首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Multi objective task resource allocation method based on hierarchical Bayesian adaptive sparsity for edge computing in low voltage stations 基于分层贝叶斯自适应稀疏性的多目标任务资源分配方法,用于低压电站的边缘计算
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-03 DOI: 10.1049/cps2.12067
Yupeng Liu, Bofeng Yan, Jia Yu

In order to achieve more efficient and optimised resource scheduling, this research carried out a multi-objective task resource allocation method for low-voltage station edge computing based on hierarchical Bayesian adaptive sparsity. Based on hierarchical Bayesian adaptive sparsity, the multi-objective task resource allocation technical framework for edge computing in low-voltage stations is established, which is composed of end pipe edge cloud; After collecting real-time operation data of power distribution equipment, substation terminals, transmission terminals, etc. in the architecture end, it is transmitted to the data middle platform and service middle platform of the Internet of Things management platform in the cloud through the edge Internet of Things agent; Set and solve the constraint conditions, and build a multi type flexible load hierarchical optimal allocation model; The abnormal area topology identification sub module of multi-objective task resource of low-voltage station area edge computing is used to identify the abnormal area topology of the current low-voltage station area; Taking it as input, the multi-objective task resources of edge computing are allocated, and the multi-objective task resources allocation method of edge computing in low pressure platform area is realized under the differential evolution algorithm. The experimental results show that the proposed method has good convergence effect, strong distribution ability, relatively gentle increase in energy consumption, and the calculated results are basically consistent with the actual values, with good effectiveness.

为了实现更高效、更优化的资源调度,本研究开展了基于分层贝叶斯自适应稀疏性的低压站边缘计算多目标任务资源分配方法。基于分层贝叶斯自适应稀疏性,建立了低压站边缘计算的多目标任务资源分配技术框架,该框架由终端管道边缘云组成;在架构端采集配电设备、变电站终端、输电终端等的实时运行数据后,传输到终端管道边缘云。在架构端采集配电设备、变电站终端、输电终端等实时运行数据后,通过边缘物联网代理传输到云端物联网管理平台的数据中间平台和服务中间平台;设置并求解约束条件,建立多类型柔性负荷分层优化分配模型;利用低压台区边缘计算多目标任务资源异常区域拓扑识别子模块,识别当前低压台区异常区域拓扑;以此为输入,分配边缘计算多目标任务资源,在差分进化算法下实现低压台区边缘计算多目标任务资源分配方法。实验结果表明,所提方法收敛效果好,分配能力强,能耗增加相对平缓,计算结果与实际值基本一致,具有较好的有效性。
{"title":"Multi objective task resource allocation method based on hierarchical Bayesian adaptive sparsity for edge computing in low voltage stations","authors":"Yupeng Liu,&nbsp;Bofeng Yan,&nbsp;Jia Yu","doi":"10.1049/cps2.12067","DOIUrl":"10.1049/cps2.12067","url":null,"abstract":"<p>In order to achieve more efficient and optimised resource scheduling, this research carried out a multi-objective task resource allocation method for low-voltage station edge computing based on hierarchical Bayesian adaptive sparsity. Based on hierarchical Bayesian adaptive sparsity, the multi-objective task resource allocation technical framework for edge computing in low-voltage stations is established, which is composed of end pipe edge cloud; After collecting real-time operation data of power distribution equipment, substation terminals, transmission terminals, etc. in the architecture end, it is transmitted to the data middle platform and service middle platform of the Internet of Things management platform in the cloud through the edge Internet of Things agent; Set and solve the constraint conditions, and build a multi type flexible load hierarchical optimal allocation model; The abnormal area topology identification sub module of multi-objective task resource of low-voltage station area edge computing is used to identify the abnormal area topology of the current low-voltage station area; Taking it as input, the multi-objective task resources of edge computing are allocated, and the multi-objective task resources allocation method of edge computing in low pressure platform area is realized under the differential evolution algorithm. The experimental results show that the proposed method has good convergence effect, strong distribution ability, relatively gentle increase in energy consumption, and the calculated results are basically consistent with the actual values, with good effectiveness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"63-71"},"PeriodicalIF":0.8,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78667724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on the key technologies of power grid cyber-physical systems simulation 电网网络物理系统仿真关键技术综述
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-21 DOI: 10.1049/cps2.12062
Gang Lin, Christian Rehtanz, Shaoyang Wang, Jiayan Liu, Zhenyu Zhang, Pengcheng Wang

