检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:闫旻睿 于淼[1] 万克厅 齐冬莲[1] YAN Minrui;YU Miao;WAN Keting;QI Donglian(College of Electrical Engineering,Zhejiang University,Hangzhou 310027,China)
机构地区:[1]浙江大学电气工程学院,浙江省杭州市310027
出 处:《电力系统自动化》2024年第24期88-100,共13页Automation of Electric Power Systems
基 金:国家自然科学基金资助项目(U1909201)。
摘 要:随着微电网信息化和智能化水平提升,恶意信息攻击对微电网安全稳定运行的威胁也更加严重。相比于配电网,微电网系统规模小,可再生能源渗透率高、调节能力弱,故面对信息攻击时也更加脆弱。为针对信息攻击分析微电网信息物理系统的脆弱性,首先,建立了考虑控制策略与可再生能源出力不确定性的微电网物理侧模型和基于数据流的考虑信息攻击的信息侧模型。其次,为分析信息攻击,建立了攻击方法-攻击对象关联矩阵和考虑攻击者和调度中心行为的双层规划模型。然后,基于负荷重分配特性和Shapley值法,提出了基于攻击后果的脆弱性指标计算方法和脆弱性评估流程。最后,对38节点算例进行仿真,针对信息攻击评估了微电网信息物理系统的脆弱性情况,并分析验证了所提方法的有效性以及对制定防御策略的指导意义。With the evolution of the informatization and intelligence level of microgrids,malicious cyber attacks are becoming more serious threats to the safe and stable operation of microgrids.Compared with the distribution network,the microgrid has smaller scale,higher renewable energy penetration,and weaker adjustment capacity,and is more vulnerable to cyber attacks.In order to analyze the vulnerability of microgrid cyber physical system against cyber attacks,first,a physical-side model of microgrid considering control strategy and renewable energy output uncertainty,and a data flow based cyber-side model considering cyber attacks are formulated.Secondly,in order to analyze cyber attacks,the correlation matrix of attack method and attack target and a bi-level programming model considering the behavior of the attacker and the dispatching center are established.Then,based on the characteristics of load redistribution and Shapley value method,a vulnerability index calculation method based on attack consequences and vulnerability assessment process are proposed.Finally,the simulation is carried out on a 38-bus system to assess the vulnerability of the microgrid cyber physical system against cyber attacks,and the effectiveness of the proposed method and its guiding significance for formulating defense strategy are analyzed and verified.
分 类 号:TM614[电气工程—电力系统及自动化] TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.13