Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A power network security risk assessment method and system

A power network and security risk technology, applied in the field of power system cyber-physical security, can solve problems such as difficulty in handling large-scale power systems, large gaps in global optimal solutions, and inability to guarantee calculation accuracy. Overcome the effects of computational inefficiency

Active Publication Date: 2021-04-20
HUNAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the calculation method based on KKT can obtain the global optimal solution of the model, the solution process needs to introduce a large number of additional integer variables and constraints, resulting in extremely low calculation efficiency, making it difficult for this method to deal with large-scale power systems
However, other existing heuristic methods cannot guarantee the calculation accuracy. For example, the hill-climbing method is usually easy to fall into the local optimal oscillation. Although the calculation efficiency is high, the final solution obtained may be far from the global optimal solution, resulting in misjudgment of system risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A power network security risk assessment method and system
  • A power network security risk assessment method and system
  • A power network security risk assessment method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0130] In the present invention, we use the IEEE RTS-24 node system to test the established power network security risk assessment model. Without loss of generality, we choose load shedding as the quantitative index of system network security risk. For the IEEE RTS-24 node system, the calculation method based on KKT, the hill-climbing method and the method based on the present invention are used respectively to compare the obtained results. Attached Tables 1-4 give the comparison results.

[0131] Table 1: Test results based on KKT conditional calculation method

[0132] Table 2: Test results based on the hill-climbing method

[0133] Table 3: Test results based on the proposed method of the present invention

[0134] Table 4: the test result (different )

[0135] For the load level in the test system, without loss of generality, we select 1.0, 1.1, 1.2, 1.3, 1.4, and 1.5 times the benchmark load as the load level, and compare the final load shedding and solution time cal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power network security risk assessment method and system, which establishes a two-layer programming model for power network security risk assessment; and obtains an approximate optimal solution of the two-tier programming model for power network security risk assessment by using a constraint delimitation contraction method; The approximate solution is used as the initial solution of the hill-climbing method, and the global optimal risk value of the two-level programming model for power network security risk assessment is iteratively obtained. The present invention adopts the idea of ​​upper-level planning and lower-level planning iterative solution to reduce computational complexity, and the number of iterations is small, and the approximate solution of the model can be quickly obtained, which overcomes the disadvantage of low computational efficiency of the traditional method for processing large-scale power systems. The method of constraining, delimiting and shrinking is used to limit the multiple local optimal solutions of the bilevel programming model outside the scope of the solution search domain, providing an effective initial value for the iterative solution process, so that the final iterative result can approach or be equal to the global The optimal solution effectively overcomes the shortcomings of the traditional iterative solution algorithm with low solution accuracy.

Description

technical field [0001] The invention relates to the technical field of power system information physical security, in particular to a power network security risk assessment method and system. Background technique [0002] In recent years, in order to improve the intelligence level of the power system, information technology and communication technology have been widely used in the power network. The high integration of information technology inevitably introduces corresponding network security risks, making power system measurement data vulnerable to tampering attacks. The accuracy of the measurement data is crucial to the dispatch security of the power system. Attackers can inject malicious data to destroy the integrity of the collected measurement data, mislead the dispatcher to make wrong decisions, and lead to line disconnection, load shedding, Safety accidents such as cascading failures. [0003] Therefore, from the perspective of defense, it is urgent to develop a po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q10/06G06Q50/06G06Q50/30
CPCH04L63/1408H04L63/1441G06Q10/0635G06Q10/06393G06Q50/06G06Q50/40
Inventor 刘绚宋宇飞张波田建伟车亮肖紫东
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products