Research on Coordinated Attack Protection Method Based on Global Time Synchronization System of Intelligent Substation
DOI: 10.23977/jnca.2019.41003 | Downloads: 34 | Views: 2886
Author(s)
Shaomin Zhang 1, Pengzhi Cheng 1, Baoyi Wang 1, Xia Zhou 1
Affiliation(s)
1 Department of Control and Computer, North China Electric Power University, Huadian Road, Baoding, China
Corresponding Author
Shaomin ZhangABSTRACT
Aiming at the coordinated attack based on time problem in the network attack of intelligent substation automation system, leading to large scale power outages, coordinated attack model called ENFTA is proposed. The scheme adds a differentiated time management design and time anti-correction design of the dispatcher based on the time synchronization system of the smart substation. The former is used to differentiate the synchronization time of substation and thus stagger the trigger time initiated by the coordinated attack software. In the latter, the information of the global synchronization time between the dispatcher and the station is marked, and anti-correcting the differentiated time and the reverse differentiated time are adjusted. In the unified reference time, to operate monitoring and the fault analysis after the accident. Relevant experiment results show that the method is effective to avoid the large number of substations losing voltage due to aggressive actions, and significantly reduce the harm caused by the coordinated attack of substations.
KEYWORDS
Coordinated attack, differentiated time management design, intelligent substation automation system, power outage accidentCITE THIS PAPER
Shaomin, Z., Pengzhi, C., Baoyi, W., Xia, Z., Research on Coordinated Attack Protection Method Based on Global Time Synchronization System of Intelligent Substation, Journal of Network Computing and Applications (2019) 4: 14-20. DOI: http://dx.doi.org/10.23977/jnca.2019.41003.
REFERENCES
[1] Liu Nian, Yu Xinghuo, Zhang Jianhua et al. “Coordinated Cyber-attack:Inference and Thinking of Incident on Ukrainian Power Grid”. Automation of Electric Power Systems, 2016, 40(6):144-147.
[2] Liang G, Weller S R, Zhao J, et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks[J]. IEEE Transactions on Power Systems, 2016, PP(99):1-1.
[3] Tang Wei, Chen Qian, Li Mengya, et al.”Overview on Cyber-attacks Against Cyber Physical Power System”. Automation of Electric Power Systems,2016,40(17):59-69.
[4] Li Tian, Su Sheng, Yang Hongming, et al. “Attacks and Cyber Security Defense in Cyber-physical Power System”.Automation of Electric Power Systems,2017,(22):162-167.
[5] Guo Qinglai, Xin Yujun, Wang Jianhui, et al. “Comprehensive Security Assessment for a Cyber Physical Energy System:a Lesson from Ukraine Blackout”.Automation of Electric Power Systems.2016 40(5):145-147.
[6] Wang Jiang,"Modeling and Analyzing Network Coordinated Attack", thesis.XiDian Uniuersity,2014.
[7] Wang Yuyang, “Research on the Cooperative Attack Decision Algorithm Based on Complex Network”, thesis.Wuhan University of Technology,2015.
[8] Xiaochuan, Hu Changzhen, “Tan Huimin. Study of network coordinated attack and its detecting mothod”. ComputerApplications,2004(11):25-27.
[9] Xiang Y, Wang L, Liu N. “Coordinated attacks on electric power systems in a cyber-physical environment”. Electric Power Systems Research, 2017, 149:156-168.
[10] Li Jungang, Liu Xing, Zhang Aimin, et al. “Research on redundant technology of IEEE1588 clock synchronization system in smart substation”. Power System Protection and Control,2015,(20):97-101.
[11] Dominicis C M D, Ferrari P, Flammini A, et al. “On the Use of IEEE 1588 in Existing IEC 61850-Based SASs: Current Behavior and Future Challenges”. IEEE Transactions on Instrumentation & Measurement, 2011, 60(9):3070-3081.
[12] Wang K, Hu Y H, Ma H J.” Research and design on time synchronization technology of smart substation based on IEEE1588”,International Conference on Advanced Power System Automation and Protection. IEEE, 2012:2244-2248.
[13] Huang Xin, Wang Yongfu, Zhang Daoong, et al. “Smart Substation IEC 61588 Time Synchronization System and Safety Evaluation”. Automation of Electric Power Systems. 2012, 36(13):76-80.
[14] Zhao Xuyang, Zhang Daonong. “Research and Analysis on Time Synchronization Online Monitoring Technology of Smart Substation”. 2013 Annual Meeting of China Electrical Engineering Society.2013:1-4.
[15] Zheng Zongqiang, Yan Mingyu, Peng Hui, et al. “Architecture and Key Technologies of Distributed SCADA System for Power Dispatching and Control”. Automation of Electric Power Systems, 2017,41(5):71-77.
[16] Han Xiaoqing, Xiao Yu, Zhang Haiyan.” The application of MATPOWER in the real-time electricity price of the optimal power system”. JOURNAL OF TAIYUAN UNIVERSITY OF TECHNOLOGY,2005,(3):242-245.
Downloads: | 1329 |
---|---|
Visits: | 123893 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks