期刊文献+

Graph-theoretic algorithms for cyber-physical vulnerability analysis of power grid with incomplete information 被引量:4

Graph-theoretic algorithms for cyber-physical vulnerability analysis of power grid with incomplete information
原文传递
导出
摘要 A key focus recently has been on assessing therisk of a coordinated cyber-physical attack and minimizing the impact of a successful attack. Most of the cyberattackers will have limited system information and conventional power grid N-1 security analysis cannot be extended to assess the risk. Centrality measures are widely used in the network science and an attacker with incomplete information can use it to identify power system vulnerabilities by defining the system as a complex network but without real-time system measurements. This paper presents a graph theory based centrality indices for vulnerability assessment of the power system due to various bus and branch contingencies using limited system information and provides a preliminary defense mechanism to prevent such an attack. Proposed work answers the fundamental question of possible attack scenarios by balancing risk(limited information with low risk to get caught orhigh risk attack to access more system information) and impact(identifying contingencies with maximal impact on system operation). Statistical comparisons are made between the graph theory measures compared to the corresponding DC power flow based N-X linear sensitivity measures. A unified N-X centrality based performance index is proposed and validated against the AC power flow based performance index by doing the real-time simulations of an N-3 attack scenario. Defensive mechanisms using topology-based performance indices are also presented. A key focus recently has been on assessing therisk of a coordinated cyber-physical attack and minimizing the impact of a successful attack. Most of the cyberattackers will have limited system information and conventional power grid N-1 security analysis cannot be extended to assess the risk. Centrality measures are widely used in the network science and an attacker with incomplete information can use it to identify power system vulnerabilities by defining the system as a complex network but without real-time system measurements. This paper presents a graph theory based centrality indices for vulnerability assessment of the power system due to various bus and branch contingencies using limited system information and provides a preliminary defense mechanism to prevent such an attack. Proposed work answers the fundamental question of possible attack scenarios by balancing risk(limited information with low risk to get caught orhigh risk attack to access more system information) and impact(identifying contingencies with maximal impact on system operation). Statistical comparisons are made between the graph theory measures compared to the corresponding DC power flow based N-X linear sensitivity measures. A unified N-X centrality based performance index is proposed and validated against the AC power flow based performance index by doing the real-time simulations of an N-3 attack scenario. Defensive mechanisms using topology-based performance indices are also presented.
出处 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2018年第5期887-899,共13页 现代电力系统与清洁能源学报(英文)
关键词 Cyber-physical security Graph theory Transmission system CONTINGENCY DEFENSE mechanism INCOMPLETE information Cyber-physical security Graph theory Transmission system Contingency Defense mechanism Incomplete information
  • 相关文献

同被引文献37

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部