IET Cyber-Physical Systems: Theory and Applications最新文献

筛选
英文 中文
Cyber-physical component ranking for risk sensitivity analysis using betweenness centrality 使用中间性中心性进行风险敏感性分析的网络物理组件排序
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-04-21 DOI: 10.1049/cps2.12010
Amarachi Umunnakwe, Abhijeet Sahu, Mohammad Rasoul Narimani, Katherine Davis, Saman Zonouz
{"title":"Cyber-physical component ranking for risk sensitivity analysis using betweenness centrality","authors":"Amarachi Umunnakwe,&nbsp;Abhijeet Sahu,&nbsp;Mohammad Rasoul Narimani,&nbsp;Katherine Davis,&nbsp;Saman Zonouz","doi":"10.1049/cps2.12010","DOIUrl":"https://doi.org/10.1049/cps2.12010","url":null,"abstract":"<p>This article proposes a model for critical component ranking in power system risk analysis using a proposed cyber-physical betweenness centrality (CPBC) index. Risk assessment, as part of the contingency analysis, is a critical activity that can identify and evaluate component outages that lead to system vulnerability, aiding operators to improve resilience. A power system cyber-physical risk assessment model is proposed that calculates and offers an efficient protection strategy to the system operator based on component vulnerability to adversaries and the impact of compromised assets on the system operation. We present the CPBC index, which traverses generated attack graphs to rank components according to their importance in reducing adversary impact on the power system. The CPBC extends upon betweenness centrality and integrates into analysis, the services and security cost of communications between system components, as well as the likelihood of component exploitation as an adversary medium to the target relays. The proposed model recommends actions, taking into account the interconnections between cyber and physical components as well as cyber-induced Common Vulnerabilities and Exposure scores associated with these connections, thus protecting critical components. The proposed model is implemented on the Cyber-Physical Situational Awareness 8-substation and extended IEEE 300-bus cyber-physical power system models, and results are presented on the impacts of the proposed component ranking model on the security-aware operation of the power system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91856047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Strategy for distributed controller defence: Leveraging controller roles and control support groups to maintain or regain control in cyber-adversarial power systems 分布式控制器防御策略:利用控制器角色和控制支持小组来维持或重新获得对网络对抗电力系统的控制
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-04-09 DOI: 10.1049/cps2.12006
Shamina Hossain-McKenzie, Kaushik Raghunath, Katherine Davis, Sriharsha Etigowni, Saman Zonouz
{"title":"Strategy for distributed controller defence: Leveraging controller roles and control support groups to maintain or regain control in cyber-adversarial power systems","authors":"Shamina Hossain-McKenzie,&nbsp;Kaushik Raghunath,&nbsp;Katherine Davis,&nbsp;Sriharsha Etigowni,&nbsp;Saman Zonouz","doi":"10.1049/cps2.12006","DOIUrl":"https://doi.org/10.1049/cps2.12006","url":null,"abstract":"<p>Distributed controllers play a prominent role in electric power grid operation. The coordinated failure or malfunction of these controllers is a serious threat, where the resulting mechanisms and consequences are not yet well-known and planned against. If certain controllers are maliciously compromised by an adversary, they can be manipulated to drive the system to an unsafe state. The authors present a strategy for distributed controller defence (SDCD) for improved grid tolerance under conditions of distributed controller compromise. The work of the authors’ first formalises the roles that distributed controllers play and their control support groups using controllability analysis techniques. With these formally defined roles and groups, the authors then present defence strategies for maintaining or regaining system control during such an attack. A general control response framework is presented here for the compromise or failure of distributed controllers using the remaining, operational set. The SDCD approach is successfully demonstrated with a 7-bus system and the IEEE 118-bus system for single and coordinated distributed controller compromise; the results indicate that SDCD is able to significantly reduce system stress and mitigate compromise consequences.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91846028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection attacks 孤岛微电网二次频率控制抵御虚假数据注入攻击的博弈论漏洞管理
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-04-08 DOI: 10.1049/cps2.12011
Shichao Liu, Qingyang Li, Bo Chen
