期刊文献+

Vulnerability Assessment of Distributed Load Shedding Algorithm for Active Distribution Power System Under Denial of Service Attack

原文传递
导出
摘要 In order to deal with frequency deviation andsupply-demand imbalance in active distribution power system, inthis paper a distributed under frequency load shedding (UFLS)strategy is proposed. Different from conventional centralizedUFLS schemes, no centralized master station gathering all thebuses’ information is required. Instead, each bus decides itsown load shedding amount by only relying on limited peer-topeer communication. However, such UFLS strategy may sufferfrom some unexpected cyber-attacks such as integrity attacksand denial of service (DoS) attack. The latter DoS attack aimsto degrade the system performance by jamming or breakingthe communication, which is of high probability to happen inpractical power system. To assess the vulnerability of proposeddistributed UFLS algorithm, the effect of DoS attack on distributed average consensus algorithm is theoretically derived,which indicates that the final consensus value can be estimatedby a given attack probability. It is also investigated that such DoSattack does harm to the load shedding amount and finally affectsthe system frequency performance in the active distributionpower system. Several case studies implemented on an IEEE33-bus active distribution power system are conducted to verifythe effectiveness of the theoretical findings and investigate thevulnerability of the considered power system.
出处 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第6期2066-2075,共10页 中国电机工程学会电力与能源系统学报(英文)
基金 the National Key Research and Development Program of China(2017YFB0903000) the National Natural Science Foundation of China(No.51677116) Key Research and Development Program of Zhejiang Province under Grant 2019C01149,in part by the Science and Technology Project of State Grid Corporation of China under Grant 5211DS180031.
  • 相关文献

参考文献6

二级参考文献99

  • 1梁艳,陈文楷,焦洪峰,祁鸿科.供暖系统的混杂自动机建模与模糊控制[J].电工技术杂志,2004,26(4):74-77. 被引量:3
  • 2杰里米·里夫金.第三次工业革命[M].张体伟,孙豫宁,译.北京:中信出版社,2012.6. 被引量:55
  • 3Rajkumar R, Lee I, Sha L, et al. Cyber-physical systems: the next computing revolution[C]//Proceedings of the 47th ACM/IEEE Design Automation Conference. Anaheim, CA, IEEE, 2010: 731-736. 被引量:1
  • 4Kyoung Dae Kim K D, P. R. Kumar P R. Cyber-physicat systems: a perspective at the centennial[J]. Proceedings of the lEEE, 2012, 100: 1287-1380. 被引量:1
  • 5CPS Steering Group.. Cyber-physical systems executive summary[Z]. CPS Summit, 2008. 被引量:1
  • 6Tan Y, Goddard S, P6rez L C. A prototype architecture for cyber-physical systems[J]. ACM Sigbed Review, 2008, 5(1): 26-27. 被引量:1
  • 7Park K J, Zheng R, Liu X. Cyber-physical systems: Milestones and research challenges[J]. Computer Communications, 2012, 36(1): 1-7. 被引量:1
  • 8ShaL, GopalakrishnanS, LiuX, etal. Cyber-Physical Systems: A New Frontier[M]. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. US: Springer, 2009: 3-13. 被引量:1
  • 9Derler P, Lee E A, Vincentelli A S. Modeling Cyber-Physical Systems[J]. Proceedings of the IEEE, 2012, 100. 13-28. 被引量:1
  • 10Poovendran R. Cyber-physical systems: close encounters between two parallel worlds [Point of View][J]. Proceedings of the IEEE, 2010, 9(8): 1363-1366. 被引量:1

共引文献221

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部