This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control area...This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set,then an alarm will be activated, and the potential threat is considered disclosed. The attack scenario used to assess the efficiency of the proposed anomaly detector concerns corrupted frequency sensor measurements transmitted to the automatic generation control unit of a compromised control area. Simulation studies highlight the ability of a set-theoretic approach to disclose persistent and intermittent attack patterns even when they occur at the same time with changes in the power load demand.展开更多
The extensive application of modern information and communication technology in the power system through the in-depth integration of the information system and the power system has led to the gradual development of th...The extensive application of modern information and communication technology in the power system through the in-depth integration of the information system and the power system has led to the gradual development of the cyberphysical power system(CPPS).While advanced information technology increases the safety and reliability of power system operations,it also increases the risks of fault propagation.To improve the reliability of CPPS from the perspective of power communication routing,it is proposed that the CPPS model and vulnerability assessment of power node reflect the correlation between information and energy flows with the service impact on power grid operation,which is an important index for evaluating communication services.According to the distribution of services at the different important levels on the links,the importance of the cross-layer link is established as the vulnerability evaluation index of the communication network.Then,the routing optimization model is proposed in combination with the service transmission risk under cyber-attack and the operating characteristics of the information system,which is solved through an improved fast-convergent genetic algorithm.The simulation results show that the proposed method allocates the alternate route to the low-risk link without significantly increasing the delay of the main route,which effectively improves the power supply reliability of CPPS in extreme cyber-attack scenarios.展开更多
During the initial stage of vertical launch,a missile may exhibit an uncertain roll angle(φ)and a high angle of attack(α).This study focuses on examining the impact of roll angle variations on the flow field and the...During the initial stage of vertical launch,a missile may exhibit an uncertain roll angle(φ)and a high angle of attack(α).This study focuses on examining the impact of roll angle variations on the flow field and the unsteady aerodynamics of a canard-configured missile atα=75°.Simulations were performed using the validated k-ωSST turbulence model.The analysis encompasses the temporal development of vortices,the oscillatory characteristics of the lateral force,and the fluctuation of kinetic energy distribution within the framework of proper orthogonal decomposition(POD).The results indicate that the flow field surrounding the canardconfigured missile is characterized by inconsistent shedding cycles of Kármán-like and canard-separated vortices.A distinct transition zone is identified between these vortices,where vortex tearing and reconnection phenomena occur.With increasing roll angles from 0°to 45°,there is an observed shift in the dominant frequency of the lateral force from the higher frequency associated with Kármán-like vortex shedding to the lower frequency of canard vortex shedding.The shedding frequency of Kármán-like vortices corresponds to the harmonics of the canard vortex shedding frequency,indicative of a higher-order harmonic resonance.The frequency of the lateral force is observed to decrease with an increase in roll angle,except in configurations lacking distinct canard-separated vortices,which are characterized by a“+”shape.The POD analysis reveals that the majority of the fluctuation energy is concentrated in the oscillations and shedding of the canard-separated vortices,leading to pressure fluctuations that are primarily observed on the canard and the downstream region of the canard.展开更多
In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introd...In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs.This attack method is that the key parameters dp and dq are segmented by byte,and the modular multiplication collisions are identified by k-means clustering.The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs,and the exponent d was obtained.We also propose a second order clustering collision power analysis attack against RSA implementation with CRT,which applies double blinding exponentiation.To reduce noise and artificial participation,we analyze the power points of interest by preprocessing and k-means clustering with horizontal correlation collisions.Thus,we recovered approximately 91%of the secret exponents manipulated with a single power curve on RSA-CRT with countermeasures of double blinding methods.展开更多
文摘对一种弹用S弯进气道进行了试验,结果表明:①偏航角一定,攻角由负到正变化时,总压恢复系数先上升后变化不大,|DC60|则先下降后小幅升高;②攻角一定,总压恢复系数和|DC60|随偏航角的增加均呈先升高后降低的趋势;③大的攻角和偏航角组合状态下,总压恢复系数较低,|DC60|偏大,但随偏航角进一步增大,进气道性能有所改善;④进/发匹配点处,进气道出口压力功率频谱较平坦且对姿态角和来流马赫数的变化均不敏感;⑤发动机小流量状态时,进气道模型发生了喘振,频率约为150 Hz.