{"title":"Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection attacks","authors":"Shichao Liu,&nbsp;Qingyang Li,&nbsp;Bo Chen","doi":"10.1049/cps2.12011","DOIUrl":"10.1049/cps2.12011","url":null,"abstract":"<p>While most existing works ignore securing the communication of control signals in microgrids' centralized secondary frequency control, here, a stochastic game between the microgrid control centre (MGCC) and the attacker for enhancing the vulnerability of the MGCC to false data injection (FDI) attack (wireless spoof attack) is proposed. The vulnerability to wireless spoof attack is assessed based on the controllability Gramian when the FDI attack is modelled as the malicious control input that aims to drive the microgrid state to undesired values. In the formulated zero-sum two-player Markov game, the state is uniquely associated with the vulnerability index defined by the trace of the controllability Gramian with respect to the attack input. Moreover, the utility function of the stochastic game includes not only the costs related to conducting spoof attack and encryption actions but also the possible remedy costs associated with the resulted vulnerability levels. In turn, the potential impacts of the cyber-layer action choices on the performance of the physical power system are considered when designing the optimal attack and defence strategies. A distribution feeder system with four distributed generators (DGs) is used for simulation studies. The vulnerability assessment results show that the vulnerability level increases when the attacker compromises more on the communication links between the MGCC and DGs. In the simulated game, mixed stationary attack and defence strategies are predominate when considering the uncertainty of the other player.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12011","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114598438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of distributed control and optimization in energy internet: From traditional methods to artificial intelligence-based methods 能源互联网分布式控制与优化研究综述:从传统方法到基于人工智能的方法
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-04-05 DOI: 10.1049/cps2.12007
Haochen Hua, Zhiqian Wei, Yuchao Qin, Tonghe Wang, Liuying Li, Junwei Cao
{"title":"Review of distributed control and optimization in energy internet: From traditional methods to artificial intelligence-based methods","authors":"Haochen Hua,&nbsp;Zhiqian Wei,&nbsp;Yuchao Qin,&nbsp;Tonghe Wang,&nbsp;Liuying Li,&nbsp;Junwei Cao","doi":"10.1049/cps2.12007","DOIUrl":"https://doi.org/10.1049/cps2.12007","url":null,"abstract":"<p>Energy internet (EI) can alleviate the arduous challenges brought about by the energy crisis and global warming and has aroused the concern of many scholars. In the research of EI control systems, the access of distributed energy causes the power system to exhibit complex nonlinearity, high uncertainty and strong coupling. Traditional control and optimization methods often have limited effectiveness in solving these problems. With the widespread application of distributed control technology and the maturity of artificial intelligence (AI) technology, the combination of distributed control and AI has become an effective method to break through current research bottlenecks. This study reviews the research progress of EI distributed control technologies based on AI in recent years. It can be found that AI-based distributed control methods have many advantages in maintaining EI stability and achieving optimal energy management. This combination of AI and distributed control makes EI control systems more intelligent, safe and efficient, which will be an important direction for future research. The purpose of this study is to provide a reference as well as useful research ideas for the study of EI control systems.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91821527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Energy management in a cloud-based cyber-physical system 基于云的网络物理系统中的能源管理
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-04-05 DOI: 10.1049/cps2.12008
Efe F. Orumwense, Khaled M. Abo-Al-Ez
{"title":"Energy management in a cloud-based cyber-physical system","authors":"Efe F. Orumwense,&nbsp;Khaled M. Abo-Al-Ez","doi":"10.1049/cps2.12008","DOIUrl":"https://doi.org/10.1049/cps2.12008","url":null,"abstract":"<p>Cyber-physical systems (CPSs) are embodied systems of highly unified computational, control and communicational elements tightly fused with the physical world. Normally, CPSs are seen to have limited storage and computational abilities due to the fact that they are implemented across several platforms and also embedded into larger systems. The fusion of Cloud computing and CPS gives rise to Cloud-based CPS; Cloud computing will no doubt provide numerous opportunities for CPSs to increase their capabilities by taking advantage of the resources (applications, servers, storage and network capabilities). With this new addition, there will definitely be an increase in energy consumption in the system and this becomes a huge and daunting task that needs to be overcome in actualising this goal. Here, the energy consumption in the network system is being evaluated to ensure an effective data transmission amongst sensor nodes. A simulation environment is considered where a particle swarm optimization algorithm is introduced to optimise and balance the consumption of energy in the system network. To ensure an energy-efficient Cloud data control center, an energy consumption model is developed based on resource utilisation. This, however, assists in managing the amount of resources to be utilised for a specific amount of workload.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12008","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91821513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing normalization schemes for data isolated distributed deep learning 开发数据隔离分布式深度学习的规范化方案