A Cyber-Physical System (CPS) is a spatiotemporal multi-dimensional and heterogeneous hybrid autonomous system composed of deep integration of information resources and physical systems. With the development of digitisation and digitalisation, a large number of data acquisition equipment, computing equipment, and electrical equipment are interconnected between the power grid and the information communication network. The power grid has thus been restructured as a mature and highly complex CPS. In order to promote the development of power grid CPS technologies and provide a reference for relevant researchers in the field, the origin and concept of CPS and features in power grid CPS are introduced firstly. Then the key technologies of power grid CPS simulation are discussed and further analysed from three perspectives, including modelling theory, simulation methods, and system-level simulation. On this basis, the application of CPS simulation technology in future power grids has been prospected.

网络物理系统(Cyber-Physical System,CPS)是由信息资源和物理系统深度融合而成的时空多维异构混合自主系统。随着数字化和数据化的发展,大量的数据采集设备、计算设备和电气设备在电网和信息通信网络之间互联互通。因此,电网已被重组为一个成熟且高度复杂的 CPS。为了促进电网 CPS 技术的发展,并为该领域的相关研究人员提供参考,本文首先介绍了 CPS 的起源、概念以及电网 CPS 的特点。然后,从建模理论、仿真方法和系统级仿真三个方面探讨并进一步分析了电网 CPS 仿真的关键技术。在此基础上,展望了 CPS 仿真技术在未来电网中的应用。
{"title":"Review on the key technologies of power grid cyber-physical systems simulation","authors":"Gang Lin,&nbsp;Christian Rehtanz,&nbsp;Shaoyang Wang,&nbsp;Jiayan Liu,&nbsp;Zhenyu Zhang,&nbsp;Pengcheng Wang","doi":"10.1049/cps2.12062","DOIUrl":"10.1049/cps2.12062","url":null,"abstract":"<p>A Cyber-Physical System (CPS) is a spatiotemporal multi-dimensional and heterogeneous hybrid autonomous system composed of deep integration of information resources and physical systems. With the development of digitisation and digitalisation, a large number of data acquisition equipment, computing equipment, and electrical equipment are interconnected between the power grid and the information communication network. The power grid has thus been restructured as a mature and highly complex CPS. In order to promote the development of power grid CPS technologies and provide a reference for relevant researchers in the field, the origin and concept of CPS and features in power grid CPS are introduced firstly. Then the key technologies of power grid CPS simulation are discussed and further analysed from three perspectives, including modelling theory, simulation methods, and system-level simulation. On this basis, the application of CPS simulation technology in future power grids has been prospected.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"1-16"},"PeriodicalIF":0.8,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12062","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88482739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new stable scheme against false data injection attacks in distributed control microgrid 针对分布式控制微电网中虚假数据注入攻击的新型稳定方案
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-16 DOI: 10.1049/cps2.12064
Vahid Tahani, Mohammad Haddad Zarif, Hossein Gholizadeh Narm

False Data Injection (FDI) attacks can be injected into the communication links of microgrids and result in significant damages. An approach to detect false data injection (FDI) attacks is introduced and a method to maintain the average voltages of buses within an acceptable range is suggested. To this aim, the impacts of FDI are first studied and a detection mechanism is extracted based on the attack effects. Then, multiple local integral feedback is employed to maintain the voltages within a permitted interval. Next, the procedure to return the values to their initial conditions (following the removal of the attack) is addressed. Finally, the proposed methods are simulated by multiple attack scenarios and validated using experimental tests.

