Attack and defence methods in cyber?physical power system
نویسندگان
چکیده
With the development of digitalisation and intelligence, power system has been upgraded from traditional single energy transmission conversion to a complex cyber-physical (CPPS) with tightly coupled information flows. The achieves controllability observability through ubiquitous sensing technology, advanced measurement powerful processing technology. However, large number intelligent electronic device accesses frequent interactions in CPPS make it more vulnerable susceptible be attacked than any previous structured system. Viruses intrusions can attack cyber subsystem, which turn deal fatal blow supply physical Because above problems, malicious attacks against have occurring recent years generated great scholarly attention. This paper precisely focusses on this problem, by profiling structure potential threats, conducting an in-depth analysis modes subsystems, summarising three-level security defence methods for detail. Finally, future technological prospects research are explicitly addressed, will provide technical support building reliable, safe, robust systems.
منابع مشابه
The Value of Attack-Defence Diagrams
Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing stateof-the-art modelling tools for attack scenarios, comprehensive considerations of these conditions have not been possible....
متن کاملControl of cyberphysical systems using passivity and dissipativity based methods
In cyberphysical systems, where compositionality of design is an important requirement, passivity and dissipativity based design methods have shown a lot of promise. Although these concepts are classical, their application to cyberphysical systems poses new and interesting challenges. The aim of this paper is to summarize some of the on-going work in this area by the authors.
متن کاملstability and attraction domains of traffic equilibria in day-to-day dynamical system formulation
در این پژوهش مسئله واگذاری ترافیک را از دید سیستم های دینامیکی فرمول بندی می کنیم.فرض کرده ایم که همه فاکتورهای وابسته در طول زمان ثابت باشند و تعادل کاربر را از طریق فرایند منظم روزبه روز پیگیری کنیم.دینامیک ترافیک توسط یک نگاشت بازگشتی نشان داده می شود که تکامل سیستم در طول زمان را نشان می دهد.پایداری تعادل و دامنه جذب را توسط مطالعه ویژگی های توپولوژیکی تکامل سیستم تجزیه و تحلیل می کنیم.پاید...
A Nobel Defence Scheme Against Selfish Node Attack in MANET
Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one of a major issue in MANET. Only prevention methods for attack are not enough. In this paper a new...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET energy systems integration
سال: 2022
ISSN: ['2516-8401']
DOI: https://doi.org/10.1049/esi2.12068