{"title":"Multi objective task resource allocation method based on hierarchical Bayesian adaptive sparsity for edge computing in low voltage stations","authors":"Yupeng Liu, Bofeng Yan, Jia Yu","doi":"10.1049/cps2.12067","DOIUrl":"10.1049/cps2.12067","url":null,"abstract":"<p>In order to achieve more efficient and optimised resource scheduling, this research carried out a multi-objective task resource allocation method for low-voltage station edge computing based on hierarchical Bayesian adaptive sparsity. Based on hierarchical Bayesian adaptive sparsity, the multi-objective task resource allocation technical framework for edge computing in low-voltage stations is established, which is composed of end pipe edge cloud; After collecting real-time operation data of power distribution equipment, substation terminals, transmission terminals, etc. in the architecture end, it is transmitted to the data middle platform and service middle platform of the Internet of Things management platform in the cloud through the edge Internet of Things agent; Set and solve the constraint conditions, and build a multi type flexible load hierarchical optimal allocation model; The abnormal area topology identification sub module of multi-objective task resource of low-voltage station area edge computing is used to identify the abnormal area topology of the current low-voltage station area; Taking it as input, the multi-objective task resources of edge computing are allocated, and the multi-objective task resources allocation method of edge computing in low pressure platform area is realized under the differential evolution algorithm. The experimental results show that the proposed method has good convergence effect, strong distribution ability, relatively gentle increase in energy consumption, and the calculated results are basically consistent with the actual values, with good effectiveness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"63-71"},"PeriodicalIF":1.5,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78667724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural architecture search for resource constrained hardware devices: A survey","authors":"Yongjia Yang, Jinyu Zhan, Wei Jiang, Yucheng Jiang, Antai Yu","doi":"10.1049/cps2.12058","DOIUrl":"https://doi.org/10.1049/cps2.12058","url":null,"abstract":"<p>With the emergence of powerful and low-energy Internet of Things devices, deep learning computing is increasingly applied to resource-constrained edge devices. However, the mismatch between hardware devices with low computing capacity and the increasing complexity of Deep Neural Network models, as well as the growing real-time requirements, bring challenges to the design and deployment of deep learning models. For example, autonomous driving technologies rely on real-time object detection of the environment, which cannot tolerate the extra latency of sending data to the cloud, processing and then sending the results back to edge devices. Many studies aim to find innovative ways to reduce the size of deep learning models, the number of Floating-point Operations per Second, and the time overhead of inference. Neural Architecture Search (NAS) makes it possible to automatically generate efficient neural network models. The authors summarise the existing NAS methods on resource-constrained devices and categorise them according to single-objective or multi-objective optimisation. We review the search space, the search algorithm and the constraints of NAS on hardware devices. We also explore the challenges and open problems of hardware NAS.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"149-159"},"PeriodicalIF":1.5,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50119278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gang Lin, Christian Rehtanz, Shaoyang Wang, Jiayan Liu, Zhenyu Zhang, Pengcheng Wang
{"title":"Review on the key technologies of power grid cyber-physical systems simulation","authors":"Gang Lin, Christian Rehtanz, Shaoyang Wang, Jiayan Liu, Zhenyu Zhang, Pengcheng Wang","doi":"10.1049/cps2.12062","DOIUrl":"10.1049/cps2.12062","url":null,"abstract":"<p>A Cyber-Physical System (CPS) is a spatiotemporal multi-dimensional and heterogeneous hybrid autonomous system composed of deep integration of information resources and physical systems. With the development of digitisation and digitalisation, a large number of data acquisition equipment, computing equipment, and electrical equipment are interconnected between the power grid and the information communication network. The power grid has thus been restructured as a mature and highly complex CPS. In order to promote the development of power grid CPS technologies and provide a reference for relevant researchers in the field, the origin and concept of CPS and features in power grid CPS are introduced firstly. Then the key technologies of power grid CPS simulation are discussed and further analysed from three perspectives, including modelling theory, simulation methods, and system-level simulation. On this basis, the application of CPS simulation technology in future power grids has been prospected.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"1-16"},"PeriodicalIF":1.5,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12062","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88482739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vahid Tahani, Mohammad Haddad Zarif, Hossein Gholizadeh Narm