虚假数据注入(FDI)攻击可注入微电网的通信链路,造成重大损失。本文介绍了一种检测虚假数据注入(FDI)攻击的方法,并提出了一种将母线平均电压保持在可接受范围内的方法。为此,首先研究了 FDI 的影响,并根据攻击影响提取了一种检测机制。然后,采用多重局部积分反馈将电压保持在允许的范围内。接着,讨论了将电压值恢复到初始状态(消除攻击后)的程序。最后,通过多种攻击场景对所提出的方法进行了模拟,并通过实验测试进行了验证。
{"title":"A new stable scheme against false data injection attacks in distributed control microgrid","authors":"Vahid Tahani,&nbsp;Mohammad Haddad Zarif,&nbsp;Hossein Gholizadeh Narm","doi":"10.1049/cps2.12064","DOIUrl":"10.1049/cps2.12064","url":null,"abstract":"<p>False Data Injection (FDI) attacks can be injected into the communication links of microgrids and result in significant damages. An approach to detect false data injection (FDI) attacks is introduced and a method to maintain the average voltages of buses within an acceptable range is suggested. To this aim, the impacts of FDI are first studied and a detection mechanism is extracted based on the attack effects. Then, multiple local integral feedback is employed to maintain the voltages within a permitted interval. Next, the procedure to return the values to their initial conditions (following the removal of the attack) is addressed. Finally, the proposed methods are simulated by multiple attack scenarios and validated using experimental tests.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"27-40"},"PeriodicalIF":0.8,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83471777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event-triggered attack detection and state estimation based on Gaussian mixture model 基于高斯混合模型的事件触发攻击检测与状态估计
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-04 DOI: 10.1049/cps2.12061
Lu Jiang, Di Jia, Jiping Xu, Cui Zhu, Kun Liu, Yuanqing Xia

Under the framework of event-triggered transmission mechanism, the problem of attack detection and state estimation of multi-sensor linear time-invariant systems under static attacks is considered. First, for each transmission channel, the sensor collects measurement information according to an event-triggered mechanism to reduce unnecessary energy consumption. Then, inspired by the clustering algorithm in machine learning, a detection mechanism based on Gaussian mixture model, which can set a confidence level for the measurement of each sensor is proposed. Finally, centralised data fusion is performed according to the results of attack detection and event-triggered judgement to realise remote state estimation. A numerical example proves that the proposed algorithm can locate the damaged sensor, save the network transmission bandwidth under the premise of ensuring accuracy and efficiency of sensor estimation.

在事件触发传输机制的框架下,研究了静态攻击下多传感器线性时不变系统的攻击检测和状态估计问题。首先,对于每个传输通道,传感器根据事件触发机制收集测量信息,减少不必要的能量消耗。然后,受机器学习中的聚类算法的启发,提出了一种基于高斯混合模型的检测机制,该机制可以为每个传感器的测量设置置信水平。最后,根据攻击检测结果和事件触发判断结果进行集中数据融合,实现远程状态估计。数值算例表明,该算法能在保证传感器估计精度和效率的前提下,对损坏的传感器进行定位,节省网络传输带宽。
{"title":"Event-triggered attack detection and state estimation based on Gaussian mixture model","authors":"Lu Jiang,&nbsp;Di Jia,&nbsp;Jiping Xu,&nbsp;Cui Zhu,&nbsp;Kun Liu,&nbsp;Yuanqing Xia","doi":"10.1049/cps2.12061","DOIUrl":"10.1049/cps2.12061","url":null,"abstract":"<p>Under the framework of event-triggered transmission mechanism, the problem of attack detection and state estimation of multi-sensor linear time-invariant systems under static attacks is considered. First, for each transmission channel, the sensor collects measurement information according to an event-triggered mechanism to reduce unnecessary energy consumption. Then, inspired by the clustering algorithm in machine learning, a detection mechanism based on Gaussian mixture model, which can set a confidence level for the measurement of each sensor is proposed. Finally, centralised data fusion is performed according to the results of attack detection and event-triggered judgement to realise remote state estimation. A numerical example proves that the proposed algorithm can locate the damaged sensor, save the network transmission bandwidth under the premise of ensuring accuracy and efficiency of sensor estimation.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"366-374"},"PeriodicalIF":0.8,"publicationDate":"2023-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74809651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power user portrait model based on random forest 基于随机森林的权力用户肖像模型
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-02 DOI: 10.1049/cps2.12063
Di Yang, Ming Ji, Yuntong Lv, Mengyu Li, Xuezhe Gao

