检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Bingjing Yan Zhenze Jiang Pengchao Yao Qiang Yang Wei Li Albert Y.Zomaya
机构地区:[1]College of Electrical Engineering,Zhejiang University [2]College of Control Science and Engineering,Zhejiang University [3]College of Electrical Engineering,Zhejiang University,Hangzhou 310027,China [4]School of Information Technologies at The University of Sydney [5]School of Information Technologies
出 处:《Protection and Control of Modern Power Systems》2024年第2期115-127,共13页现代电力系统保护与控制(英文)
基 金:supported by the National Key Research and Development Program of China(No.2023YFB 3107603);the“Pioneer”and“Leading Goose”R&D Program of Zhejiang(No.2022C01239);the Special Support Plan for Zhejiang Province High-level Talents(No.2022R52012);the National Natural Science Foundation of China(No.52177119);the Funda-mental Research Funds for the Central Universities(Zhejiang University NGICS Platform).
摘 要:Modern power grid is fast emerging as a complex cyber-physical power system(CPPS)integrating physical current-carrying components and processes with cyber-embedded computing,which faces increasing cy-berspace security threats and risks.In this paper,the state(i.e.,voltage)offsets resulting from false data injection(FDI)attacks and the bus safety characterization are applied to quantify the attack consequences.The state offsets are obtained by the state estimation method,and the bus safety characterization considers the power net-work topology as well as the vulnerability and connection relationship of buses.Considering the indeterminacy of attacker’s resource consumption and reward,a zero-sum game-theoretical model from the defender’s perspective with incomplete information is explored for the optimal allocation of limited defensive resources.The attacker aims to falsify measurements without triggering threshold alarms to break through the protection,leading to load shedding,over-voltage or under-voltage.The defender attempts to ensure the estimation results to be as close to the actual states as possible,and guarantee the system’s safety and efficient defensive resource utilization.The proposed solution is extensively evaluated through simu-lations using the IEEE 33-bus test network and real-time digital simulator(RTDS)based testbed experiments of the IEEE 14-bus network.The results demonstrate the effec-tiveness of the proposed game-theoretical approach for optimal defensive resource allocation in CPPS when lim-ited resources are available when under FDI attacks.Index Terms—Optimal strategy,game theory,Nash equilibrium,CPPS,FDI attack.
关 键 词:Optimal strategy game theory Nash equilibrium CPPS FDI attack
分 类 号:TM73[电气工程—电力系统及自动化] TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7