Loading...

Table of Content

    25 May 2024, Volume 46 Issue 5
    5G Communication Environment and Data Detection
    Switching method for distribution network feeder automation system based on 5G communication delay
    ZHU Weiwei, ZHU Qing, GAO Wensen, LIU Caihua, WANG Luze, LIU Zengji
    2024, 46(5):  1-11.  doi:10.3969/j.issn.2097-0706.2024.05.001
    Asbtract ( 216 )   HTML ( 6)   PDF (2545KB) ( 171 )  
    Figures and Tables | References | Related Articles | Metrics

    Since data transmission time is difficult to predict due to the uncertain delay of 5G communication, the fault response timeliness and decision-making accuracy of a feeder automation (FA) system are affected. Thus, a distribution network FA switching method based on 5G communication delay is proposed. Initially, the topological relationship between feeder terminals is established, and the real-time communication delay of the FA system is calculated based on the maximum communication delay in each branch of the FA system. Subsequently, a stacked Long Short-Term Memory (LSTM) neural network model is trained by the historical data of fault processing time under different FA strategies and various delays, to obtain the FA strategies with the fastest fault handling speed under different communication delays. Finally, based on the learning outcomes of the layer-stacked LSTM model, the FA strategy with the shortest fault handling time under a certain communication delay is selected. Experimental results demonstrate that the proposed method effectively mitigates the impact of uncertain delays in 5G communication on FA systems, ensuring their reliable operation. Moreover, compared to other machine learning methods, the layer-stacked LSTM model shows advantages in prediction accuracy and prediction delay, effectively enhancing the adaptive capacity and fault response speed of feeder terminals.

    Anomalous data detection methods for new power systems
    WANG Liang, DENG Song
    2024, 46(5):  12-19.  doi:10.3969/j.issn.2097-0706.2024.05.002
    Asbtract ( 289 )   HTML ( 10)   PDF (1719KB) ( 923 )  
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of new power systems, massive data with various types are generated from the power systems. The complicated data conditions bring new challenges to anomaly data detection for power systems. In a summary on commonly used methods for anomalous power data in detecting, traditional technology-based, machine learning-based and deep learning-based detection methods are introduces. The working principle, characteristics and shortcomings of the three types of detecting methods are analysed. In the end, the challenges and development trends of anomalous data detection in new power systems are looked forward.

    Electricity theft detection method for distribution network CPS based on cyber and physical data
    DU Long, SHA Jianxiu, FAN Bei, HU Jingwei, LIU Zengji
    2024, 46(5):  20-29.  doi:10.3969/j.issn.2097-0706.2024.05.003
    Asbtract ( 153 )   HTML ( 4)   PDF (1886KB) ( 96 )  
    Figures and Tables | References | Related Articles | Metrics

    Widespread applications of massive measurement equipment have raised frequent cyber attacks to the information side of a distribution network cyber and physical system(CPS). The attacks aiming at encroaching on power companies' economic benefits through electricity thefts seriously endanger their interests. However, existing methods for detecting electricity theft including both data-driven algorithms and model-driven algorithms show limitations in their standalone applications, incapable of reducing false alarm rates of output results effectively. Therefore, an electricity theft detection method based on bilateral data of a distribution network CPS is proposed. Firstly, the method monitors the abnormal fluctuations of the line loss sequence measured on the physical side of the distribution station area, determining the time periods with abnormal electricity consumptions. Secondly, various electricity consumption data from users on the information side of the distribution station area are sent to the convolutional neural network on a weekly basis to investigate suspected electricity thieves. Finally, a second screening on electricity thefts is carried out on the outputs of the electricity stealing detection model based on the negative correlation between the line loss sequence in the station area and the electricity consumption data sequence of the electricity thieves obtained by the time distance weighted Pearson correlation algorithm. The operation process of this method is performed on an IEEE 33 bus system, obtaining normal and abnormal electricity consumption data for following analyses and detection model construction. The results of the comparative experiments verify that, compared to other methods, the proposed electricity theft detection method has a higher reliability and more solid criterion, which can further reduce the false alarm rate of data-driven model detection results while improving accuracy.