With the vigorous development of the energy Internet, all kinds of user information data are increasing day by day. How to comprehensively and deeply mine the effective information of users, develop a model to predict the behaviour characteristics of big data users, distinguish customer relationships, and provide an accurate basis for the next behaviour of users for various platforms have become one of the research hotspots of big data analysis of user behaviour. The data is sampled according to the feature vector of power user. The portrait mining of power user is conducted, and the user screening and analysis are conducted by using the measure of decision tree node purity in the model. The decision tree variable of the up–down stopping rule is generated. Then the results of the model and the Logistics model are tested and analysed, which can effectively predict the behaviour of power user. The proposed user strategy based on the characteristics of power consumption behaviour is analysed to verify the effectiveness of the scheme. The example shows that the model has a strong ability to distinguish and good stability than the traditional Logistics model, which can effectively predict the user's behaviour in advance, reduce user complaints, and help enterprises and users to form a long-term mechanism of mutual benefit and reciprocity, which has a strong practical significance. This paper analyses the panorama of users through power big data technology and proposes a maturity model to evaluate the priority of users' electricity consumption. It emphasises the use of resources and methods provided in the power big data technology package to solve the practical problems of users' electricity consumption, and helps power companies to avoid market risks and improve service levels, which has strong practical significance.

随着能源互联网的蓬勃发展,各类用户信息数据与日俱增。如何全面深入挖掘用户的有效信息,建立模型预测大数据用户的行为特征,区分客户关系,为各类平台用户的下一步行为提供准确依据,成为用户行为大数据分析的研究热点之一。根据权力用户的特征向量对数据进行采样。对权力用户进行画像挖掘,利用模型中决策树节点纯度的度量进行用户筛选和分析。生成上下停止规则的决策树变量。然后对模型和物流模型的结果进行测试和分析,结果表明该模型能有效预测电力用户的行为。通过分析根据用电行为特征提出的用户策略,验证了方案的有效性。实例表明,该模型比传统的物流模型具有较强的区分能力和良好的稳定性,能有效地提前预测用户行为,减少用户投诉,有利于企业和用户形成互利互惠的长效机制,具有很强的现实意义。本文通过电力大数据技术分析用户全景,提出用户用电优先级评估成熟度模型。强调利用电力大数据技术包中提供的资源和方法解决用户用电的实际问题,帮助电力企业规避市场风险,提高服务水平,具有很强的现实意义。
{"title":"Power user portrait model based on random forest","authors":"Di Yang,&nbsp;Ming Ji,&nbsp;Yuntong Lv,&nbsp;Mengyu Li,&nbsp;Xuezhe Gao","doi":"10.1049/cps2.12063","DOIUrl":"10.1049/cps2.12063","url":null,"abstract":"<p>With the vigorous development of the energy Internet, all kinds of user information data are increasing day by day. How to comprehensively and deeply mine the effective information of users, develop a model to predict the behaviour characteristics of big data users, distinguish customer relationships, and provide an accurate basis for the next behaviour of users for various platforms have become one of the research hotspots of big data analysis of user behaviour. The data is sampled according to the feature vector of power user. The portrait mining of power user is conducted, and the user screening and analysis are conducted by using the measure of decision tree node purity in the model. The decision tree variable of the up–down stopping rule is generated. Then the results of the model and the Logistics model are tested and analysed, which can effectively predict the behaviour of power user. The proposed user strategy based on the characteristics of power consumption behaviour is analysed to verify the effectiveness of the scheme. The example shows that the model has a strong ability to distinguish and good stability than the traditional Logistics model, which can effectively predict the user's behaviour in advance, reduce user complaints, and help enterprises and users to form a long-term mechanism of mutual benefit and reciprocity, which has a strong practical significance. This paper analyses the panorama of users through power big data technology and proposes a maturity model to evaluate the priority of users' electricity consumption. It emphasises the use of resources and methods provided in the power big data technology package to solve the practical problems of users' electricity consumption, and helps power companies to avoid market risks and improve service levels, which has strong practical significance.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"17-26"},"PeriodicalIF":0.8,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90477706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on high-precision synchronous output technology of multi-reference source weighted synthesis in power system 电力系统多参考源加权合成高精度同步输出技术研究
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-16 DOI: 10.1049/cps2.12051
Ling Teng, Fangyun Dong, Hui Zhang, Huixia Ding

