Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230700171-8.doi: 10.11896/jsjkx.230700171

• Interdiscipline & Application • Previous Articles     Next Articles

Survivability Evaluation of National Defense Engineering Power System Grid Considering MultipleAttack Strategies

LI Fei, CHEN Tong   

  1. Department of Management Engineering and Equipment Economics,Naval University of Engineering,Wuhan 430033,China
  • Published:2024-06-06
  • About author:LI Fei,born in 1989,master,engineer.His main research interest is the survivability evaluation and optimization of power system grids in national defense engineering.

Abstract: The survivability evaluation of the national defense power grid is an important part of the military technical perfor-mance evaluation of the national defense power system.In this paper,a comprehensive multi-indicator evaluation index system for grid survivability is established by considering several possible enemy attack strategies and analyzing various characteristics of the grid.The survivability evaluation is quantified in 3 dimensions:invulnerability,security,and recoverability.The simulation analysis is performed for a specific type of power grid.Simulation experiment results show that the assessment method is effective and can provide a convenient method for grid optimization of national defense power grid.

Key words: National defense engineering, Power system grid, Survivability evaluation, Invulnerability, Security, Recoverability, Attack strategy

CLC Number: 

  • TM715
[1]HEEGAARD P E,TRIVERDI K S.Network Survivability mo-deling[J].Computer Nerworks,2009(1):1215-1234.
[2]MARK W,KOOSHA M,SAHRA S S,et al.Survivability Eva-luation and Importance Analysis For Cyber-Physical Smart Grids[J].Reliability Engineering Amp;System security,2021,210:107479.
[3]KONSTANTINOU C.Toward a Secure and Resilient All-Renewable Energy Grid for Smart Cities[J].IEEE Consumer Electronics Magazine,2022,11(1):33-41.
[4]TOMAS L,RODRIGO M,ALEJANDRO N E,et al.Identifying Optimal Portfolios of Resilient Network Investments Against Natural Hazards,With Applications to Earthquakes[J].IEEE Transactions on Power Systems,2020,35(2):1411-1421.
[5]WANG Z K,DING T,JIA W H,et al.Multi-stage stochasticprogramming for resilient integrated electricity and natural gas distribution systems against typhoon natural disaster attacks[J].Renewable and Sustainable Energy Reviews,2022,159:111784.
[6]WU X N,LIAO B R,SU Y G,et al.Multi-objective and multi-algorithm operation optimization of integrated energy system considering ground source energy and solar energy[J].International Journal of Electrical Power & Energy Systems,2023,144:108529.
[7]BAI X W,LIU D W,TAN J,et al.Dynamic Identification ofCritical Nodes and Regions in Power Grid Based on Spatio-Temporal Attribute Fusion of Voltage Trajectory[J].Energies,2019,12(5):780.
[8]TAMIRU D,JIWANJOT S,VIJAY K.Sood.Evaluation of agrid-connected reduced-component boost multilevel inverter(BMLI) topology[J].International Journal of Circuit Theory and Applications,2022,50(6):2075-2107.
[9]NABIL M,TAMAS K,MIHAI C.Communication-Free Equivalent Grid Impedance Estimation Technique for Multi-Inverter Systems[J].IEEE Transactions on Industrial Electronics,2023,70(2):1542-1552.
[10]NASSER N,FAZELI M.Buffered-Microgrid Structure for Fu-ture Power Networks;a Seamless Microgrid Control[J].IEEE Transactions on Smart Grid,2021,12(1):131-140.
[11]XU Z P,JOSE E R,LIU Y,et al.A new resilience-based component importance measure for multi-state networks[J].Reliability Engineering & System security,2020,193:106591.
[12]BAI Y S,LI SH Y,GU X P,et al.Collaborative planning of resilient backbone grids and PMU placement for power systems[J].International Journal of Electrical Power & Energy Systems,2021,131:107106.
[13]CHENG M,YAN X M,ZHOU J W.Negative-Sequence Current Compensation-Based Coordinated Control Strategy for Dual-Cage-Rotor Brushless Doubly Fed Induction Generator Under Unbalanced Grid Conditions[J].IEEE Transactions on Indus-trial Electronics,2023,70(5):4762-4773.
[14]ARIEF N P,SIGITP S,LEONARDO G,et al.Countermeasures design and analysis for occupant survivability of an armored vehicle subjected to blast load[J].Journal of Mechanical Science and Technology,2020,34(5):1893-1899.
[15]YANG L,CHEN Y,QIU Q G,et al.Risk Control of Mission-Critical Systems:Abort Decision-Makings Integrating Health and Age Conditions[J].IEEE Transactions on Industrial Informatics,2022,18(10):6887-6894.