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-04-02 DOI: 10.1049/cps2.12004
Yujue Zhou, Ligang He, Shuang-Hua Yang
{"title":"Developing normalization schemes for data isolated distributed deep learning","authors":"Yujue Zhou,&nbsp;Ligang He,&nbsp;Shuang-Hua Yang","doi":"10.1049/cps2.12004","DOIUrl":"https://doi.org/10.1049/cps2.12004","url":null,"abstract":"<p>Distributed deep learning is an important and indispensable direction in the field of deep learning research. Earlier research has proposed many algorithms or techniques on accelerating distributed neural network training. This study discusses a new distributed training scenario, namely data isolated distributed deep learning. Specifically, each node has its own local data and cannot be shared for some reasons. However, in order to ensure the generalization of the model, the goal is to train a global model that required learning all the data, not just based on data from a local node. At this time, distributed training with data isolation is needed. An obvious challenge for distributed deep learning in this scenario is that the distribution of training data used by each node could be highly imbalanced because of data isolation. This brings difficulty to the normalization process in neural network training, because the traditional batch normalization (BN) method will fail under this kind of data imbalanced scenario. At this time, distributed training with data isolation is needed. Aiming at such data isolation scenarios, this study proposes a comprehensive data isolation deep learning scheme. Specifically, synchronous stochastic gradient descent algorithm is used for data exchange during training, and provides several normalization approaches to the problem of BN failure caused by data imbalance. Experimental results show the efficiency and accuracy of the proposed data isolated distributed deep learning scheme.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91791346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A combined survey on distribution system state estimation and false data injection in cyber-physical power distribution networks 网络物理配电网中配电系统状态估计与虚假数据注入的综合研究
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-03-22 DOI: 10.1049/cps2.12000
Poornachandratejasvi Laxman Bhattar, Naran M. Pindoriya, Anurag Sharma
{"title":"A combined survey on distribution system state estimation and false data injection in cyber-physical power distribution networks","authors":"Poornachandratejasvi Laxman Bhattar,&nbsp;Naran M. Pindoriya,&nbsp;Anurag Sharma","doi":"10.1049/cps2.12000","DOIUrl":"https://doi.org/10.1049/cps2.12000","url":null,"abstract":"<p>The penetration of renewable energy sources (RES) in distribution systems has entailed heavy deployment of monitoring and control infrastructure in the distribution system. This deployment of sensors and communication infrastructure has led to the emergence of a modern grid with a complex cyber-physical network. On one hand, the cyber-physical system can play a pivotal role in coordination and control of distribution systems through distribution system state estimation (DSSE). On the other hand, the risk caused by cyber-attack has emerged as a major challenge for grid operation. The modelling aspects, namely DC loads, plug-in-vehicle and distributed generators (DGs) in DSSE and security aspects in cyber-physical distribution systems, are highlighted herein. This paper is divided into different sections emphasising on the problems and challenges associated with DSSE, cyber-attack focussing primarily on impact of false data injection (FDI) attack and co-simulation platform for investigation of vulnerability of cyber-physical systems. A comparative study among various DSSE and challenges namely, pseudo-measurement, time synchronisation and communication issues are discussed. The potential investigation of FDI and need for a co-simulation platform in distribution systems for risk analysis are also addressed. The opportunities and future research in the field of cyber-physical distribution systems are discussed in depth.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91861200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhanced cyber-physical security using attack-resistant cyber nodes and event-triggered moving target defence 使用抗攻击网络节点和事件触发移动目标防御增强网络物理安全性
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-03-10 DOI: 10.1049/cps2.12002
Martin Higgins, Keith Mayes, Fei Teng