{"title":"A new stable scheme against false data injection attacks in distributed control microgrid","authors":"Vahid Tahani, Mohammad Haddad Zarif, Hossein Gholizadeh Narm","doi":"10.1049/cps2.12064","DOIUrl":"10.1049/cps2.12064","url":null,"abstract":"<p>False Data Injection (FDI) attacks can be injected into the communication links of microgrids and result in significant damages. An approach to detect false data injection (FDI) attacks is introduced and a method to maintain the average voltages of buses within an acceptable range is suggested. To this aim, the impacts of FDI are first studied and a detection mechanism is extracted based on the attack effects. Then, multiple local integral feedback is employed to maintain the voltages within a permitted interval. Next, the procedure to return the values to their initial conditions (following the removal of the attack) is addressed. Finally, the proposed methods are simulated by multiple attack scenarios and validated using experimental tests.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"27-40"},"PeriodicalIF":1.5,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83471777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lu Jiang, Di Jia, Jiping Xu, Cui Zhu, Kun Liu, Yuanqing Xia
{"title":"Event-triggered attack detection and state estimation based on Gaussian mixture model","authors":"Lu Jiang, Di Jia, Jiping Xu, Cui Zhu, Kun Liu, Yuanqing Xia","doi":"10.1049/cps2.12061","DOIUrl":"10.1049/cps2.12061","url":null,"abstract":"<p>Under the framework of event-triggered transmission mechanism, the problem of attack detection and state estimation of multi-sensor linear time-invariant systems under static attacks is considered. First, for each transmission channel, the sensor collects measurement information according to an event-triggered mechanism to reduce unnecessary energy consumption. Then, inspired by the clustering algorithm in machine learning, a detection mechanism based on Gaussian mixture model, which can set a confidence level for the measurement of each sensor is proposed. Finally, centralised data fusion is performed according to the results of attack detection and event-triggered judgement to realise remote state estimation. A numerical example proves that the proposed algorithm can locate the damaged sensor, save the network transmission bandwidth under the premise of ensuring accuracy and efficiency of sensor estimation.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"366-374"},"PeriodicalIF":1.7,"publicationDate":"2023-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74809651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Di Yang, Ming Ji, Yuntong Lv, Mengyu Li, Xuezhe Gao
{"title":"Power user portrait model based on random forest","authors":"Di Yang, Ming Ji, Yuntong Lv, Mengyu Li, Xuezhe Gao","doi":"10.1049/cps2.12063","DOIUrl":"10.1049/cps2.12063","url":null,"abstract":"<p>With the vigorous development of the energy Internet, all kinds of user information data are increasing day by day. How to comprehensively and deeply mine the effective information of users, develop a model to predict the behaviour characteristics of big data users, distinguish customer relationships, and provide an accurate basis for the next behaviour of users for various platforms have become one of the research hotspots of big data analysis of user behaviour. The data is sampled according to the feature vector of power user. The portrait mining of power user is conducted, and the user screening and analysis are conducted by using the measure of decision tree node purity in the model. The decision tree variable of the up–down stopping rule is generated. Then the results of the model and the Logistics model are tested and analysed, which can effectively predict the behaviour of power user. The proposed user strategy based on the characteristics of power consumption behaviour is analysed to verify the effectiveness of the scheme. The example shows that the model has a strong ability to distinguish and good stability than the traditional Logistics model, which can effectively predict the user's behaviour in advance, reduce user complaints, and help enterprises and users to form a long-term mechanism of mutual benefit and reciprocity, which has a strong practical significance. This paper analyses the panorama of users through power big data technology and proposes a maturity model to evaluate the priority of users' electricity consumption. It emphasises the use of resources and methods provided in the power big data technology package to solve the practical problems of users' electricity consumption, and helps power companies to avoid market risks and improve service levels, which has strong practical significance.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"17-26"},"PeriodicalIF":1.5,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90477706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on high-precision synchronous output technology of multi-reference source weighted synthesis in power system","authors":"Ling Teng, Fangyun Dong, Hui Zhang, Huixia Ding","doi":"10.1049/cps2.12051","DOIUrl":"10.1049/cps2.12051","url":null,"abstract":"<p>The massive perception data based on efficient analysis and intelligent decision have put forward higher requirements for high-precision time synchronisation with the construction and development of smart power grid. However, multi-reference source time-frequency synchronisation of power system only selects the best method after comparison, which cannot make the most efficient use of the existing resources. It also cannot meet the need for high-precision time synchronisation of future power system. The existing multi-reference source synthesis algorithms cannot take into account both long-term stability and high-precision synchronous output. This article presents a multi-reference source weighted improved noise model and the high-precision output method. The multi-reference source error after classification is eliminated by leading into classification vector and classification coefficient. The synthesised frequency offset or the time precision of output can be optimised as the objective function by weighted classification algorithm and genetic algorithm. A simulation example based on the synthesis of two satellite system clock sources and three local caesium reference sources shows that the peak value of long-term output accuracy is controlled within 10 ns after classification weighted synthesis and optimisation, which is better than that of any single reference source.