    Research on security and privacy protection of electric power data sharing
    XING Huidi, GONG Gangjun, ZHAI Mingyue, LIU Xuesong, WANG Haomiao, YANG Shuang
    2024, 46(5):  30-40.  doi:10.3969/j.issn.2097-0706.2024.05.004
    Asbtract ( 346 )   HTML ( 10)   PDF (1839KB) ( 861 )  
    Figures and Tables | References | Related Articles | Metrics

    Electric power data can reflect the development status of society and is promising in the opening and integrated applications. In order to create and release the value of power data, power companies need to build a data sharing service system for all industries. However, there are security issues such as privacy leakage, data tampering and shortage of data security aggregation method in the process of power data sharing. At present, there are three main technologies that can deal with the security problems above, blockchain, privacy computing and desensitization. Based on reviews on relevant literatures, a demand model for and privacy data protection in power data sharing is proposed. The three security and privacy protection technologies for electric power data sharing are summarized,and their integration and applications in different scenarios are comparatively analyzed. Different security and privacy protection schemes provide references for promoting electric power data opening and sharing.

    Cyber Attack Defense
    Risk analysis on the source-grid-load-storage system affected by cyber attacks
    YU Sheng, ZHOU Xia, SHEN Xicheng, DAI Jianfeng, LIU Zengji
    2024, 46(5):  41-49.  doi:10.3969/j.issn.2097-0706.2024.05.005
    Asbtract ( 185 )   HTML ( 2)   PDF (2407KB) ( 144 )  
    Figures and Tables | References | Related Articles | Metrics

    With the boost of Energy Internet, power grid dispatching is gradually taking "source-grid-load-storage" integrated optimization strategy. The optimization mode can realize effective use of clean energy,sharing of resources and demand response of an integrated system with optimal allocation of resources,multi-energy complementation,big data analysis and other advanced technologies. However, due to the deep coupling of physical devices and information systems, cyber attacks aiming at information systems might lead to physical faults. To evaluate the effect of cyber attacks on a source-grid-load-storage integrated system, the effect of cyber attacks is analyzed from the perspective of attackers. Then, the improved attack graph is built, and attack routes are determined by Frequent Pattern Growth(FP-Growth)association rule mining. Then, the probability of being aimed and attacked is obtained by vulnerability assessment and Bayesian theorem. The risk assessment index is the product of the probability of cyber attack on the source-grid-load-storage integrated system and the load loss. The risks of distribution network circuit breakers and distributed sources subjected to cyber attacks are quantitively assessed, and the effectiveness of the proposed method is verified.

    Research on vulnerability of distribution networks with distributed photovoltaic under cyber attacks
    LI Yinuo, LIU Wei, WEI Xingshen, WANG Qi
    2024, 46(5):  50-57.  doi:10.3969/j.issn.2097-0706.2024.05.006
    Asbtract ( 171 )   HTML ( 3)   PDF (4634KB) ( 182 )  
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of network technologies, a large number of intelligent measurement terminals and communication devices are widely connected to power systems, introducing new intrusion paths for cyber attacks and intensifying the exposure risk of power systems to the attacks. To ensure the safe operation of power systems and evaluate the vulnerability of distribution systems with distributed photovoltaic under cyber attacks, a data tampering attack model for distributed photovoltaic is established from the perspective of attackers, describing the specific forms of cyber attacks. Then, in attack scenarios, the power flow correction equation for the distribution system suffering from photovoltaic load losses is solved, and the node vulnerability is proposed based on the sensitivity of power flow to characterize the vulnerability of the distribution system. Finally, the correlations between the vulnerability of a distribution network and the impact degree of an attack, the topology and time series are verified through a simulation test. The research results can provide references for power system cyber security defenders to accurately formulate defense plans and reasonably allocate defense resources under cyber attacks.

    Research on network attack modeling, evolution and response cost of power cyber physical systems
    YE Fei, ZHONG Xiaojing, GUAN Qianfeng
    2024, 46(5):  58-64.  doi:10.3969/j.issn.2097-0706.2024.05.007
    Asbtract ( 179 )   HTML ( 11)   PDF (2144KB) ( 146 )  
    Figures and Tables | References | Related Articles | Metrics

    With the frequent interactions between the cyber layer and the physical layer, power cyber physical systems (CPSs) are facing great security challenges. Network attacks propagating from the cyber layer to the physical layer may cause the collapse of the entire power system. A new type of network attack propagation model,SIAIBRARB,is established based on the double-layer coupling structure of power CPSs and the propagation evolution theory. The model describes the propagation behavior of network attacks in power network nodes. Using dynamic analysis method, we analyze the attack intensity and influence range of a network attack on a power CPS,and provide a specific algorithm to predict the attack intensity. Moreover, the PRCCs and 3D correlation partial differential method are used to analyze the sensitivity of system parameters. The importance of the power CPS network structure and propagation probability to network security have been verified by two simulation tests. Taking the prior case of China Southern Power Grid Company Limited as an example, its typical design and costs are summarized,and the variation of the actual construction cost of the power network security protection system is analyzed. Considering from three perspectives, the construction of a security protection system can be precisely graded, in which the construction costs and CPS security should be considered simultaneously. The theoretical results can provide a reference for power grid defenders to develop new defense schemes under the threat of network attacks.

