ez","doi":"10.1049/cps2.12008","DOIUrl":"https://doi.org/10.1049/cps2.12008","url":null,"abstract":"<p>Cyber-physical systems (CPSs) are embodied systems of highly unified computational, control and communicational elements tightly fused with the physical world. Normally, CPSs are seen to have limited storage and computational abilities due to the fact that they are implemented across several platforms and also embedded into larger systems. The fusion of Cloud computing and CPS gives rise to Cloud-based CPS; Cloud computing will no doubt provide numerous opportunities for CPSs to increase their capabilities by taking advantage of the resources (applications, servers, storage and network capabilities). With this new addition, there will definitely be an increase in energy consumption in the system and this becomes a huge and daunting task that needs to be overcome in actualising this goal. Here, the energy consumption in the network system is being evaluated to ensure an effective data transmission amongst sensor nodes. A simulation environment is considered where a particle swarm optimization algorithm is introduced to optimise and balance the consumption of energy in the system network. To ensure an energy-efficient Cloud data control center, an energy consumption model is developed based on resource utilisation. This, however, assists in managing the amount of resources to be utilised for a specific amount of workload.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12008","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91821513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing normalization schemes for data isolated distributed deep learning 开发数据隔离分布式深度学习的规范化方案
IF 1.5 Q1 Engineering Pub Date : 2021-04-02 DOI: 10.1049/cps2.12004
Yujue Zhou, Ligang He, Shuang-Hua Yang

Distributed deep learning is an important and indispensable direction in the field of deep learning research. Earlier research has proposed many algorithms or techniques on accelerating distributed neural network training. This study discusses a new distributed training scenario, namely data isolated distributed deep learning. Specifically, each node has its own local data and cannot be shared for some reasons. However, in order to ensure the generalization of the model, the goal is to train a global model that required learning all the data, not just based on data from a local node. At this time, distributed training with data isolation is needed. An obvious challenge for distributed deep learning in this scenario is that the distribution of training data used by each node could be highly imbalanced because of data isolation. This brings difficulty to the normalization process in neural network training, because the traditional batch normalization (BN) method will fail under this kind of data imbalanced scenario. At this time, distributed training with data isolation is needed. Aiming at such data isolation scenarios, this study proposes a comprehensive data isolation deep learning scheme. Specifically, synchronous stochastic gradient descent algorithm is used for data exchange during training, and provides several normalization approaches to the problem of BN failure caused by data imbalance. Experimental results show the efficiency and accuracy of the proposed data isolated distributed deep learning scheme.

