Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks

被引:7
作者
Wu, Yingjun [1 ]
Chen, Jinfan [1 ]
Ru, Yingtao [1 ]
Xu, Hao [2 ]
Roger, Mbonyineza [1 ]
Ni, Ming [3 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Nanjing 210023, Peoples R China
[3] NARI Grp Corp, State Grid Elect Power Res Inst, Nanjing 211106, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 02期
关键词
Communication networks; Planning; Network topology; Information processing; Topology; Power grids; Cyber-attack; game theory; power communication network; reachability; topology planning; DATA INJECTION ATTACKS; SYSTEMS;
D O I
10.1109/JSYST.2020.3026997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deep integration of computing, communication, and information technologies not only improves the operation level of the power grid, but also brings the threat of cyber-attacks on the power grid. This article studies power communication network topology planning problem considering both the normal operation level and the ability to against cyber-attacks from the perspective of information transmission reachability. First, by analyzing the game relationship between ensuring the normal operation level and defending against cyber-attacks, a framework of power communication network topology planning based on game theory is proposed. In this framework, the traditional planner tries to maximize the information transmission reachability of normal operation, while the anti-cyber-attack planner wants to minimize the information transmission reachability of cyber-attacks. Second, considering whether there are uncertainties in the planning, a deterministic topology planning model is proposed for the traditional planner, and an uncertainty topology planning model is proposed for the anti-cyber-attack planner. Third, considering the competition between the two planners, an improved particle swarm algorithm is introduced to solve the models. Finally, a standard example and a practical power communication network are used to verify the correction and effectiveness of the method.
引用
收藏
页码:2883 / 2894
页数:12
相关论文
共 50 条
[21]   GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks [J].
Zarzycki, Krzysztof ;
Chaber, Patryk ;
Cabaj, Krzysztof ;
Lawrynczuk, Maciej ;
Marusak, Piotr ;
Nebeluk, Robert ;
Plamowski, Sebastian ;
Wojtulewicz, Andrzej .
IEEE ACCESS, 2023, 11 :49587-49600
[22]   Transient Stability Enhancement of Power Grid by Neural Network Controlled BFCL Considering Cyber-Attacks [J].
Sadi, Mohammad Ashraf Hossain ;
Zheng, Huaxi ;
Ali, Mohd. Hasan .
SOUTHEASTCON 2017, 2017,
[23]   Power Grid AC-Based State Estimation: Vulnerability Analysis Against Cyber Attacks [J].
Jin, Ming ;
Lavaei, Javad ;
Johansson, Karl Henrik .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (05) :1784-1799
[24]   Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns [J].
Yang, Shaohua ;
Lao, Keng-Weng ;
Hui, Hongxun ;
Chen, Yulin .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (06) :7277-7290
[25]   An IoT-Based Deep Learning Approach for Online Fault Detection Against Cyber-Attacks [J].
Rajkumar S. ;
Sheeba S.L. ;
Sivakami R. ;
Prabu S. ;
Selvarani A. .
SN Computer Science, 4 (4)
[26]   Lyapunov-Based Resilient Cooperative Control for DC Microgrid Clusters Against False Data Injection Cyber-Attacks [J].
Tan, Sen ;
Xie, Peilin ;
Guerrero, Josep M. ;
Vasquez, Juan C. ;
Alcala, Jose Matas ;
Carreno, Jorge El Mariachet ;
Guerrero-Zapata, Manel .
IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (03) :3208-3222
[27]   Distributed Prescribe Performance Control Based on Adaptive Neural Network Strategy for Multi-AAVs Under Cyber-Attacks [J].
Zhou, Yuhong ;
Chen, Yong ;
Zhang, Longjie .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (08) :9905-9916
[28]   Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization [J].
Naeem, Hamad ;
Ullah, Farhan ;
Srivastava, Gautam .
EXPERT SYSTEMS, 2025, 42 (01)
[29]   Towards Secured Online Monitoring for Digitalized GIS Against Cyber-Attacks Based on IoT and Machine Learning [J].
Elsisi, Mahmoud ;
Tran, Minh-Quang ;
Mahmoud, Karar ;
Mansour, Diaa-Eldin A. ;
Lehtonen, Matti ;
Darwish, Mohamed M. F. .
IEEE ACCESS, 2021, 9 :78415-78427
[30]   Distributed Remote Secure ADP-Based Control for Interconnected Power Systems Under Cyber-Attacks [J].
Zhang, Longjie ;
Chen, Yong ;
Abdelhameed, Esam H. .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12) :21827-21840