The massive perception data based on efficient analysis and intelligent decision have put forward higher requirements for high-precision time synchronisation with the construction and development of smart power grid. However, multi-reference source time-frequency synchronisation of power system only selects the best method after comparison, which cannot make the most efficient use of the existing resources. It also cannot meet the need for high-precision time synchronisation of future power system. The existing multi-reference source synthesis algorithms cannot take into account both long-term stability and high-precision synchronous output. This article presents a multi-reference source weighted improved noise model and the high-precision output method. The multi-reference source error after classification is eliminated by leading into classification vector and classification coefficient. The synthesised frequency offset or the time precision of output can be optimised as the objective function by weighted classification algorithm and genetic algorithm. A simulation example based on the synthesis of two satellite system clock sources and three local caesium reference sources shows that the peak value of long-term output accuracy is controlled within 10 ns after classification weighted synthesis and optimisation, which is better than that of any single reference source.

随着智能电网的建设和发展,基于高效分析和智能决策的海量感知数据对高精度时间同步提出了更高的要求。然而,电力系统的多参考源时间频率同步只是在比较后选择最佳方法,无法最有效地利用现有资源。这也无法满足未来电力系统高精度时间同步的需求。现有的多参考源合成算法无法兼顾长期稳定性和高精度同步输出。本文提出了一种多参考源加权改进噪声模型和高精度输出方法。通过引入分类向量和分类系数,消除了分类后的多参考源误差。合成的频率偏移或输出的时间精度可作为目标函数,通过加权分类算法和遗传算法进行优化。基于两个卫星系统时钟源和三个本地铯参考源合成的仿真实例表明,经过分类加权合成和优化后,长期输出精度的峰值可控制在 10 ns 以内,优于任何单一参考源。
{"title":"Research on high-precision synchronous output technology of multi-reference source weighted synthesis in power system","authors":"Ling Teng,&nbsp;Fangyun Dong,&nbsp;Hui Zhang,&nbsp;Huixia Ding","doi":"10.1049/cps2.12051","DOIUrl":"10.1049/cps2.12051","url":null,"abstract":"<p>The massive perception data based on efficient analysis and intelligent decision have put forward higher requirements for high-precision time synchronisation with the construction and development of smart power grid. However, multi-reference source time-frequency synchronisation of power system only selects the best method after comparison, which cannot make the most efficient use of the existing resources. It also cannot meet the need for high-precision time synchronisation of future power system. The existing multi-reference source synthesis algorithms cannot take into account both long-term stability and high-precision synchronous output. This article presents a multi-reference source weighted improved noise model and the high-precision output method. The multi-reference source error after classification is eliminated by leading into classification vector and classification coefficient. The synthesised frequency offset or the time precision of output can be optimised as the objective function by weighted classification algorithm and genetic algorithm. A simulation example based on the synthesis of two satellite system clock sources and three local caesium reference sources shows that the peak value of long-term output accuracy is controlled within 10 ns after classification weighted synthesis and optimisation, which is better than that of any single reference source.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"247-256"},"PeriodicalIF":1.5,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12051","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72634243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack 虚假数据注入攻击下交直流混合微电网的分布式弹性恢复策略
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-15 DOI: 10.1049/cps2.12060
Yihe Wang, Luyuan Wang, Xiang Xiao, Haoran Cui, Liangsheng Lan

The AC/DC hybrid microgrid, which integrates AC microgrid and DC microgrid, greatly improves the flexibility of distributed energy. However, it is imperative to acknowledge that the microgrid in question is accompanied by a significantly elevated network security risk. To solve this problem, this article proposes a false data injection attack detection and alarm method based on active power output. The detection algorithm is capable of detecting attacks at any location within the microgrid and mitigating the impact of communication delay. Moreover, a distributed elastic recovery strategy based on the aforementioned detection algorithm is proposed. This strategy aims to expeditiously restore the compromised agent to its rated state. Finally, a simulation model is developed to demonstrate the effectiveness of the proposed strategy.

