Coordinated Risk Mitigation Strategy For Integrated Energy Systems Under Cyber-Attacks

被引:34
作者
Zhao, Pengfei [1 ]
Gu, Chenghong [1 ]
Huo, Da [2 ]
机构
[1] Univ Bath, Dept Elect & Elect Engn, Bath BA2 7AY, Avon, England
[2] Newcastle Univ, Sch Engn, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Uncertainty; Generators; Indexes; Pipelines; Optimization; Robustness; Turbines; Cyber-attacks; distributionally robust optimization; false data injection attacks; integrated electricity and gas system; real-time operation; risk mitigation; DATA INJECTION ATTACKS; NATURAL-GAS; ROBUST OPTIMIZATION; POWER; UNCERTAINTY; ELECTRICITY; RESILIENCE; MANAGEMENT; DISPATCH; BLACKOUT;
D O I
10.1109/TPWRS.2020.2986455
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The dramatic increase of cyber-attacks onenergy systems can cause huge losses, which has drawn extensive attention due to the fast integration of information communication technologies (ICTs). This issue is becoming worse with the integration of electricity and gas systems (IEGS), facilitated by gas generation and new coupling technologies. This paper investigates the risk and mitigation strategies for IEGS under false data injection attacks (FDIA) in a hierarchical two-stage framework. The FDIA on both electricity and gas systems are modelled through injecting falsified data by adversaries. To mitigate the adverse impacts, a novel two-stage distributionally robust optimization (DRO) is proposed: i) day-ahead operationto determine initial operationscheme and ii) real-time corrective operation with the realization of FDIA and renewable generation uncertainties. A semidefinite programming is formulated for the original problemand it is then solved by a convex optimization-based algorithm. A typical IEGS is used fordemonstration, which shows that the proposed model is effective in mitigating the risks caused by potential FDIAand renewable uncertainties, by optimal coordinating energy infrastructures and load shedding.This work provides system operators with a powerful toolto operate the IEGS with enhanced security against malicious cyber-attacks while accommodating increasing renewable energy. The method can also be easily extended to operatingIEGS against other natural attacks.
引用
收藏
页码:4014 / 4025
页数:12
相关论文
共 50 条
  • [21] Robust H∞ cyber-attacks estimation for control systems
    Li Yumei
    Holger, Voos
    Mohamed, Daroijach
    2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 3124 - 3129
  • [22] On Identifying Vulnerable Nodes for Power Systems in the Presence of Undetectable Cyber-Attacks
    Zhao, Ting
    Xu, Yun
    Wang, Yinan
    Lin, Zhiyun
    Xu, Wenyuan
    Yang, Qiang
    PROCEEDINGS OF THE 2016 IEEE 11TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2016, : 1062 - 1067
  • [23] Distributed Remote Secure ADP-Based Control for Interconnected Power Systems Under Cyber-Attacks
    Zhang, Longjie
    Chen, Yong
    Abdelhameed, Esam H.
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 21827 - 21840
  • [24] Mitigating Propagation of Cyber-Attacks in Wide-Area Measurement Systems
    Sarjan, Hamed
    Asghari, Mohammadmahdi
    Ameli, Amir
    Ghafouri, Mohsen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9984 - 9999
  • [25] Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems
    Jahromi, Amir Namavar
    Karimipour, Hadis
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) : 13712 - 13722
  • [26] Bibliometric Analysis on Cyber-Attacks in Naval Sensors and Systems
    Pires de Albuquerque, Carlos Eduardo
    Santos Machado, Raphael Carlos
    de Sa, Alan Oliveira
    Barros de Toledo, Carlos Rafael
    2022 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR THE SEA LEARNING TO MEASURE SEA HEALTH PARAMETERS (METROSEA), 2022, : 474 - 478
  • [27] Deep Learning Strategies for Detecting and Mitigating Cyber-Attacks Targeting Water-Energy Nexus
    Abughali, Ahmed
    Alansari, Mohamad
    Al-Sumaiti, Ameena S.
    IEEE ACCESS, 2024, 12 : 129690 - 129704
  • [28] Risk-Loss Coordinated Admissibility Assessment of Wind Generation for Integrated Electric-Gas Systems
    Wang, Cheng
    Wang, Song
    Liu, Feng
    Bi, Tianshu
    Wang, Tiezhu
    IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (05) : 4454 - 4465
  • [29] Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis
    Lin, Hong
    Lam, James
    Wang, Zheng
    INFORMATION SCIENCES, 2021, 546 : 943 - 960
  • [30] Probabilistic event-triggered distributed filtering for fuzzy systems under cyber-attacks
    Zhou, Zhidong
    Cai, Ying
    Cheng, Jun
    Wang, Yunliang
    Cao, Jinde
    INFORMATION SCIENCES, 2025, 700