The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is propose...The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved.展开更多
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se...A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.展开更多
This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes ind...This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes individual discrepancies into consideration and can handle unknown faults with incomplete data.Extensive experiment results demonstrate high DSA accuracy and computational efficiency of the proposed RTL method.Theoretical analysis shows RTL can guarantee system performance.展开更多
The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arc...The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arctic states have accorded priority to the enhancement of military capacities in the region, with a view to safeguarding sovereign rights, ensuring navigation security of Arctic waterways, responding to contingencies and guaranteeing civil security. Such military capacity-building measures are otherwise interpreted as initiatives to resume arms race in the Arctic, which would be contributive to the security dilemma. Subject to the structural competition of the U.S. - Russia rivalry, there has long been an absence of a security regime in the Arctic. Nevertheless, the build-up of security regimes in the Arctic constitutes a major concern for the Arctic states, as well as for some extra-regional stakeholders. In the Arctic regional context, the ever-intensifying institutional cooperation in the domains of non- traditional and civil security lays the cornerstone for establishing confidence-building measures, and gives rise to the consensus that maintaining cooperation in the Arctic will be mutually rewarding for all.展开更多
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The...In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS.展开更多
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of pr...Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.展开更多
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment...This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks.展开更多
Power systems transport an increasing amount of electricity,and in the future,involve more distributed renewables and dynamic interactions of the equipment.The system response to disturbances must be secure and predic...Power systems transport an increasing amount of electricity,and in the future,involve more distributed renewables and dynamic interactions of the equipment.The system response to disturbances must be secure and predictable to avoid power blackouts.The system response can be simulated in the time domain.However,this dynamic security assessment(DSA)is not computationally tractable in real-time.Particularly promising is to train decision trees(DTs)from machine learning as interpretable classifiers to predict whether the systemwide responses to disturbances are secure.In most research,selecting the best DT model focuses on predictive accuracy.However,it is insufficient to focus solely on predictive accuracy.Missed alarms and false alarms have drastically different costs,and as security assessment is a critical task,interpretability is crucial for operators.In this work,the multiple objectives of interpretability,varying costs,and accuracies are considered for DT model selection.We propose a rigorous workflow to select the best classifier.In addition,we present two graphical approaches for visual inspection to illustrate the selection sensitivity to probability and impacts of disturbances.We propose cost curves to inspect selection combining all three objectives for the first time.Case studies on the IEEE 68 bus system and the French system show that the proposed approach allows for better DT-selections,with an 80%increase in interpretability,5%reduction in expected operating cost,while making almost zero accuracy compromises.The proposed approach scales well with larger systems and can be used for models beyond DTs.Hence,this work provides insights into criteria for model selection in a promising application for methods from artificial intelligence(AI).展开更多
This work presents a new approach to establishing the minimum requirements for anti-islanding protection of distributed energy resources(DERs)with focus on bulk power system stability.The proposed approach aims to avo...This work presents a new approach to establishing the minimum requirements for anti-islanding protection of distributed energy resources(DERs)with focus on bulk power system stability.The proposed approach aims to avoid cascade disconnection of DERs during major disturbances in the transmission network and to compromise as little as possible the detection of real islanding situations.The proposed approach concentrates on the rate-of-change of frequency(RoCoF)protection function and it is based on the assessment of dynamic security regions with the incorporation of a new and straightforward approach to represent the disconnection of DERs when analyzing the bulk power system stability.Initially,the impact of disconnection of DERs on the Brazilian Interconnected Power System(BIPS)stability is analyzed,highlighting the importance of modeling such disconnection in electromechanical stability studies,even considering low penetration levels of DERs.Then,the proposed approach is applied to the BIPS,evidencing its benefits when specifying the minimum requirements of anti-islanding protection,without overestimating them.展开更多