交直流混合微电网集成了交流微电网和直流微电网,大大提高了分布式能源的灵活性。然而,必须承认的是,这种微电网伴随着网络安全风险的大幅提升。为解决这一问题,本文提出了一种基于有功功率输出的虚假数据注入攻击检测和报警方法。该检测算法能够检测到微电网内任何位置的攻击,并减轻通信延迟的影响。此外,还提出了基于上述检测算法的分布式弹性恢复策略。该策略旨在将受攻击的代理迅速恢复到额定状态。最后,还开发了一个仿真模型来证明所提策略的有效性。
{"title":"Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack","authors":"Yihe Wang,&nbsp;Luyuan Wang,&nbsp;Xiang Xiao,&nbsp;Haoran Cui,&nbsp;Liangsheng Lan","doi":"10.1049/cps2.12060","DOIUrl":"10.1049/cps2.12060","url":null,"abstract":"<p>The AC/DC hybrid microgrid, which integrates AC microgrid and DC microgrid, greatly improves the flexibility of distributed energy. However, it is imperative to acknowledge that the microgrid in question is accompanied by a significantly elevated network security risk. To solve this problem, this article proposes a false data injection attack detection and alarm method based on active power output. The detection algorithm is capable of detecting attacks at any location within the microgrid and mitigating the impact of communication delay. Moreover, a distributed elastic recovery strategy based on the aforementioned detection algorithm is proposed. This strategy aims to expeditiously restore the compromised agent to its rated state. Finally, a simulation model is developed to demonstrate the effectiveness of the proposed strategy.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"280-288"},"PeriodicalIF":1.5,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83245932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification 综述:监测智能电网网络物理系统的态势感知和关键资产识别
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-12 DOI: 10.1049/cps2.12059
Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap

Cyber-Physical Systems (CPSs) are becoming more automated and aimed to be as efficient as possible by enabling integration between their operations and Information Technology (IT) resources. In combination with production automation, these systems need to identify their assets and the correlation between them; any potential threats or failures alert the relevant user/department and suggest the appropriate remediation plan. Moreover, identifying critical assets in these systems is essential. With numerous research and technologies available, assessing IT assets nowadays can be straightforward to implement. However, there is one significant issue of evaluating operational technology critical assets since they have different characteristics, and traditional solutions cannot work efficiently. This study presents the necessary background to attain the appropriate approach for monitoring critical assets in CPSs' Situational Awareness (SA). Additionally, the study presents a broad survey supported by an in-depth review of previous works in three important aspects. First, it reviews the applicability of possible techniques, tools and solutions that can be used to collect detailed information from such systems. Secondly, it covers studies that were implemented to evaluate the criticality of assets in CPSs, demonstrates requirements for critical asset identification, explores different risks and failure techniques utilised in these systems and delves into approaches to evaluate such methods in energy systems. Finally, this paper highlights and analyses SA gaps based on existing solutions, provides future directions and discusses open research issues.