{"title":"Enhanced cyber-physical security using attack-resistant cyber nodes and event-triggered moving target defence","authors":"Martin Higgins,&nbsp;Keith Mayes,&nbsp;Fei Teng","doi":"10.1049/cps2.12002","DOIUrl":"https://doi.org/10.1049/cps2.12002","url":null,"abstract":"<p>A cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined. The authors demonstrate that it is feasible to use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), to offer effective cyber-physical security. At the cyber layer, the proposed solution is based on the MULTOS Trust-Anchor chip, using an authenticated encryption protocol, offering cryptographically protected and chained reports at up to 12/s. The availability of the Trust-Anchors allows the grid controller to delegate aspects of passive anomaly detection, supporting local as well as central alarms. In this context, a distributed event-triggered MTD protocol is implemented at the physical layer to complement cyber side enhancement. This protocol applies a distributed anomaly detection scheme based on Holt-Winters seasonal forecasting in combination with MTD implemented via inductance perturbation. The scheme is shown to be effective at preventing or detecting a wide range of attacks against power system measurement system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91824033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A time-sensitive networking-enabled synchronized three-phase and phasor measurement-based monitoring system for microgrids 一种基于微电网的时间敏感网络同步三相和相量测量监测系统
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-03-10 DOI: 10.1049/cps2.12001
Tanushree Agarwal, Payam Niknejad, Fatemeh Rahmani, Mohammadreza Barzegaran, Luigi Vanfretti
{"title":"A time-sensitive networking-enabled synchronized three-phase and phasor measurement-based monitoring system for microgrids","authors":"Tanushree Agarwal,&nbsp;Payam Niknejad,&nbsp;Fatemeh Rahmani,&nbsp;Mohammadreza Barzegaran,&nbsp;Luigi Vanfretti","doi":"10.1049/cps2.12001","DOIUrl":"https://doi.org/10.1049/cps2.12001","url":null,"abstract":"<p>This paper presents the design and implementation of a Time-Sensitive Networking (TSN) protocol-enabled synchronized measurement-based monitoring system for microgrids. The proposed approach synchronizes and prioritizes the communication nodes, allowing it to transfer ultra-high three-phase sampled data and phasors. TSN is achieved by Quality of Service (QoS) profile software library. This allows control, monitoring, traffic scheduling, and prioritization. Some buses in a microgrid may have priority over others; and this can be prioritized at the data level too, where a part of the information is more critical than the others. The advantages of utilizing the TSN protocol on a microgrid with the approach proposed are: it is an alternative to GPS technology, three-phase data can be exchanged at much faster rate and data traffic in the network can be shaped with low packet loss, and low latency, in addition to providing interoperability through Data Distribution Services (DDS). These enhancements improve the communication reliability and enable distributed control, resulting in avoidance of any bottlenecks in the communications network. This proposed approach is implemented and demonstrated in a laboratory-scale microgrid. The results obtained, verify low latency and high throughput of the entire system while meeting the TSN and QoS requirements.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91824032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comprehensive fault simulation method in active distribution network with the consideration of cyber security 考虑网络安全的有源配电网综合故障仿真方法
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2021-02-20 DOI: 10.1049/cps2.12003
Wanxing Sheng, Keyan Liu, Ying Liang
{"title":"Comprehensive fault simulation method in active distribution network with the consideration of cyber security","authors":"Wanxing Sheng,&nbsp;Keyan Liu,&nbsp;Ying Liang","doi":"10.1049/cps2.12003","DOIUrl":"https://doi.org/10.1049/cps2.12003","url":null,"abstract":"<p>With the many characteristics of cyber–physical systems (CPS), including the complex evolution of various dynamic processes in distribution networks (DNs), communication modes and serious network security events have become important issues. From the perspective of DN analysis, traditional electrical digital simulations cannot access current models of communication systems and cyber network security events. The interactions between cyber and physical networks cannot be simulated and analysed simultaneously, which is challenging to the development of CPS simulations of DNs. To evaluate the impact of cyber networks on physical networks, a CPS simulation platform that contains physical, communication and control layers is discussed. Three-phase short-circuit fault processing and islanding operation control are simulated by data interactions among three-layer models that are used to analyse the impact of communication data tampering on fault handling processes. The influence of data tampering on fault processing and the influence of false data injection and data interception on islanding operation control processes are analysed. The simulation results show that the network information security has a large impact on fault protection and islanding operation control, which leads to the expansion of the outage scope and the failure of islanding operation frequency adjustment. This article also provides a simulation basis for the analysis of CPS operation characteristics and the identification and prevention of cyber network security events.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91853493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信