期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Graph-theoretic algorithms for cyber-physical vulnerability analysis of power grid with incomplete information 被引量:4
1
作者 Anurag K.SRIVASTAVA Timothy A.ERNSTER +1 位作者 Ren LIU Vignesh G.KRISHNAN 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2018年第5期887-899,共13页
A key focus recently has been on assessing therisk of a coordinated cyber-physical attack and minimizing the impact of a successful attack. Most of the cyberattackers will have limited system information and conventio... A key focus recently has been on assessing therisk of a coordinated cyber-physical attack and minimizing the impact of a successful attack. Most of the cyberattackers will have limited system information and conventional power grid N-1 security analysis cannot be extended to assess the risk. Centrality measures are widely used in the network science and an attacker with incomplete information can use it to identify power system vulnerabilities by defining the system as a complex network but without real-time system measurements. This paper presents a graph theory based centrality indices for vulnerability assessment of the power system due to various bus and branch contingencies using limited system information and provides a preliminary defense mechanism to prevent such an attack. Proposed work answers the fundamental question of possible attack scenarios by balancing risk(limited information with low risk to get caught orhigh risk attack to access more system information) and impact(identifying contingencies with maximal impact on system operation). Statistical comparisons are made between the graph theory measures compared to the corresponding DC power flow based N-X linear sensitivity measures. A unified N-X centrality based performance index is proposed and validated against the AC power flow based performance index by doing the real-time simulations of an N-3 attack scenario. Defensive mechanisms using topology-based performance indices are also presented. 展开更多
关键词 Cyber-physical security Graph theory Transmission system CONTINGENCY DEFENSE mechanism INCOMPLETE information
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部