网络物理系统(CPSs)正变得更加自动化,并旨在通过实现其运营与信息技术(IT)资源之间的集成来尽可能高效。结合生产自动化,这些系统需要识别其资产及其之间的相关性;任何潜在的威胁或故障都会提醒相关用户/部门,并提出适当的补救计划。此外,确定这些系统中的关键资产至关重要。有了大量的研究和技术,现在评估IT资产可以很容易地实现。然而,评估运营技术关键资产有一个重要问题,因为它们具有不同的特征,传统的解决方案无法有效工作。本研究提供了必要的背景,以获得适当的方法来监测CPSs的态势感知(SA)中的关键资产。此外,该研究提供了一个广泛的调查,并在三个重要方面对以前的工作进行了深入回顾。首先,它审查了可用于从此类系统收集详细信息的可能技术、工具和解决方案的适用性。其次,它涵盖了为评估消费品安全系统中资产的关键性而实施的研究,展示了关键资产识别的要求,探索了这些系统中使用的不同风险和故障技术,并深入探讨了评估能源系统中此类方法的方法。最后,本文在现有解决方案的基础上强调和分析了SA差距,提出了未来的方向,并讨论了开放的研究问题。
{"title":"A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification","authors":"Yazeed Alrowaili,&nbsp;Neetesh Saxena,&nbsp;Anurag Srivastava,&nbsp;Mauro Conti,&nbsp;Pete Burnap","doi":"10.1049/cps2.12059","DOIUrl":"https://doi.org/10.1049/cps2.12059","url":null,"abstract":"<p>Cyber-Physical Systems (CPSs) are becoming more automated and aimed to be as efficient as possible by enabling integration between their operations and Information Technology (IT) resources. In combination with production automation, these systems need to identify their assets and the correlation between them; any potential threats or failures alert the relevant user/department and suggest the appropriate remediation plan. Moreover, identifying critical assets in these systems is essential. With numerous research and technologies available, assessing IT assets nowadays can be straightforward to implement. However, there is one significant issue of evaluating operational technology critical assets since they have different characteristics, and traditional solutions cannot work efficiently. This study presents the necessary background to attain the appropriate approach for monitoring critical assets in CPSs' Situational Awareness (SA). Additionally, the study presents a broad survey supported by an in-depth review of previous works in three important aspects. First, it reviews the applicability of possible techniques, tools and solutions that can be used to collect detailed information from such systems. Secondly, it covers studies that were implemented to evaluate the criticality of assets in CPSs, demonstrates requirements for critical asset identification, explores different risks and failure techniques utilised in these systems and delves into approaches to evaluate such methods in energy systems. Finally, this paper highlights and analyses SA gaps based on existing solutions, provides future directions and discusses open research issues.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"160-185"},"PeriodicalIF":1.5,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection 利用分层特征聚类和激励加权异常检测检测智能电表虚假数据攻击
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-09 DOI: 10.1049/cps2.12057
Martin Higgins, Bruce Stephen, David Wallom

Spot pricing is often suggested as a method of increasing demand-side flexibility in electrical power load. However, few works have considered the vulnerability of spot pricing to financial fraud via false data injection (FDI) style attacks. The authors consider attacks which aim to alter the consumer load profile to exploit intraday price dips. The authors examine an anomaly detection protocol for cyber-attacks that seek to leverage spot prices for financial gain. In this way the authors outline a methodology for detecting attacks on industrial load smart meters. The authors first create a feature clustering model of the underlying business, segregated by business type. The authors then use these clusters to create an incentive-weighted anomaly detection protocol for false data attacks against load profiles. This clustering-based methodology incorporates both the load profile and spot pricing considerations for the detection of injected load profiles. To reduce false positives, the authors model incentive-based detection, which includes knowledge of spot prices, into the anomaly tracking, enabling the methodology to account for changes in the load profile which are unlikely to be attacks.