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"247-256"},"PeriodicalIF":1.5,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12051","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72634243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yihe Wang, Luyuan Wang, Xiang Xiao, Haoran Cui, Liangsheng Lan
{"title":"Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack","authors":"Yihe Wang, Luyuan Wang, Xiang Xiao, Haoran Cui, Liangsheng Lan","doi":"10.1049/cps2.12060","DOIUrl":"10.1049/cps2.12060","url":null,"abstract":"<p>The AC/DC hybrid microgrid, which integrates AC microgrid and DC microgrid, greatly improves the flexibility of distributed energy. However, it is imperative to acknowledge that the microgrid in question is accompanied by a significantly elevated network security risk. To solve this problem, this article proposes a false data injection attack detection and alarm method based on active power output. The detection algorithm is capable of detecting attacks at any location within the microgrid and mitigating the impact of communication delay. Moreover, a distributed elastic recovery strategy based on the aforementioned detection algorithm is proposed. This strategy aims to expeditiously restore the compromised agent to its rated state. Finally, a simulation model is developed to demonstrate the effectiveness of the proposed strategy.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"280-288"},"PeriodicalIF":1.5,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83245932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap
{"title":"A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification","authors":"Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap","doi":"10.1049/cps2.12059","DOIUrl":"https://doi.org/10.1049/cps2.12059","url":null,"abstract":"<p>Cyber-Physical Systems (CPSs) are becoming more automated and aimed to be as efficient as possible by enabling integration between their operations and Information Technology (IT) resources. In combination with production automation, these systems need to identify their assets and the correlation between them; any potential threats or failures alert the relevant user/department and suggest the appropriate remediation plan. Moreover, identifying critical assets in these systems is essential. With numerous research and technologies available, assessing IT assets nowadays can be straightforward to implement. However, there is one significant issue of evaluating operational technology critical assets since they have different characteristics, and traditional solutions cannot work efficiently. This study presents the necessary background to attain the appropriate approach for monitoring critical assets in CPSs' Situational Awareness (SA). Additionally, the study presents a broad survey supported by an in-depth review of previous works in three important aspects. First, it reviews the applicability of possible techniques, tools and solutions that can be used to collect detailed information from such systems. Secondly, it covers studies that were implemented to evaluate the criticality of assets in CPSs, demonstrates requirements for critical asset identification, explores different risks and failure techniques utilised in these systems and delves into approaches to evaluate such methods in energy systems. Finally, this paper highlights and analyses SA gaps based on existing solutions, provides future directions and discusses open research issues.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"160-185"},"PeriodicalIF":1.5,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection","authors":"Martin Higgins, Bruce Stephen, David Wallom","doi":"10.1049/cps2.12057","DOIUrl":"10.1049/cps2.12057","url":null,"abstract":"<p>Spot pricing is often suggested as a method of increasing demand-side flexibility in electrical power load. However, few works have considered the vulnerability of spot pricing to financial fraud via false data injection (FDI) style attacks. The authors consider attacks which aim to alter the consumer load profile to exploit intraday price dips. The authors examine an anomaly detection protocol for cyber-attacks that seek to leverage spot prices for financial gain. In this way the authors outline a methodology for detecting attacks on industrial load smart meters. The authors first create a feature clustering model of the underlying business, segregated by business type. The authors then use these clusters to create an incentive-weighted anomaly detection protocol for false data attacks against load profiles. This clustering-based methodology incorporates both the load profile and spot pricing considerations for the detection of injected load profiles. To reduce false positives, the authors model incentive-based detection, which includes knowledge of spot prices, into the anomaly tracking, enabling the methodology to account for changes in the load profile which are unlikely to be attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"257-271"},"PeriodicalIF":1.5,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79538771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}