An analytical approach for probabilistic evaluation of transient stability of a power system incorporating a wind farm is presented in this study. Based on the fact that the boundary of practical dynamic security regi...An analytical approach for probabilistic evaluation of transient stability of a power system incorporating a wind farm is presented in this study. Based on the fact that the boundary of practical dynamic security region(PDSR) of a power system with double fed induction generators(DFIG) can be approximated by one or few hyper-planes in nodal power injection space, transient stability criterion for given configurations of pre-fault, fault-on and post-fault of a power system is to be expressed by certain expressions of linear combination of nodal injection vector and the transient stability probability(TSP) is further obtained with a much more simplified expression than the complex integral. Furthermore, considering uncertainties of nodal injection power including wind power and load, TSP is calculated analytically by Cornish-Fisher expansion, which can provide reliable evaluation results with high accuracy and much less computing time compared with Monte Carlo simulation. TSP and its visualization can further help operators and planners be aware of the degree of stability or instability and find critical components to monitor and reinforce. Test results on the New England 10-generators and 39-buses power system show the method's effectiveness and significance for probabilistic security assessment.展开更多
Software-Defined Networking(SDN) decouples the control plane and the data plane in network switches and routers, which enables the rapid innovation and optimization of routing and switching configurations. However,t...Software-Defined Networking(SDN) decouples the control plane and the data plane in network switches and routers, which enables the rapid innovation and optimization of routing and switching configurations. However,traditional routing mechanisms in SDN, based on the Dijkstra shortest path, do not take the capacity of nodes into account, which may lead to network congestion. Moreover, security resource utilization in SDN is inefficient and is not addressed by existing routing algorithms. In this paper, we propose Route Guardian, a reliable securityoriented SDN routing mechanism, which considers the capabilities of SDN switch nodes combined with a Network Security Virtualization framework. Our scheme employs the distributed network security devices effectively to ensure analysis of abnormal traffic and malicious node isolation. Furthermore, Route Guardian supports dynamic routing reconfiguration according to the latest network status. We prototyped Route Guardian and conducted theoretical analysis and performance evaluation. Our results demonstrate that this approach can effectively use the existing security devices and mechanisms in SDN.展开更多
基金Supported by National Natural Science Foundation of China (No.50595413)Special Fund of the National Fundamental Research of China(No.2004CB217904)+4 种基金US EPRI under Agreement EP-P29464/C9966Foundation for the Author of National Excellent Doctoral Disserta-tion (No.200439)Key Project of Ministry of Education of China(No.105047)Program for New Century Excellent Talents in University,Fok Ying Tung Education Foundation (No.104019)Innovation Fund of Tianjin Municipal (2006-09)
文摘The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved.
文摘A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.
基金supported by the Internal Talent Award(TRACS)with Wallenberg-NTU Presidential Postdoctoral Fellowship 2022the National Research Foundation,Singapore and DSO National Laboratories under the AI Singapore Program(AISG Award No:AISG2-RP-2020-019)+1 种基金the RIE 2020 Advanced Manufacturing and Engineering(AME)Programmatic Fund(No.A20G8b0102),SingaporeFuture Communications Research&Development Program(FCP-NTU-RG-2021-014).
文摘This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes individual discrepancies into consideration and can handle unknown faults with incomplete data.Extensive experiment results demonstrate high DSA accuracy and computational efficiency of the proposed RTL method.Theoretical analysis shows RTL can guarantee system performance.
基金supported by the Chinese Polar Environment Comprehensive Investigation and Assessment Program(Grant no.CHINARE2016-04-05-01)
文摘The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arctic states have accorded priority to the enhancement of military capacities in the region, with a view to safeguarding sovereign rights, ensuring navigation security of Arctic waterways, responding to contingencies and guaranteeing civil security. Such military capacity-building measures are otherwise interpreted as initiatives to resume arms race in the Arctic, which would be contributive to the security dilemma. Subject to the structural competition of the U.S. - Russia rivalry, there has long been an absence of a security regime in the Arctic. Nevertheless, the build-up of security regimes in the Arctic constitutes a major concern for the Arctic states, as well as for some extra-regional stakeholders. In the Arctic regional context, the ever-intensifying institutional cooperation in the domains of non- traditional and civil security lays the cornerstone for establishing confidence-building measures, and gives rise to the consensus that maintaining cooperation in the Arctic will be mutually rewarding for all.
文摘In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS.
基金Supported by the National Natural Science Foun-dation of China (90104005 ,60473023) the National High Tech-nology Research and Development Programof China (863 Program)(2002AA41051)
文摘Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.
文摘This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks.
基金The authors were supported by a scholarship funded by the Nige-rian National Petroleum Corporation,NNPC,the TU Delft AI Labs Programme,NL,and the research project IDLES,UK(EP/R045518/1).
