Electric power communication network vulnerability evaluation method and system based on complex system theory

A power communication network and complex system technology, applied in the field of distribution network optimization operation, can solve problems such as difficult to obtain communication business operation mode, achieve the effect of improving reliability and stability, and preventing failure

Pending Publication Date: 2020-12-29
HUAZHONG UNIV OF SCI & TECH +3
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, it is difficult for attackers such as terrorist attacks and malicious attacks to obtain specific communication service operation methods, and vulnerable nodes on the network are more likely to become their attack targets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power communication network vulnerability evaluation method and system based on complex system theory
  • Electric power communication network vulnerability evaluation method and system based on complex system theory
  • Electric power communication network vulnerability evaluation method and system based on complex system theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0106] Such as figure 2 As shown, the power sensor communication network model is the object. The model is based on IEEE-33 nodes, and the communication systems of each plant station and dispatch center are equivalent to the same node. The communication lines between sites are the edges of the communication network, and the differences between the communication lines are ignored, and the communication lines are considered to be bidirectional, that is, all edges are considered undirected. Merge multiple lines of communication in the same direction to eliminate multiple edges and self-loops. The control, monitoring and protection of the power sensor communication network are all implemented by the IED unit, and communicate with the server and the master station control center through industrial Ethernet and SDH, and send all the data to the master station server. Carry out according to each step of above-mentioned method successively.

[0107] Table 1 shows the index scores o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electric power communication network vulnerability evaluation method and system based on a complex system theory, and belongs to the field of power distribution network optimization operation. The method comprises the following steps: establishing a power communication network topology model by considering a power sensing communication network layout principle; establishing a sensor communication network node vulnerability evaluation index set based on a complex system theory; and substituting the adjacent matrix of the power communication network into the node vulnerability evaluation index set to obtain an index score of each node. An analytic hierarchy process is adopted to obtain subjective weights, an entropy weight method and a deviation maximization methodare adopted to obtain objective weights, a vulnerability sequence of each node is obtained based on an uncertain normal cloud combination weight method, and according to a sequence result, the node with relatively high vulnerability is focused, so that the vulnerability of each node of the power sensing communication network can be effectively evaluated, large-range faults of the power grid caused by node faults or attacks are prevented, and the reliability and stability of the power grid are improved.

Description

technical field [0001] The invention belongs to the field of distribution network optimization operation, and more specifically relates to a method and system for evaluating the vulnerability of a power communication network based on complex system theory. Background technique [0002] Compared with the traditional distribution network, the development trend of the smart grid is increasingly prominent, making the reliability of the primary grid more dependent on the stability and security of the power sensor communication network. Therefore, the vulnerability of the power sensor communication network has been extensive attention. [0003] In the prior art, Liao Yiming proposed a vulnerability analysis method of power communication network based on edge damage degree in 2019. By considering the edge damage degree index and network loss degree index, each node of the power communication network is analyzed Vulnerability assessment and analysis. However, this method does not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/06G06F17/16G06F17/18
CPCG06F17/16G06F17/18G06Q10/06393G06Q50/06
Inventor 郭舒毓苗世洪孙芊牛荣泽王磊马建伟李丰君
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products