人们经常建议将现货定价作为提高电力负荷需求方灵活性的一种方法。然而,很少有著作考虑到现货定价容易受到通过虚假数据注入 (FDI) 式攻击进行金融欺诈的影响。作者考虑了旨在改变用户负荷状况以利用日内价格下跌的攻击。作者研究了一种异常检测协议,用于检测试图利用现货价格获取经济利益的网络攻击。因此,作者概述了一种检测工业负荷智能电表攻击的方法。作者首先创建了一个按业务类型划分的底层业务特征聚类模型。然后,作者利用这些聚类创建了一个激励加权异常检测协议,用于检测针对负载配置文件的虚假数据攻击。这种基于聚类的方法同时考虑了负荷曲线和现货定价因素,用于检测注入的负荷曲线。为了减少误报,作者将基于激励的检测(包括现货价格知识)建模到异常跟踪中,使该方法能够考虑到不可能是攻击的负载曲线变化。
{"title":"Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection","authors":"Martin Higgins,&nbsp;Bruce Stephen,&nbsp;David Wallom","doi":"10.1049/cps2.12057","DOIUrl":"10.1049/cps2.12057","url":null,"abstract":"<p>Spot pricing is often suggested as a method of increasing demand-side flexibility in electrical power load. However, few works have considered the vulnerability of spot pricing to financial fraud via false data injection (FDI) style attacks. The authors consider attacks which aim to alter the consumer load profile to exploit intraday price dips. The authors examine an anomaly detection protocol for cyber-attacks that seek to leverage spot prices for financial gain. In this way the authors outline a methodology for detecting attacks on industrial load smart meters. The authors first create a feature clustering model of the underlying business, segregated by business type. The authors then use these clusters to create an incentive-weighted anomaly detection protocol for false data attacks against load profiles. This clustering-based methodology incorporates both the load profile and spot pricing considerations for the detection of injected load profiles. To reduce false positives, the authors model incentive-based detection, which includes knowledge of spot prices, into the anomaly tracking, enabling the methodology to account for changes in the load profile which are unlikely to be attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"257-271"},"PeriodicalIF":1.5,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79538771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on eigenparameters and detection methods for single-phase-to-ground faults in non-effectively grounded distribution systems 非有效接地配电系统单相接地故障特征参数及检测方法研究
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-02 DOI: 10.1049/cps2.12055
Wanxing Sheng, Xiaohui Song

Non-effectively grounded power distribution systems (NGDS) are widely used in China and other countries. However, over a long time, single-phase-to-ground faults (SGF) have been misjudged or omitted by the monitoring system, threatening the security of the power supply system and human safety. Based on the reason analysis for the omitted and misjudged SGFs in NGDS, the concept of NGDS fault eigenparameters to correctly reflect fault characteristics and a method of SGF detection based on fault eigenparameters are proposed. Then, the detection mechanism of phase voltage and fault current resistive elements for SGF is revealed. The variation characteristics of typical fault parameters changing with distribution system scale (parameter) and fault transition resistance, such as residual voltage and Zero-sequence current (iA-iO), are analysed. The eigenparameters of SGF in certain NGDS with specific scales/parameters are also proposed, which can correctly reflect the fault characteristics under different transition resistances.

非有效接地配电系统(NGDS)在中国和其他国家得到了广泛的应用。然而,长期以来,单相接地故障一直被监测系统误判或忽略,威胁着供电系统的安全和人身安全。在分析NGDS中SGF遗漏和误判的原因的基础上,提出了正确反映故障特征的NGDS故障特征参数概念和基于故障特征参数的SGF检测方法。然后,揭示了SGF中相电压和故障电流电阻元件的检测机理。分析了典型故障参数随配电系统规模(参数)和故障过渡电阻(如剩余电压和零序电流)的变化特征。还提出了特定尺度/参数的NGDS中SGF的本征参数,可以正确地反映不同过渡电阻下的故障特征。
{"title":"Research on eigenparameters and detection methods for single-phase-to-ground faults in non-effectively grounded distribution systems","authors":"Wanxing Sheng,&nbsp;Xiaohui Song","doi":"10.1049/cps2.12055","DOIUrl":"https://doi.org/10.1049/cps2.12055","url":null,"abstract":"<p>Non-effectively grounded power distribution systems (NGDS) are widely used in China and other countries. However, over a long time, single-phase-to-ground faults (SGF) have been misjudged or omitted by the monitoring system, threatening the security of the power supply system and human safety. Based on the reason analysis for the omitted and misjudged SGFs in NGDS, the concept of NGDS fault eigenparameters to correctly reflect fault characteristics and a method of SGF detection based on fault eigenparameters are proposed. Then, the detection mechanism of phase voltage and fault current resistive elements for SGF is revealed. The variation characteristics of typical fault parameters changing with distribution system scale (parameter) and fault transition resistance, such as residual voltage and Zero-sequence current (iA-iO), are analysed. The eigenparameters of SGF in certain NGDS with specific scales/parameters are also proposed, which can correctly reflect the fault characteristics under different transition resistances.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"205-217"},"PeriodicalIF":1.5,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50118487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1