Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks

被引:7
作者
Wu, Yingjun [1 ]
Chen, Jinfan [1 ]
Ru, Yingtao [1 ]
Xu, Hao [2 ]
Roger, Mbonyineza [1 ]
Ni, Ming [3 ]
机构
[1] Hohai Univ, Coll Energy & Elect Engn, Nanjing 211100, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Nanjing 210023, Peoples R China
[3] NARI Grp Corp, State Grid Elect Power Res Inst, Nanjing 211106, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 02期
关键词
Communication networks; Planning; Network topology; Information processing; Topology; Power grids; Cyber-attack; game theory; power communication network; reachability; topology planning; DATA INJECTION ATTACKS; SYSTEMS;
D O I
10.1109/JSYST.2020.3026997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deep integration of computing, communication, and information technologies not only improves the operation level of the power grid, but also brings the threat of cyber-attacks on the power grid. This article studies power communication network topology planning problem considering both the normal operation level and the ability to against cyber-attacks from the perspective of information transmission reachability. First, by analyzing the game relationship between ensuring the normal operation level and defending against cyber-attacks, a framework of power communication network topology planning based on game theory is proposed. In this framework, the traditional planner tries to maximize the information transmission reachability of normal operation, while the anti-cyber-attack planner wants to minimize the information transmission reachability of cyber-attacks. Second, considering whether there are uncertainties in the planning, a deterministic topology planning model is proposed for the traditional planner, and an uncertainty topology planning model is proposed for the anti-cyber-attack planner. Third, considering the competition between the two planners, an improved particle swarm algorithm is introduced to solve the models. Finally, a standard example and a practical power communication network are used to verify the correction and effectiveness of the method.
引用
收藏
页码:2883 / 2894
页数:12
相关论文
共 50 条
[31]   Leveraging Network Topology Optimization to Strengthen Power Grid Resilience Against Cyber-Physical Attacks [J].
Liu, Zhaoxi ;
Wang, Lingfeng .
IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (02) :1552-1564
[32]   Event-Based Asynchronous Resilient Control for Markov Jump CPSs Against Cyber-Attacks and Actuator Failures [J].
Qin, Lei ;
Zhao, Youxing ;
Qin, Jianfeng .
IEEE ACCESS, 2023, 11 :111068-111078
[33]   Observer-Based Optimal Fuzzy Control for Networked IT-2 Fuzzy Systems Against Hybrid Cyber-Attacks [J].
Li, Yang ;
Park, Ju H. ;
Gu, Yang ;
He, Yong .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2025, 33 (02) :704-716
[34]   Control-theory based security control of cyber-physical power system under multiple cyber-attacks within unified model framework [J].
Zhao Z.-G. ;
Ye R.-B. ;
Zhou C. ;
Wang D.-H. ;
Shi T. .
Shi, Tao (TaoSHI_njupt@163.com), 1600, KeAi Communications Co. (01) :41-57
[35]   Network-Based Modeling and Sampling Guaranteed Cost Control for Unmanned Surface Vehicle Systems Under Stochastic Cyber-Attacks [J].
Ding, Kui ;
Zhu, Quanxin .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (06) :6173-6185
[36]   Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks [J].
Khan, Izhar Ahmed ;
Razzak, Imran ;
Pi, Dechang ;
Khan, Nasrullah ;
Hussain, Yasir ;
Li, Bentian ;
Kousar, Tanzeela .
INFORMATION FUSION, 2024, 101
[37]   Game Theory based Optimal Defensive Resources Allocation with Incomplete Information in Cyber-physical Power Systems against False Data Injection Attacks [J].
Yan, Bingjing ;
Jiang, Zhenze ;
Yao, Pengchao ;
Yang, Qiang ;
Li, Wei ;
Zomaya, Albert Y. .
PROTECTION AND CONTROL OF MODERN POWER SYSTEMS, 2024, 9 (02) :115-127
[38]   Proposal for Designing Method of Radio Transmission Range to Improve Both Power Saving and Communication Reachability Based on Target Problem [J].
Hamamoto, Ryo ;
Takano, Chisa ;
Obata, Hiroyasu ;
Aida, Masaki ;
Ishida, Kenji .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (11) :2271-2279
[39]   Dynamic-memory event-based asynchronous security control for positive singular semi-Markov jumping CPSs against multiple cyber-attacks [J].
Li, Zhipeng ;
Wang, Yanqian ;
Zhuang, Guangming ;
Yang, Zhibo .
ASIAN JOURNAL OF CONTROL, 2025, 27 (02) :704-715
[40]   Research on Survivability of Power Communication Network Based on P-cycle [J].
Wang Wenjin ;
Dang Qian ;
Sun Xiangju ;
Ren Jingbin ;
Lu Chao ;
Sun Yi ;
Li Bin .
PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, :592-595