文摘This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set,then an alarm will be activated, and the potential threat is considered disclosed. The attack scenario used to assess the efficiency of the proposed anomaly detector concerns corrupted frequency sensor measurements transmitted to the automatic generation control unit of a compromised control area. Simulation studies highlight the ability of a set-theoretic approach to disclose persistent and intermittent attack patterns even when they occur at the same time with changes in the power load demand.
基金supported by the National Key Research and Development Program of China under Grant 2016YFB0901100.
文摘The extensive application of modern information and communication technology in the power system through the in-depth integration of the information system and the power system has led to the gradual development of the cyberphysical power system(CPPS).While advanced information technology increases the safety and reliability of power system operations,it also increases the risks of fault propagation.To improve the reliability of CPPS from the perspective of power communication routing,it is proposed that the CPPS model and vulnerability assessment of power node reflect the correlation between information and energy flows with the service impact on power grid operation,which is an important index for evaluating communication services.According to the distribution of services at the different important levels on the links,the importance of the cross-layer link is established as the vulnerability evaluation index of the communication network.Then,the routing optimization model is proposed in combination with the service transmission risk under cyber-attack and the operating characteristics of the information system,which is solved through an improved fast-convergent genetic algorithm.The simulation results show that the proposed method allocates the alternate route to the low-risk link without significantly increasing the delay of the main route,which effectively improves the power supply reliability of CPPS in extreme cyber-attack scenarios.
基金Fund of Science and Technology on Underwater Information and Control Laboratory,Grant/Award Number:2021-JCJQ-LB-030-05。
文摘During the initial stage of vertical launch,a missile may exhibit an uncertain roll angle(φ)and a high angle of attack(α).This study focuses on examining the impact of roll angle variations on the flow field and the unsteady aerodynamics of a canard-configured missile atα=75°.Simulations were performed using the validated k-ωSST turbulence model.The analysis encompasses the temporal development of vortices,the oscillatory characteristics of the lateral force,and the fluctuation of kinetic energy distribution within the framework of proper orthogonal decomposition(POD).The results indicate that the flow field surrounding the canardconfigured missile is characterized by inconsistent shedding cycles of Kármán-like and canard-separated vortices.A distinct transition zone is identified between these vortices,where vortex tearing and reconnection phenomena occur.With increasing roll angles from 0°to 45°,there is an observed shift in the dominant frequency of the lateral force from the higher frequency associated with Kármán-like vortex shedding to the lower frequency of canard vortex shedding.The shedding frequency of Kármán-like vortices corresponds to the harmonics of the canard vortex shedding frequency,indicative of a higher-order harmonic resonance.The frequency of the lateral force is observed to decrease with an increase in roll angle,except in configurations lacking distinct canard-separated vortices,which are characterized by a“+”shape.The POD analysis reveals that the majority of the fluctuation energy is concentrated in the oscillations and shedding of the canard-separated vortices,leading to pressure fluctuations that are primarily observed on the canard and the downstream region of the canard.
基金supported by the National Key R&D Program of China(No.2017YFB0802300)the Key Research and Development Project of Sichuan Province(No.2020YFG0307,No.2018TJPT0012)the Key Research and Development Project of Chengdu(No.2019-YF05-02028-GX).
文摘In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs.This attack method is that the key parameters dp and dq are segmented by byte,and the modular multiplication collisions are identified by k-means clustering.The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs,and the exponent d was obtained.We also propose a second order clustering collision power analysis attack against RSA implementation with CRT,which applies double blinding exponentiation.To reduce noise and artificial participation,we analyze the power points of interest by preprocessing and k-means clustering with horizontal correlation collisions.Thus,we recovered approximately 91%of the secret exponents manipulated with a single power curve on RSA-CRT with countermeasures of double blinding methods.