Attack and defence methods in cyber?physical power system

نویسندگان

چکیده

With the development of digitalisation and intelligence, power system has been upgraded from traditional single energy transmission conversion to a complex cyber-physical (CPPS) with tightly coupled information flows. The achieves controllability observability through ubiquitous sensing technology, advanced measurement powerful processing technology. However, large number intelligent electronic device accesses frequent interactions in CPPS make it more vulnerable susceptible be attacked than any previous structured system. Viruses intrusions can attack cyber subsystem, which turn deal fatal blow supply physical Because above problems, malicious attacks against have occurring recent years generated great scholarly attention. This paper precisely focusses on this problem, by profiling structure potential threats, conducting an in-depth analysis modes subsystems, summarising three-level security defence methods for detail. Finally, future technological prospects research are explicitly addressed, will provide technical support building reliable, safe, robust systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Value of Attack-Defence Diagrams

Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing stateof-the-art modelling tools for attack scenarios, comprehensive considerations of these conditions have not been possible....

متن کامل

Control of cyberphysical systems using passivity and dissipativity based methods

In cyberphysical systems, where compositionality of design is an important requirement, passivity and dissipativity based design methods have shown a lot of promise. Although these concepts are classical, their application to cyberphysical systems poses new and interesting challenges. The aim of this paper is to summarize some of the on-going work in this area by the authors.

متن کامل

stability and attraction domains of traffic equilibria in day-to-day dynamical system formulation

در این پژوهش مسئله واگذاری ترافیک را از دید سیستم های دینامیکی فرمول بندی می کنیم.فرض کرده ایم که همه فاکتورهای وابسته در طول زمان ثابت باشند و تعادل کاربر را از طریق فرایند منظم روزبه روز پیگیری کنیم.دینامیک ترافیک توسط یک نگاشت بازگشتی نشان داده می شود که تکامل سیستم در طول زمان را نشان می دهد.پایداری تعادل و دامنه جذب را توسط مطالعه ویژگی های توپولوژیکی تکامل سیستم تجزیه و تحلیل می کنیم.پاید...

A Nobel Defence Scheme Against Selfish Node Attack in MANET

Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one of a major issue in MANET. Only prevention methods for attack are not enough. In this paper a new...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IET energy systems integration

سال: 2022

ISSN: ['2516-8401']

DOI: https://doi.org/10.1049/esi2.12068