Recommended Articles

    Please wait a minute...
    For Selected: Toggle Thumbnails
    Switching method for distribution network feeder automation system based on 5G communication delay
    ZHU Weiwei, ZHU Qing, GAO Wensen, LIU Caihua, WANG Luze, LIU Zengji
    Integrated Intelligent Energy    2024, 46 (5): 1-11.   DOI: 10.3969/j.issn.2097-0706.2024.05.001
    Abstract215)   HTML6)    PDF (2545KB)(171)      

    Since data transmission time is difficult to predict due to the uncertain delay of 5G communication, the fault response timeliness and decision-making accuracy of a feeder automation (FA) system are affected. Thus, a distribution network FA switching method based on 5G communication delay is proposed. Initially, the topological relationship between feeder terminals is established, and the real-time communication delay of the FA system is calculated based on the maximum communication delay in each branch of the FA system. Subsequently, a stacked Long Short-Term Memory (LSTM) neural network model is trained by the historical data of fault processing time under different FA strategies and various delays, to obtain the FA strategies with the fastest fault handling speed under different communication delays. Finally, based on the learning outcomes of the layer-stacked LSTM model, the FA strategy with the shortest fault handling time under a certain communication delay is selected. Experimental results demonstrate that the proposed method effectively mitigates the impact of uncertain delays in 5G communication on FA systems, ensuring their reliable operation. Moreover, compared to other machine learning methods, the layer-stacked LSTM model shows advantages in prediction accuracy and prediction delay, effectively enhancing the adaptive capacity and fault response speed of feeder terminals.

    Table and Figures | Reference | Related Articles | Metrics
    Risk analysis on the source-grid-load-storage system affected by cyber attacks
    YU Sheng, ZHOU Xia, SHEN Xicheng, DAI Jianfeng, LIU Zengji
    Integrated Intelligent Energy    2024, 46 (5): 41-49.   DOI: 10.3969/j.issn.2097-0706.2024.05.005
    Abstract184)   HTML2)    PDF (2407KB)(144)      

    With the boost of Energy Internet, power grid dispatching is gradually taking "source-grid-load-storage" integrated optimization strategy. The optimization mode can realize effective use of clean energy,sharing of resources and demand response of an integrated system with optimal allocation of resources,multi-energy complementation,big data analysis and other advanced technologies. However, due to the deep coupling of physical devices and information systems, cyber attacks aiming at information systems might lead to physical faults. To evaluate the effect of cyber attacks on a source-grid-load-storage integrated system, the effect of cyber attacks is analyzed from the perspective of attackers. Then, the improved attack graph is built, and attack routes are determined by Frequent Pattern Growth(FP-Growth)association rule mining. Then, the probability of being aimed and attacked is obtained by vulnerability assessment and Bayesian theorem. The risk assessment index is the product of the probability of cyber attack on the source-grid-load-storage integrated system and the load loss. The risks of distribution network circuit breakers and distributed sources subjected to cyber attacks are quantitively assessed, and the effectiveness of the proposed method is verified.

    Table and Figures | Reference | Related Articles | Metrics
    Security protection for integrated energy cyber physical systems based on energy hubs
    GONG Gangjun, WANG Luyao, CHANG Zhuoyue, LIU Xu, XING Huidi
    Integrated Intelligent Energy    2024, 46 (5): 65-72.   DOI: 10.3969/j.issn.2097-0706.2024.05.008
    Abstract199)   HTML4)    PDF (2007KB)(155)      

    To improve the energy and information exchange efficiency between devices and energy nodes in an integrated energy system (IES), reduce energy production and transmission costs, and achieve efficient conversion and flexible allocation of multiple energy sources, a centralized-distributed integrated energy system based on energy hubs(EH) is constructed. According to the model of the IES,the cyber physical system based on the cluster of sub-cyber physical systems is defined. On the information end of the IES, the operational model for each sub-cyber physical system and information interaction model for sub-information system servers in an EH node are given. Being exposed to cyber security threats, the integrated energy cyber physical system comprehensively takes complementarity of different energy sources, network transmission and distribution of energy, energy storage, clean energy's dynamic access to the grid and other operational requirements into considerations, and adopts a three-element and three-layer secure trusted protection architecture based on trusted computing technology. Starting from protecting every energy node, this protection system constructs a protection mechanism based on node trust, network connection trust and application trust, to ensure the safe and reliable operation of the IES.

    Table and Figures | Reference | Related Articles | Metrics