Suzhou Electric Appliance Research Institute
期刊号: CN32-1800/TM| ISSN1007-3175

Article retrieval

文章检索

首页 >> 文章检索 >> 往年索引

电力系统安全一体化战略发展研究

来源:电工电气发布时间:2025-04-28 16:28 浏览次数:0

电力系统安全一体化战略发展研究

赵中原
(南京南瑞继保电气有限公司,江苏 南京 211102)
 
    摘 要:网络安全和物理安全是电力系统可靠性和弹性的重要方面。针对海量电网信息数据和间歇性分布式能源带来的电力系统网络物理挑战,特别是智能信息化对输电系统稳定性以及大数据应用和分布能源控制,阐述了网络信息输电规划、云技术、分布能源聚合和零信任范式等技术措施手段,并积极开发和改进与安全合规相关的包括安规指南、操作指导、最佳实践等内容的产品,以确保电力系统的可靠和安全运行。
    关键词: 电力系统安全;网络物理系统;一体化;网络安全;物理安全;分布式能源;零信任安全
    中图分类号:TM712     文献标识码:A     文章编号:1007-3175(2025)04-0001-07
 
Research on the Development of Security Integration
Strategies for Power Systems
 
ZHAO Zhong-yuan
(NR Electric Co., Ltd, Nanjing 211102, China)
 
    Abstract: Cyber and physical security are important aspects of power system reliability and resilience. In response to the cyber-physical challenges of the power system brought about by massive grid information data and intermittent distributed energy sources, especially the impact of smart information technology on the stability of the transmission system as well as the application of big data and the control of distributed energy sources, the means of technological measures such as cyber-information transmission planning, cloud technology, aggregation of distributed energy sources, and the zero-trust paradigm are elaborated, and the active development and improvement of security compliance-related products, including safety guides, operational guidance, best practices, and other content products to ensure reliable and secure operation of the power system.
    Key words: power system security; cyber and physical system; integration; cyber security; physical security; distributed energy; zero-trust security
 
参考文献
[1] DU Dajun, ZHU Minggao, LI Xue, et al.A Review on Cybersecurity Analysis, Attack Detection,and Attack Defense Methods in Cyber-Physical Power Systems[J].Journal of Modern Power Systems and Clean Energy,2023,11(3) :727-743.
[2] DUO Wenli, ZHOU Meng, ABUSORRAH A.A Survey of Cyber Attacks on Cyber Physical Systems :Recent Advances and Challenges[J].IEEE/CAA Journal of Automatica Sinica,2022,9(5) :784-800.
[3] SURYA S, SRINIVASAN M K, WILLIAMSON S. Technological Perspective of Cyber Secure Smart Inverters Used in Power Distribution System :State of the Art Review[J].Applied Sciences,2021,11(18) :8780.
[4] KISHORE P K, RAMAMOORTHY S, RAJAVARMAN V N.ARTP :Anomaly Based Real Time Prevention of Distributed Denial of Service Attacks on the Web Using Machine Learning Approach[J].International Journal of Intelligent Networks,2023,4 :38-45.
[5] ALSUWIAN T, SHAHID B A, AMIN A A.Smart Grid Cyber Security Enhancement :Challenges and Solutions—A Review[J].Sustainability,2022,14 :14226.
[6] ABDELMALAK M, VENKATARAMANAN V, MACWAN R.A Survey of Cyber-Physical Power System Modeling Methods for Future Energy Systems[J].IEEE Access,2022,10 :99875-99896.
[7] WANG X, ZHOU Yuhao, LUO Biao, et al.Event-Triggered Adaptive Finite-Time Control for SwitchedCyberphysical Systems with Uncertain Deception Attack[J].IEEE Transactions on Industrial Cyber-Physical System,2023,1(1) :136-146.
[8] YEMINI M , NEDIC A , GOLDSMITH A , et al.Characterizing Trust and Resilience in Distributed Consensus for Cyberphysical Systems[J].IEEE Transactions on Robotics,2022,38(1) :71-91.
[9] GHIASI M , WANG Z , MEHRANDEZH M , et al . A Comprehensive Review of Cyber-Attacks and Defense Mechanisms for Improving Security in Smart Grid Energy Systems :Past,Present and Future[J].ElectrIc Power Systems Research,2023,215 :108975.
[10] DAVIDSON C, ANDEL T, YAMPOLSKIY M, et al.On SCADA PLC and Fieldbus Cyber-Security[C]//13th International Conference on Cyber Warfare and Security, 2018 :140-148.
[11] SAJID A, ABBAS H, SALEEM K.Cloud-Assisted IoTBased SCADA Systems Security :A Review of the State of the Art and Future Challenges[J].IEEE Access,2016,4 :1375-1384.
[12] VENKATARAMANAN V, HAHN A, SRIVASTAVA A.CP-SAM :Cyber-Physical Security Assessment Metric for Monitoring Microgrid Resiliency[J].IEEE Transactions on Smart Grid,2020,11(2):1055-1065.
[13] YANG Yue, HUANG Jiangshuai, SU Xiaojie, et al.Adaptive Control of Second Order Nonlinear Systems with Injection and Deception Attacks[J].IEEE Transactions on Systems,Man,and Cybernetics Systems,2022,52(1) :574-581.
[14] ABDEL-BASSET M, MOUSTAFA N, HAWASH H.Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids :A Federated Semisupervised Approach[J].IEEE Transactions on Industrial Informatics, 2022,19(1) :995-1005.
[15] TAKIDDIN A, ISMAIL M, ZAFAR U, et al.Deep Autoencoder-Based Anomaly Detection of Electricity Theft Cyberattacks in Smart Grids[J].IEEE Systems Journal,2022,16(3) :4106-4117.