2017
DOI: 10.3390/en10010087
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Considering Network Topology and Power Flow Properties

Abstract: Conventional power systems are developing into cyber-physical power systems (CPPS) with wide applications of communication, computer and control technologies. However, multiple practical cases show that the failure of cyber layers is a major factor leading to blackouts. Therefore, it is necessary to discuss the cascading failure process considering cyber layer failures and analyze the vulnerability of CPPS. In this paper, a CPPS model, which consists of cyber layer, physical layer and cyber-physical interface,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(18 citation statements)
references
References 28 publications
(32 reference statements)
0
17
0
Order By: Relevance
“…It also can be used for additional services other than bulk power transfers, such as damping power system inter-area oscillation [2]. At the same time, AC-HVDC grids have evolved to become huge cyber-physical systems (CPSs) that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks [3,4]. The security and stability of AC-HVDC transmissions against cyber-attacks are essential to modern electric power systems.…”
Section: Motivationmentioning
confidence: 99%
“…It also can be used for additional services other than bulk power transfers, such as damping power system inter-area oscillation [2]. At the same time, AC-HVDC grids have evolved to become huge cyber-physical systems (CPSs) that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks [3,4]. The security and stability of AC-HVDC transmissions against cyber-attacks are essential to modern electric power systems.…”
Section: Motivationmentioning
confidence: 99%
“…At present, researches on the identification of critical or vulnerable transmission lines are usually based on three main factors: the network topology [7][8][9][10][11][12][13][14][15][16], the electrical characteristics [17][18][19][20][21][22][23], and the failure mechanism [24][25][26][27]. Power grids can be conceptually described as networks, so that topology-based theory provides a feasible way to study network vulnerability [7] and locate the critical transmission lines [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Power grids can be conceptually described as networks, so that topology-based theory provides a feasible way to study network vulnerability [7] and locate the critical transmission lines [8,9]. Some indices, such as betweenness [10][11][12][13], are proposed to describe the importance of different components. In topology-based methods, the betweenness of an edge is defined as the number of the shortest paths through it.…”
Section: Introductionmentioning
confidence: 99%
“…In study [27] the authors analysed the detection of tolerable false data injection in smart grids based on knowledge of the grid by decomposing it in several subsystems. A vulnerability analysis of cyber-physical power systems based on power flow and grid topology is also analysed in study [28].…”
Section: Assessing Grid Data Inconsistencies Through Ict By Using Normentioning
confidence: 99%