    Network Security Protection
    Security protection for integrated energy cyber physical systems based on energy hubs
    GONG Gangjun, WANG Luyao, CHANG Zhuoyue, LIU Xu, XING Huidi
    2024, 46(5):  65-72.  doi:10.3969/j.issn.2097-0706.2024.05.008
    Asbtract ( 199 )   HTML ( 4)   PDF (2007KB) ( 155 )  
    Figures and Tables | References | Related Articles | Metrics

    To improve the energy and information exchange efficiency between devices and energy nodes in an integrated energy system (IES), reduce energy production and transmission costs, and achieve efficient conversion and flexible allocation of multiple energy sources, a centralized-distributed integrated energy system based on energy hubs(EH) is constructed. According to the model of the IES,the cyber physical system based on the cluster of sub-cyber physical systems is defined. On the information end of the IES, the operational model for each sub-cyber physical system and information interaction model for sub-information system servers in an EH node are given. Being exposed to cyber security threats, the integrated energy cyber physical system comprehensively takes complementarity of different energy sources, network transmission and distribution of energy, energy storage, clean energy's dynamic access to the grid and other operational requirements into considerations, and adopts a three-element and three-layer secure trusted protection architecture based on trusted computing technology. Starting from protecting every energy node, this protection system constructs a protection mechanism based on node trust, network connection trust and application trust, to ensure the safe and reliable operation of the IES.

    Security protection for photovoltaic data acquisition and storage
    LIU Xu, LU Jun, GONG Gangjun, HOU Zanyu, ZHANG Chunmeng, LIU Bo
    2024, 46(5):  73-80.  doi:10.3969/j.issn.2097-0706.2024.05.009
    Asbtract ( 147 )   HTML ( 2)   PDF (2284KB) ( 171 )  
    Figures and Tables | References | Related Articles | Metrics

    With the energy structure transformation and upgrading, photovoltaic power, a representative emerging new energy, gets increasing attention. However, with the continuous development of photovoltaic systems, the security protection of photovoltaic data faces great challenges. Based on this, a security protection method for photovoltaic data collection and storage is proposed. First,a two-way trusted authentication technology is implemented at the photovoltaic collection end to ensure that the collected photovoltaic data is complete and reliable. Secondly, in terms of photovoltaic data storage, distributed transmission protocols and consistent hashing algorithm are used to complete grouping storage of photovoltaic data. In order to prevent photovoltaic data leakage and illegal theft, a trusted security architecture and a privacy protection method are used to protect stored photovoltaic data. Finally, the feasibility of the method is verified through simulation examples.

    Security protection of typical networks for integrated smart energy systems
    LIU Tao, LI Weihua, TANG Yi
    2024, 46(5):  81-90.  doi:10.3969/j.issn.2097-0706.2024.05.010
    Asbtract ( 145 )   HTML ( 1)   PDF (2329KB) ( 120 )  
    Figures and Tables | References | Related Articles | Metrics

    Integrated infrastructure,represented by multi-station integrated intelligent energy systems,is a main form of new power systems.Based on the analysis on characteristics of different components,including substations,photovoltaic stations,and data center stations,a proper structure for integrated smart energy systems is constructed,and the information service system and hierarchical structure under this framework are designed.A data interaction model for the integrated smart energy system is proposed,considering the needs of data interaction between different substations.To achieve five major security goals,components of this system is divided into three categories in view of different threats to network security.Based on the principles of network security protection for the system,zoning and isolation plans for the integrated smart energy system are proposed under this protection architecture.Finally,the feasibility of the network security protection architecture for integrated intelligent energy systems and its zoning and isolation schemes are evaluated in accordance with relevant evaluation indicators in Equal Protection 2.0.The results show that the architecture meets the standards of Equal Protection 2.0.