能源安全的社会计算方法

IF 3.7 Q1 PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH 安全科学与韧性(英文) Pub Date : 2024-01-12 DOI:10.1016/j.jnlssr.2023.12.001
Pengfei Zhao , Shuangqi Li , Zhidong Cao , Paul Jen-Hwa Hu , Daniel Dajun Zeng , Da Xie , Yichen Shen , Jiangfeng Li , Tianyi Luo
{"title":"能源安全的社会计算方法","authors":"Pengfei Zhao ,&nbsp;Shuangqi Li ,&nbsp;Zhidong Cao ,&nbsp;Paul Jen-Hwa Hu ,&nbsp;Daniel Dajun Zeng ,&nbsp;Da Xie ,&nbsp;Yichen Shen ,&nbsp;Jiangfeng Li ,&nbsp;Tianyi Luo","doi":"10.1016/j.jnlssr.2023.12.001","DOIUrl":null,"url":null,"abstract":"<div><p>Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.</p></div>","PeriodicalId":62710,"journal":{"name":"安全科学与韧性(英文)","volume":"5 1","pages":"Pages 64-82"},"PeriodicalIF":3.7000,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666449624000021/pdfft?md5=ee0b546ba126233207f393bc1858e3fd&pid=1-s2.0-S2666449624000021-main.pdf","citationCount":"0","resultStr":"{\"title\":\"A social computing method for energy safety\",\"authors\":\"Pengfei Zhao ,&nbsp;Shuangqi Li ,&nbsp;Zhidong Cao ,&nbsp;Paul Jen-Hwa Hu ,&nbsp;Daniel Dajun Zeng ,&nbsp;Da Xie ,&nbsp;Yichen Shen ,&nbsp;Jiangfeng Li ,&nbsp;Tianyi Luo\",\"doi\":\"10.1016/j.jnlssr.2023.12.001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.</p></div>\",\"PeriodicalId\":62710,\"journal\":{\"name\":\"安全科学与韧性(英文)\",\"volume\":\"5 1\",\"pages\":\"Pages 64-82\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-01-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2666449624000021/pdfft?md5=ee0b546ba126233207f393bc1858e3fd&pid=1-s2.0-S2666449624000021-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"安全科学与韧性(英文)\",\"FirstCategoryId\":\"1087\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2666449624000021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"安全科学与韧性(英文)","FirstCategoryId":"1087","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666449624000021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PUBLIC, ENVIRONMENTAL & OCCUPATIONAL HEALTH","Score":null,"Total":0}
引用次数: 0

摘要

信息和通信技术使传统能源系统转变为网络物理能源系统(CPES),但此类系统也成为网络攻击的热门目标。目前,可用来评估网络攻击影响的方法在复原力、有效性和实用价值方面都很有限。为了减轻网络攻击可能带来的灾难性后果,本研究提出了一种基于差异的两阶段优化方法,该方法同时考虑了准备行动和响应措施,并融合了社会计算的概念。所提出的基于库尔贝-莱布勒发散的分布稳健优化(KDR)方法具有分层的两阶段目标函数,其中包含系统基础设施(如能源资源、储备能力)和实时响应措施(如负荷削减、需求侧管理、电动汽车充电站管理)的运营成本。通过结合社会计算原理,优化框架还可以捕捉能源消费者在应对网络攻击时的社会行为和互动。准备阶段需要提前一天做出运营决策,利用社会计算的洞察力来模拟和预测受潜在网络攻击影响的个人和社区的行为。在缓解阶段,考虑到能源消费者的社会背景和偏好,通过指导和优化需求方的能源使用,生成旨在控制攻击后果的应对措施,以确保具有弹性和经济效益的 CPES 运行。我们的方法可以确定这两个阶段的最优方案,同时考虑到问题的社会维度。一种独创的减灾模型采用抽象的表述方式,开发出一种风险中性模型,通过 KDR 描述网络攻击的特点,并结合社会计算技术,加强对网络威胁的理解和应对。与现有的几种方法相比,即使数据可用性有限,这种方法也能更有效地减轻影响。为了扩展这种风险中性模型,我们将条件风险值作为一种重要的风险度量,捕捉社会计算因素带来的不确定性和各种影响情景。实证结果证实,在 KDR 方法中加入社会计算因素后,该方法能产生具有弹性和经济效益的解决方案,用于管理网络攻击对 CPES 的影响。通过将社会计算原则纳入优化框架,可以更好地预测和解决与 CPES 网络攻击相关的社会和行为问题,最终提高系统响应措施的整体弹性和有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A social computing method for energy safety

Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems (CPESs), but such systems have also become popular targets of cyberattacks. Currently, available methods for evaluating the impacts of cyberattacks suffer from limited resilience, efficacy, and practical value. To mitigate their potentially disastrous consequences, this study suggests a two-stage, discrepancy-based optimization approach that considers both preparatory actions and response measures, integrating concepts from social computing. The proposed Kullback-Leibler divergence-based, distributionally robust optimization (KDR) method has a hierarchical, two-stage objective function that incorporates the operating costs of both system infrastructures (e.g., energy resources, reserve capacity) and real-time response measures (e.g., load shedding, demand-side management, electric vehicle charging station management). By incorporating social computing principles, the optimization framework can also capture the social behavior and interactions of energy consumers in response to cyberattacks. The preparatory stage entails day-ahead operational decisions, leveraging insights from social computing to model and predict the behaviors of individuals and communities affected by potential cyberattacks. The mitigation stage generates responses designed to contain the consequences of the attack by directing and optimizing energy use from the demand side, taking into account the social context and preferences of energy consumers, to ensure resilient, economically efficient CPES operations. Our method can determine optimal schemes in both stages, accounting for the social dimensions of the problem. An original disaster mitigation model uses an abstract formulation to develop a risk-neutral model that characterizes cyberattacks through KDR, incorporating social computing techniques to enhance the understanding and response to cyber threats. This approach can mitigate the impacts more effectively than several existing methods, even with limited data availability. To extend this risk-neutral model, we incorporate conditional value at risk as an essential risk measure, capturing the uncertainty and diverse impact scenarios arising from social computing factors. The empirical results affirm that the KDR method, which is enriched with social computing considerations, produces resilient, economically efficient solutions for managing the impacts of cyberattacks on a CPES. By integrating social computing principles into the optimization framework, it becomes possible to better anticipate and address the social and behavioral aspects associated with cyberattacks on CPESs, ultimately improving the overall resilience and effectiveness of the system's response measures.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
安全科学与韧性(英文)
安全科学与韧性(英文) Management Science and Operations Research, Safety, Risk, Reliability and Quality, Safety Research
CiteScore
8.70
自引率
0.00%
发文量
0
审稿时长
72 days
期刊最新文献
Grasping emergency dynamics: A review of group evacuation techniques and strategies in major emergencies Multi-factor coupled forest fire model based on cellular automata Scenario construction and vulnerability assessment of natural hazards-triggered power grid accidents Risk assessment of fire casualty in underground commercial building based on FFTA-BN model Determination of individual disaster resilience levels of hospital staff: A case study of Kartal Dr. Lütfi Kirdar City Hospital
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1