分布式深度学习是深度学习研究中一个重要而不可或缺的方向。早期的研究提出了许多加速分布式神经网络训练的算法或技术。本研究讨论了一种新的分布式训练场景,即数据隔离分布式深度学习。具体来说,每个节点都有自己的本地数据,由于某些原因无法共享。然而,为了保证模型的泛化,我们的目标是训练一个需要学习所有数据的全局模型,而不仅仅是基于局部节点的数据。此时,需要使用数据隔离的分布式训练。在这种情况下,分布式深度学习面临的一个明显挑战是,由于数据隔离,每个节点使用的训练数据的分布可能高度不平衡。这给神经网络训练中的归一化过程带来了困难,因为传统的批归一化(BN)方法在这种数据不平衡的情况下会失效。此时,需要使用数据隔离的分布式训练。针对此类数据隔离场景,本研究提出了一种综合的数据隔离深度学习方案。具体而言,采用同步随机梯度下降算法进行训练过程中的数据交换,并针对数据不平衡导致的BN故障问题提供了几种归一化方法。实验结果表明了所提出的数据隔离分布式深度学习方案的有效性和准确性。
{"title":"Developing normalization schemes for data isolated distributed deep learning","authors":"Yujue Zhou,&nbsp;Ligang He,&nbsp;Shuang-Hua Yang","doi":"10.1049/cps2.12004","DOIUrl":"https://doi.org/10.1049/cps2.12004","url":null,"abstract":"<p>Distributed deep learning is an important and indispensable direction in the field of deep learning research. Earlier research has proposed many algorithms or techniques on accelerating distributed neural network training. This study discusses a new distributed training scenario, namely data isolated distributed deep learning. Specifically, each node has its own local data and cannot be shared for some reasons. However, in order to ensure the generalization of the model, the goal is to train a global model that required learning all the data, not just based on data from a local node. At this time, distributed training with data isolation is needed. An obvious challenge for distributed deep learning in this scenario is that the distribution of training data used by each node could be highly imbalanced because of data isolation. This brings difficulty to the normalization process in neural network training, because the traditional batch normalization (BN) method will fail under this kind of data imbalanced scenario. At this time, distributed training with data isolation is needed. Aiming at such data isolation scenarios, this study proposes a comprehensive data isolation deep learning scheme. Specifically, synchronous stochastic gradient descent algorithm is used for data exchange during training, and provides several normalization approaches to the problem of BN failure caused by data imbalance. Experimental results show the efficiency and accuracy of the proposed data isolated distributed deep learning scheme.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91791346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A combined survey on distribution system state estimation and false data injection in cyber-physical power distribution networks 网络物理配电网中配电系统状态估计与虚假数据注入的综合研究
IF 1.5 Q1 Engineering Pub Date : 2021-03-22 DOI: 10.1049/cps2.12000
Poornachandratejasvi Laxman Bhattar, Naran M. Pindoriya, Anurag Sharma

The penetration of renewable energy sources (RES) in distribution systems has entailed heavy deployment of monitoring and control infrastructure in the distribution system. This deployment of sensors and communication infrastructure has led to the emergence of a modern grid with a complex cyber-physical network. On one hand, the cyber-physical system can play a pivotal role in coordination and control of distribution systems through distribution system state estimation (DSSE). On the other hand, the risk caused by cyber-attack has emerged as a major challenge for grid operation. The modelling aspects, namely DC loads, plug-in-vehicle and distributed generators (DGs) in DSSE and security aspects in cyber-physical distribution systems, are highlighted herein. This paper is divided into different sections emphasising on the problems and challenges associated with DSSE, cyber-attack focussing primarily on impact of false data injection (FDI) attack and co-simulation platform for investigation of vulnerability of cyber-physical systems. A comparative study among various DSSE and challenges namely, pseudo-measurement, time synchronisation and communication issues are discussed. The potential investigation of FDI and need for a co-simulation platform in distribution systems for risk analysis are also addressed. The opportunities and future research in the field of cyber-physical distribution systems are discussed in depth.