[16]ZHAO X,CHAI X F,SUN J L,et al.Joint Optimization of Mis-sion Abort And Component Switching Policies For Multistate Warm Standby Systems[J].Reliability Engineering & System security,2021,212:107641.
[17]HE Y T.On the generalized Survivability of Aircraft and itsEvaluation Method[J].Acta Aeronautica et Astronautica Sinica,2022,43(6):185-193.
[18]JAIN N K,YADAV D S,VERMA A.Neuro-Fuzzy and Fuzzy Schemes For Cooperative Communication In Wireless Sensor Network:A Military Battlefield Scenario[J].IET Communications,2020,14(21):3761-3770.
[19]SHI Q,DING Y H,QING L,et al.Survivability Assessment for Wireless Sensor Networks[J].Journal of Central North University(Natural Science Edition),2020,41(5):418-430,436.
[20]CEN H F,YANG X Y,WANG Y T,et al.A planning method for secure power networks with microgrids based on survivability evaluation[J].Power System Protection and Control,2020,48(22):109-117.
[21]DONG F F,LIU D CH,WU J,et al.Constructing core backbone network based on survivability of power grid[J].International Journal of Electrical Power & Energy Systems,2015,67:161-167.
[22]LOU Y Y,CHEN C M,LIU X M,et al.Multi-Objective Planning Method for Backbone Grid Considering Economy and Multi-Stage Anti-Disaster Performance[J].Southern Power System Technology,2022,16(3):32-39.
[23]ABOLFAZL R,JORDAN P,RIBAL A,et al.A resilience-based recovery scheme for smart grid restoration following cyberattacks to substations[J].International Journal of Electrical Power & Energy Systems,2023,145:108610.
[24]GIAP L,SIFAT F,ANDREA M,et al.Survivable virtual network mapping with content connectivity against multiple link failures in optical metro networks[J].Journal of Optical Communications and Networking,2020,12(11):301-311.
[1] WANG Zhen, ZHOU Chao, FAN Yongwen, Shi Pengfei. Overview of Unmanned Aerial Vehicle Systems Security [J]. Computer Science, 2024, 51(6A): 230800086-6.
[2] TIAN Hao, WANG Chao. Design and Implementation of SNMPv3 Security Mechanism Based on National Security SM3 andSM4 Algorithms [J]. Computer Science, 2024, 51(6A): 230500209-7.
[3] XUE Jianbin, DOU Jun, WANG Tao, MA Yuling. Scheme for Maximizing Secure Communication Capacity in UAV-assisted Edge Computing Networks [J]. Computer Science, 2024, 51(6A): 230800032-7.
[4] JIA Fan, YIN Xiaokang, GAI Xianzhe, CAI Ruijie, LIU Shengli. Function-call Instruction Characteristic Analysis Based Instruction Set Architecture Recognization Method for Firmwares [J]. Computer Science, 2024, 51(6): 423-433.
[5] LIU Chunling, QI Xuyan, TANG Yonghe, SUN Xuekai, LI Qinghao, ZHANG Yu. Summary of Token-based Source Code Clone Detection Techniques [J]. Computer Science, 2024, 51(6): 12-22.
[6] HUO Xingxing, HU Ruimin, LI Yixin. Early-stage Fatigue Detection Based on Frequency Domain Information of Eye Features [J]. Computer Science, 2024, 51(6): 247-255.
[7] LI Panpan, WU Hao, LIU Jiajia, DUAN Li, LU Yunlong. Overview of Security Technologies and Strategies for Intelligent Railway 5G [J]. Computer Science, 2024, 51(5): 1-11.
[8] WANG Gengrun. Survey of Research and Application of User Identity Linkage Technology in Cyberspace [J]. Computer Science, 2024, 51(5): 12-20.
[9] PANG Yuxiang, CHEN Zemao. Security Scheme of UAV Flight Control Based on Attribute Access Control Policy [J]. Computer Science, 2024, 51(4): 366-372.
[10] HUANG Nan, LI Dongdong, YAO Jia, WANG Zhe. Decentralized Federated Continual Learning Method Combined with Meta-learning [J]. Computer Science, 2024, 51(3): 271-279.
[11] SHANG Yuling, LI Peng, ZHU Feng, WANG Ruchuan. Overview of IoT Traffic Attack Detection Technology Based on Fuzzy Logic [J]. Computer Science, 2024, 51(3): 3-13.
[12] ZHAO Yue, HE Jinwen, ZHU Shenchen, LI Congyi, ZHANG Yingjie, CHEN Kai. Security of Large Language Models:Current Status and Challenges [J]. Computer Science, 2024, 51(1): 68-71.
[13] WANG Jing, ZHANG Miao, LIU Yang, LI Haoling, LI Haotian, WANG Bailing, WEI Yuliang. Study on Dual-security Knowledge Graph for Process Industrial Control [J]. Computer Science, 2023, 50(9): 68-74.
[14] ZHAO Mingmin, YANG Qiuhui, HONG Mei, CAI Chuang. Smart Contract Fuzzing Based on Deep Learning and Information Feedback [J]. Computer Science, 2023, 50(9): 117-122.
[15] ZHONG Yue, GU Jieming, CAO Honglin. Survey of Lightweight Block Cipher [J]. Computer Science, 2023, 50(9): 3-15.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!