Smart power grid node vulnerability assessment method, system and device, and storage medium

A smart grid and vulnerability technology, applied in design optimization/simulation, instrument, character and pattern recognition, etc., can solve problems such as no power system integration, low analysis accuracy, single feature, etc., to achieve improved analysis accuracy, analysis The effect of comprehensive and precise, computational complexity reduction

Pending Publication Date: 2021-07-09
XI AN JIAOTONG UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, some of the existing smart grid node vulnerability analysis methods are often limited to using only the information of the current smart grid topology for node vulnerability analysis. The analysis often only uses a single feature, and cannot mine the common features of a large number of vulnerable topological nodes. The local topological structure of the nodes is not considered, the physical properties of the power system are not combined with the graph properties of the power grid topology, there is a lack of intersection between features, and the accuracy is low
Another part of the method relies on building a complete fault physical model, which has high computational complexity and low analysis accuracy, and is not suitable for the needs of fast and accurate analysis of the vulnerability of smart grid nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart power grid node vulnerability assessment method, system and device, and storage medium
  • Smart power grid node vulnerability assessment method, system and device, and storage medium
  • Smart power grid node vulnerability assessment method, system and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0068] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of smart power grid safety, and discloses a smart power grid node vulnerability assessment method, system and device, and a storage medium, and the method comprises the steps: obtaining the network topology of a smart power grid; according to the network topology of the smart power grid, obtaining the association importance, the position importance, the mediation centrality, the network connectivity loss under a node deletion method, the node embedding vector and the expansion mediation centrality of each node of the smart power grid; according to the association importance degree, the position importance degree and the mediation centrality of each node of the smart power grid, the network connectivity loss under a node deletion method, the node embedding vector and the expansion mediation centrality, constructing a feature vector of each node of the smart power grid; and inputting the feature vector of each node of the smart power grid into a preset vulnerability analysis model based on a machine learning classifier to obtain the vulnerability of each node of the smart power grid. The analysis accuracy of the node vulnerability is greatly improved, the method does not depend on a complex fault model any more, the expansibility is very high, and the calculation complexity is reduced.

Description

technical field [0001] The invention belongs to the field of smart grid security, and relates to an evaluation method, system, equipment and storage medium for node vulnerability of smart grids. Background technique [0002] As one of the important infrastructures, smart grid is related to national life, social stability and economic development. With the development of information and communication technology, the smart grid has gradually become a power cyber-physical fusion system that is closely integrated with the power system and communication network. [0003] While bringing a lot of economic benefits, the smart grid is also facing increasing security issues. Various attack methods proposed in existing studies have proved that the smart grid is relatively vulnerable to network and physical attacks. When a node fails or is damaged The cascading faults caused by the failure caused by the attack will cause a large-scale power interruption of the power grid and cause huge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/27G06N20/00G06K9/62
CPCG06F30/27G06N20/00G06F18/24
Inventor 沈超凌晨皓张萌
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products