可再生能源在配电系统中的渗透需要在配电系统中大量部署监测和控制基础设施。传感器和通信基础设施的部署导致了具有复杂信息物理网络的现代网格的出现。一方面,网络物理系统可以通过配电系统状态估计(DSSE)在配电系统的协调和控制中发挥关键作用。另一方面,网络攻击风险已成为电网运行面临的重大挑战。建模方面,即DSSE中的直流负载,插电式车辆和分布式发电机(dg)以及网络物理配电系统中的安全方面,在此强调。本文分为不同的部分,强调与DSSE相关的问题和挑战,主要关注虚假数据注入(FDI)攻击的影响的网络攻击以及用于调查网络物理系统漏洞的联合仿真平台。讨论了各种DSSE的比较研究和挑战,即伪测量、时间同步和通信问题。本文还讨论了对FDI的潜在调查以及对分销系统风险分析联合模拟平台的需求。深入讨论了网络物流配送系统领域的机遇和未来的研究方向。
{"title":"A combined survey on distribution system state estimation and false data injection in cyber-physical power distribution networks","authors":"Poornachandratejasvi Laxman Bhattar,&nbsp;Naran M. Pindoriya,&nbsp;Anurag Sharma","doi":"10.1049/cps2.12000","DOIUrl":"https://doi.org/10.1049/cps2.12000","url":null,"abstract":"<p>The penetration of renewable energy sources (RES) in distribution systems has entailed heavy deployment of monitoring and control infrastructure in the distribution system. This deployment of sensors and communication infrastructure has led to the emergence of a modern grid with a complex cyber-physical network. On one hand, the cyber-physical system can play a pivotal role in coordination and control of distribution systems through distribution system state estimation (DSSE). On the other hand, the risk caused by cyber-attack has emerged as a major challenge for grid operation. The modelling aspects, namely DC loads, plug-in-vehicle and distributed generators (DGs) in DSSE and security aspects in cyber-physical distribution systems, are highlighted herein. This paper is divided into different sections emphasising on the problems and challenges associated with DSSE, cyber-attack focussing primarily on impact of false data injection (FDI) attack and co-simulation platform for investigation of vulnerability of cyber-physical systems. A comparative study among various DSSE and challenges namely, pseudo-measurement, time synchronisation and communication issues are discussed. The potential investigation of FDI and need for a co-simulation platform in distribution systems for risk analysis are also addressed. The opportunities and future research in the field of cyber-physical distribution systems are discussed in depth.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91861200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhanced cyber-physical security using attack-resistant cyber nodes and event-triggered moving target defence 使用抗攻击网络节点和事件触发移动目标防御增强网络物理安全性
IF 1.5 Q1 Engineering Pub Date : 2021-03-10 DOI: 10.1049/cps2.12002
Martin Higgins, Keith Mayes, Fei Teng

A cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined. The authors demonstrate that it is feasible to use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), to offer effective cyber-physical security. At the cyber layer, the proposed solution is based on the MULTOS Trust-Anchor chip, using an authenticated encryption protocol, offering cryptographically protected and chained reports at up to 12/s. The availability of the Trust-Anchors allows the grid controller to delegate aspects of passive anomaly detection, supporting local as well as central alarms. In this context, a distributed event-triggered MTD protocol is implemented at the physical layer to complement cyber side enhancement. This protocol applies a distributed anomaly detection scheme based on Holt-Winters seasonal forecasting in combination with MTD implemented via inductance perturbation. The scheme is shown to be effective at preventing or detecting a wide range of attacks against power system measurement system.

提出了一种保护电力系统基础设施免受虚假数据注入(FDI)攻击的网络物理认证策略。作者证明,使用小型,低成本,但高度抗攻击的安全芯片作为测量节点是可行的,并通过事件触发移动目标防御(MTD)增强,以提供有效的网络物理安全。在网络层,提出的解决方案基于MULTOS Trust-Anchor芯片,使用经过认证的加密协议,提供高达12/s的加密保护和链式报告。trust - anchor的可用性允许网格控制器委托被动异常检测的各个方面,支持本地和中央警报。在这种情况下,在物理层实现了分布式事件触发MTD协议,以补充网络侧增强。该协议采用了一种基于冬冬季节预报的分布式异常检测方案,并结合了电感扰动实现的MTD。该方案可有效防止或检测针对电力系统测量系统的各种攻击。
{"title":"Enhanced cyber-physical security using attack-resistant cyber nodes and event-triggered moving target defence","authors":"Martin Higgins,&nbsp;Keith Mayes,&nbsp;Fei Teng","doi":"10.1049/cps2.12002","DOIUrl":"https://doi.org/10.1049/cps2.12002","url":null,"abstract":"<p>A cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined. The authors demonstrate that it is feasible to use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), to offer effective cyber-physical security. At the cyber layer, the proposed solution is based on the MULTOS Trust-Anchor chip, using an authenticated encryption protocol, offering cryptographically protected and chained reports at up to 12/s. The availability of the Trust-Anchors allows the grid controller to delegate aspects of passive anomaly detection, supporting local as well as central alarms. In this context, a distributed event-triggered MTD protocol is implemented at the physical layer to complement cyber side enhancement. This protocol applies a distributed anomaly detection scheme based on Holt-Winters seasonal forecasting in combination with MTD implemented via inductance perturbation. The scheme is shown to be effective at preventing or detecting a wide range of attacks against power system measurement system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91824033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A time-sensitive networking-enabled synchronized three-phase and phasor measurement-based monitoring system for microgrids 一种基于微电网的时间敏感网络同步三相和相量测量监测系统
IF 1.5 Q1 Engineering Pub Date : 2021-03-10 DOI: 10.1049/cps2.12001
Tanushree Agarwal, Payam Niknejad, Fatemeh Rahmani, Mohammadreza Barzegaran, Luigi Vanfretti

