Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power system fragile line assessment method and system considering network attack risks

A power system and line evaluation technology, applied in the field of power system, can solve problems such as difficulty in reflecting the vulnerability of line network attacks, lack of in-depth analysis of network attack threats, and tripping.

Pending Publication Date: 2021-10-19
HUNAN UNIV
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing studies have shown that attackers can maliciously tamper with telemetry and telemetry traffic transmitted remotely, inducing wrong decision-making in the control center, causing circuit overload and tripping
[0003] However, the existing vulnerable line assessment methods only consider the impact of the line on the safe and stable operation of the system in the case of random faults or physical attacks, lack of in-depth analysis of network attack threats, and have not established a line vulnerability assessment model under network threats , it is difficult to reflect the vulnerability of the line to network attacks
Most of the traditional power line vulnerability assessment methods fail to fully consider the fault propagation mechanism caused by malicious data attacks and the correlation analysis model of "network attack-physical consequences", which makes their assessment methods unable to adapt to the line vulnerability assessment under network threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power system fragile line assessment method and system considering network attack risks
  • Power system fragile line assessment method and system considering network attack risks
  • Power system fragile line assessment method and system considering network attack risks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] figure 1 The flow chart of the power malicious data attack detection algorithm based on the data restoration method provided by the embodiment of the present invention, the specific implementation steps are as follows:

[0078] Step S1: Determine the feasible domain of the attack data ΔD according to the historical load data;

[0079] Step S2: According to the feasible domain of attack data ΔD calculated in step S1, calculate the potential maximum power flow of any line k under the interference of network attack data ΔD Determine the set of high-risk lines Ω 1 and the set of medium-risk lines Ω 2 ;

[0080] Step S3: For the set Ω 1 For the line in , go directly to step S4; for the set Ω 2 For any line l in , physically disconnect the line, and calculate the disconnection concealability σ of line l according to the feasible region of the attack data ΔD l , to determine the set of medium and high risk lines Ω′ 2 ;

[0081] Step S4: For the high-risk line set Ω 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power system fragile line assessment method and system considering network attack risks, fully considers an influence mechanism of network attacks on line vulnerability and a cascading process of line faults, and provides the power system fragile line assessment method considering the network attack risks. According to the method, the potential maximum power flow of the line under the network attack is calculated, and comprehensive risk assessment is performed by using the line fault concealment index and the minimum load shedding capacity, so that screening and risk sorting of the high-risk line are realized, and the defect that a current assessment method does not consider network attack threats and network attack physical consequences is overcome.

Description

technical field [0001] The invention relates to the technical field of power systems, in particular to a method and system for evaluating vulnerable lines in power systems considering the risk of network attacks. Background technique [0002] The vulnerability of power system lines is crucial to the safe and stable operation of the power grid. The tripping of key lines will cause a large number of power transfers, which will cause cascading failures and lead to blackouts. In recent years, many major power outages in countries around the world are caused by chain failures caused by key line failures. With the high integration of information technology in the power system, the security of power lines is facing more and more cyber threats. Existing studies have shown that attackers can maliciously tamper with telemetry and telemetry traffic transmitted remotely, inducing wrong decision-making in the control center, causing circuit overload and tripping. [0003] However, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06F16/2458G06Q50/06
CPCG06Q10/06393G06Q10/0635G06F16/2465G06Q50/06Y04S40/20
Inventor 刘绚宋宇飞褚旭田建伟朱宏宇于宗超
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products