文摘Power systems transport an increasing amount of electricity,and in the future,involve more distributed renewables and dynamic interactions of the equipment.The system response to disturbances must be secure and predictable to avoid power blackouts.The system response can be simulated in the time domain.However,this dynamic security assessment(DSA)is not computationally tractable in real-time.Particularly promising is to train decision trees(DTs)from machine learning as interpretable classifiers to predict whether the systemwide responses to disturbances are secure.In most research,selecting the best DT model focuses on predictive accuracy.However,it is insufficient to focus solely on predictive accuracy.Missed alarms and false alarms have drastically different costs,and as security assessment is a critical task,interpretability is crucial for operators.In this work,the multiple objectives of interpretability,varying costs,and accuracies are considered for DT model selection.We propose a rigorous workflow to select the best classifier.In addition,we present two graphical approaches for visual inspection to illustrate the selection sensitivity to probability and impacts of disturbances.We propose cost curves to inspect selection combining all three objectives for the first time.Case studies on the IEEE 68 bus system and the French system show that the proposed approach allows for better DT-selections,with an 80%increase in interpretability,5%reduction in expected operating cost,while making almost zero accuracy compromises.The proposed approach scales well with larger systems and can be used for models beyond DTs.Hence,this work provides insights into criteria for model selection in a promising application for methods from artificial intelligence(AI).
基金partially sponsored by CNPq,FAPERJ,and Coordenacao de Aperfeicoamento de Pessoal de Nível Superior-Brasil (CAPES)Finance Code 001。
文摘This work presents a new approach to establishing the minimum requirements for anti-islanding protection of distributed energy resources(DERs)with focus on bulk power system stability.The proposed approach aims to avoid cascade disconnection of DERs during major disturbances in the transmission network and to compromise as little as possible the detection of real islanding situations.The proposed approach concentrates on the rate-of-change of frequency(RoCoF)protection function and it is based on the assessment of dynamic security regions with the incorporation of a new and straightforward approach to represent the disconnection of DERs when analyzing the bulk power system stability.Initially,the impact of disconnection of DERs on the Brazilian Interconnected Power System(BIPS)stability is analyzed,highlighting the importance of modeling such disconnection in electromechanical stability studies,even considering low penetration levels of DERs.Then,the proposed approach is applied to the BIPS,evidencing its benefits when specifying the minimum requirements of anti-islanding protection,without overestimating them.
基金supported by the National Basic Research Program of China("973"Project)(Grant No.2013CB228204)the National Natural Science Foundation of China(Grant No.51407126)Tianjin Natural Science Foundation(Grant No.15JCQNJC07000)
文摘An analytical approach for probabilistic evaluation of transient stability of a power system incorporating a wind farm is presented in this study. Based on the fact that the boundary of practical dynamic security region(PDSR) of a power system with double fed induction generators(DFIG) can be approximated by one or few hyper-planes in nodal power injection space, transient stability criterion for given configurations of pre-fault, fault-on and post-fault of a power system is to be expressed by certain expressions of linear combination of nodal injection vector and the transient stability probability(TSP) is further obtained with a much more simplified expression than the complex integral. Furthermore, considering uncertainties of nodal injection power including wind power and load, TSP is calculated analytically by Cornish-Fisher expansion, which can provide reliable evaluation results with high accuracy and much less computing time compared with Monte Carlo simulation. TSP and its visualization can further help operators and planners be aware of the degree of stability or instability and find critical components to monitor and reinforce. Test results on the New England 10-generators and 39-buses power system show the method's effectiveness and significance for probabilistic security assessment.
基金supported in part by the National Natural Science Foundation of China (Nos. 61402029, 61370190, and 61379002)the National Key Basic Research Program (973) of China (No. 2012CB315905)
文摘Software-Defined Networking(SDN) decouples the control plane and the data plane in network switches and routers, which enables the rapid innovation and optimization of routing and switching configurations. However,traditional routing mechanisms in SDN, based on the Dijkstra shortest path, do not take the capacity of nodes into account, which may lead to network congestion. Moreover, security resource utilization in SDN is inefficient and is not addressed by existing routing algorithms. In this paper, we propose Route Guardian, a reliable securityoriented SDN routing mechanism, which considers the capabilities of SDN switch nodes combined with a Network Security Virtualization framework. Our scheme employs the distributed network security devices effectively to ensure analysis of abnormal traffic and malicious node isolation. Furthermore, Route Guardian supports dynamic routing reconfiguration according to the latest network status. We prototyped Route Guardian and conducted theoretical analysis and performance evaluation. Our results demonstrate that this approach can effectively use the existing security devices and mechanisms in SDN.