This paper presents the design and implementation of a Time-Sensitive Networking (TSN) protocol-enabled synchronized measurement-based monitoring system for microgrids. The proposed approach synchronizes and prioritizes the communication nodes, allowing it to transfer ultra-high three-phase sampled data and phasors. TSN is achieved by Quality of Service (QoS) profile software library. This allows control, monitoring, traffic scheduling, and prioritization. Some buses in a microgrid may have priority over others; and this can be prioritized at the data level too, where a part of the information is more critical than the others. The advantages of utilizing the TSN protocol on a microgrid with the approach proposed are: it is an alternative to GPS technology, three-phase data can be exchanged at much faster rate and data traffic in the network can be shaped with low packet loss, and low latency, in addition to providing interoperability through Data Distribution Services (DDS). These enhancements improve the communication reliability and enable distributed control, resulting in avoidance of any bottlenecks in the communications network. This proposed approach is implemented and demonstrated in a laboratory-scale microgrid. The results obtained, verify low latency and high throughput of the entire system while meeting the TSN and QoS requirements.

本文介绍了一种基于时间敏感网络(TSN)协议的微电网同步测量监测系统的设计和实现。所提出的方法对通信节点进行同步和优先级排序,使其能够传输超高三相采样数据和相量。TSN是通过QoS profile软件库实现的。这允许控制、监视、流量调度和优先级排序。微电网中的一些公共汽车可能比其他公共汽车有优先权;这也可以在数据级别进行优先排序,其中一部分信息比其他信息更重要。采用所提出的方法在微电网上利用TSN协议的优点是:它是GPS技术的替代方案,三相数据可以以更快的速度交换,网络中的数据流量可以以低丢包和低延迟形成,此外还可以通过数据分发服务(DDS)提供互操作性。这些增强提高了通信可靠性并支持分布式控制,从而避免了通信网络中的任何瓶颈。该方法在实验室规模的微电网中得到了实现和验证。得到的结果验证了整个系统在满足TSN和QoS要求的同时具有低延迟和高吞吐量。
{"title":"A time-sensitive networking-enabled synchronized three-phase and phasor measurement-based monitoring system for microgrids","authors":"Tanushree Agarwal,&nbsp;Payam Niknejad,&nbsp;Fatemeh Rahmani,&nbsp;Mohammadreza Barzegaran,&nbsp;Luigi Vanfretti","doi":"10.1049/cps2.12001","DOIUrl":"https://doi.org/10.1049/cps2.12001","url":null,"abstract":"<p>This paper presents the design and implementation of a Time-Sensitive Networking (TSN) protocol-enabled synchronized measurement-based monitoring system for microgrids. The proposed approach synchronizes and prioritizes the communication nodes, allowing it to transfer ultra-high three-phase sampled data and phasors. TSN is achieved by Quality of Service (QoS) profile software library. This allows control, monitoring, traffic scheduling, and prioritization. Some buses in a microgrid may have priority over others; and this can be prioritized at the data level too, where a part of the information is more critical than the others. The advantages of utilizing the TSN protocol on a microgrid with the approach proposed are: it is an alternative to GPS technology, three-phase data can be exchanged at much faster rate and data traffic in the network can be shaped with low packet loss, and low latency, in addition to providing interoperability through Data Distribution Services (DDS). These enhancements improve the communication reliability and enable distributed control, resulting in avoidance of any bottlenecks in the communications network. This proposed approach is implemented and demonstrated in a laboratory-scale microgrid. The results obtained, verify low latency and high throughput of the entire system while meeting the TSN and QoS requirements.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91824032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comprehensive fault simulation method in active distribution network with the consideration of cyber security 考虑网络安全的有源配电网综合故障仿真方法
IF 1.5 Q1 Engineering Pub Date : 2021-02-20 DOI: 10.1049/cps2.12003
Wanxing Sheng, Keyan Liu, Ying Liang

