Power system vulnerability analysis method in consideration of information physical joint attack

A power system and joint attack technology, applied in the general control system, control/regulation system, electrical components, etc., can solve the problems of no information attack and physical attack research and analysis, accident consequences, etc., to avoid iteration non-convergence, practicality Good, accurate calculation results

Active Publication Date: 2019-06-25
STATE GRID SHANDONG ELECTRIC POWER
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The information system and the physical system are interactive. Due to the tight coupling between the two, any problem in any link may lead to serious accident consequences.
At presen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power system vulnerability analysis method in consideration of information physical joint attack
  • Power system vulnerability analysis method in consideration of information physical joint attack
  • Power system vulnerability analysis method in consideration of information physical joint attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present disclosure will be further described below in conjunction with the accompanying drawings and embodiments.

[0038] It should be pointed out that the following detailed description is exemplary and intended to provide further explanation to the present application. Unless otherwise specified, all technical and scientific terms used in this embodiment have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0039]It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure provides a power system vulnerability analysis method in consideration of information physical joint attack. When the primary equipment (generator, transformer, transmission line and the like) of the grip in a certain area is physically destroyed, stops operation, and causes changes in the topological structure of the grid, problems such as power flow transfer, branch out-of-limit power and power imbalance of the power system possibly occurs. If the information system suffers an information attack at this time, it is determined that a power dispatching center loses an optimization adjustment capability, the grid proportionally adjusts power generation and consumption power to ensure the power balance, and the out-of-limit branch is cut off by a relay protection device. If the information system does not suffer an information attack, after the destroyed equipment is shut down, the power dispatching center performs optimization with the minimum load loss as a goal, and performs adjustment and control from the power supply side and the load side to eliminate the branch out-of-limit power while ensuring the power balance of the grid.

Description

technical field [0001] The present disclosure relates to a power system vulnerability analysis method considering cyber-physical joint attack. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and do not necessarily constitute prior art. [0003] Smart grid is a composite system composed of information virtual network and physical entity network, which is characterized by close coordination between information system and physical system. With the continuous development of the smart grid, the degree of automation of the power system continues to increase, the number of various measurement calculations and decision-making control units in the power grid has greatly increased, and the scale of the power information network has become larger and larger. The power system has developed into a complex system with deep integration of information and physics, and its stable operation cannot be separat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H02J3/00G05B13/04
Inventor 李晨刘学松代国庆孙伟光李孟安山徐国强全凤丽王黎
Owner STATE GRID SHANDONG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products