With the many characteristics of cyber–physical systems (CPS), including the complex evolution of various dynamic processes in distribution networks (DNs), communication modes and serious network security events have become important issues. From the perspective of DN analysis, traditional electrical digital simulations cannot access current models of communication systems and cyber network security events. The interactions between cyber and physical networks cannot be simulated and analysed simultaneously, which is challenging to the development of CPS simulations of DNs. To evaluate the impact of cyber networks on physical networks, a CPS simulation platform that contains physical, communication and control layers is discussed. Three-phase short-circuit fault processing and islanding operation control are simulated by data interactions among three-layer models that are used to analyse the impact of communication data tampering on fault handling processes. The influence of data tampering on fault processing and the influence of false data injection and data interception on islanding operation control processes are analysed. The simulation results show that the network information security has a large impact on fault protection and islanding operation control, which leads to the expansion of the outage scope and the failure of islanding operation frequency adjustment. This article also provides a simulation basis for the analysis of CPS operation characteristics and the identification and prevention of cyber network security events.

由于网络物理系统(CPS)的诸多特性,包括配电网中各种动态过程的复杂演变,通信模式和严重的网络安全事件已成为重要问题。从DN分析的角度来看,传统的电气数字仿真无法访问当前通信系统和网络安全事件的模型。网络和物理网络之间的相互作用不能同时模拟和分析,这对DNs的CPS模拟的发展提出了挑战。为了评估网络对物理网络的影响,讨论了一个包含物理层、通信层和控制层的CPS仿真平台。通过三层模型之间的数据交互模拟三相短路故障处理和孤岛运行控制,分析通信数据篡改对故障处理过程的影响。分析了数据篡改对故障处理的影响,以及假数据注入和数据拦截对孤岛运行控制过程的影响。仿真结果表明,网络信息安全对故障保护和孤岛运行控制有较大影响,导致停电范围扩大,孤岛运行频率调整失效。本文也为分析CPS运行特点,识别和防范网络安全事件提供了仿真依据。
{"title":"Comprehensive fault simulation method in active distribution network with the consideration of cyber security","authors":"Wanxing Sheng,&nbsp;Keyan Liu,&nbsp;Ying Liang","doi":"10.1049/cps2.12003","DOIUrl":"https://doi.org/10.1049/cps2.12003","url":null,"abstract":"<p>With the many characteristics of cyber–physical systems (CPS), including the complex evolution of various dynamic processes in distribution networks (DNs), communication modes and serious network security events have become important issues. From the perspective of DN analysis, traditional electrical digital simulations cannot access current models of communication systems and cyber network security events. The interactions between cyber and physical networks cannot be simulated and analysed simultaneously, which is challenging to the development of CPS simulations of DNs. To evaluate the impact of cyber networks on physical networks, a CPS simulation platform that contains physical, communication and control layers is discussed. Three-phase short-circuit fault processing and islanding operation control are simulated by data interactions among three-layer models that are used to analyse the impact of communication data tampering on fault handling processes. The influence of data tampering on fault processing and the influence of false data injection and data interception on islanding operation control processes are analysed. The simulation results show that the network information security has a large impact on fault protection and islanding operation control, which leads to the expansion of the outage scope and the failure of islanding operation frequency adjustment. This article also provides a simulation basis for the analysis of CPS operation characteristics and the identification and prevention of cyber network security events.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91853493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1