Next Article in Journal
Static Voltage Stability Assessment Using a Random UnderSampling Bagging BP Method
Previous Article in Journal
The Optimal Operation of Parallel Pumping Stations for Inter-Basin Water Transfer Based on the Multi-Objective Optimization of a Single Pumping Station
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Load Redistribution of Power CPS Based on Comprehensive Index of Coupling Node Pairs

1
Key Laboratory of Power Electronics for Energy Conservation and Drive Control, Yanshan University, Qinhuangdao 066004, China
2
Smart Grid Center, State Grid Jibei Electric Power Company Limited, Qinhuangdao 066100, China
3
State Grid Sichuan Electric Power Construction Company, Chengdu 610011, China
*
Author to whom correspondence should be addressed.
Processes 2022, 10(10), 1937; https://doi.org/10.3390/pr10101937
Submission received: 1 August 2022 / Revised: 27 August 2022 / Accepted: 1 September 2022 / Published: 26 September 2022

Abstract

:
The adoption of power cyber physical systems (Power CPS) is becoming more and more widespread, and as risk spreads, cascading failures of overload behavior can lead to the collapse of individual or entire networks, becoming a major threat to the network security. Taking the power CPS coupling node pair as the starting point, this paper establishes the comprehensive indicators characterizing the importance and vulnerability of the coupled node pair, based on the idea of intrusion tolerance, when the cyber side is faulted by the network attack, the system actively carries out reasonable and effective dynamic load redistribution based on the indicators updated after each round of cascading, thereby inhibiting the spread of risk, reducing system losses, and improving survivability. The above theory is simulated on the IEEE 30-bus system and concludes that the proposed load redistribution strategy can effectively reduce the loss of the system after attacks.

1. Introduction

The smart grid is a typical cyber-physical system (CPS) [1] with a large number of measurements, control units, advanced information, and communication technologies. These technologies make the power system operate more stably and safely, but also exacerbate the system’s vulnerability. Due to cyber and physical network coupling, cross-space cascade failures can carry the risk from one side to the other. For example, a major cause of the North American blackout in 2003 was a state estimation failure in the information system, when an unexposed failure occurred on the physical side at the same time [2].
The currently available techniques for preventing and mitigating the propagation of cascading failures can be divided into three categories [3]: attack prevention techniques, attack detection techniques, and intrusion tolerance techniques. Since the currently available detection and defense means are not perfect and the system is inevitably compromised, the application of the third approach is gaining attention in order to maintain the observability and controllability of the system as much as possible [4]. Ref. [5] investigated the resistance of power systems to attack under an average redistribution strategy. Ref. [6] used the WPA-PFRA approach to redistribute the currents in the network. However, the above two papers consider only the power system and do not address the cyber side. Ref. [7] described the redundancy characteristics of nodes based on the “load-capacity” model using overload states and failure probabilities for load redistribution, but this method is only applied in single-layer networks. Ref. [8] used a local nearest neighbor weighted assignment strategy to analyze cascading failures in complex networks. A load redistribution model with an adjustable redistribution range and redistribution uniformity is proposed in [9]. Ref. [10] aimed to reduce the critical threshold and effectively improve the robustness of the network, allocating based on the maximum available capacity of the remaining nodes. However, there are many problems in the above papers, such as not considering both the structural and functional characteristics of the system, or not considering the cyber side and the physical side organically.
Therefore, in this paper, based on the third intrusion-tolerant solution, load redistribution under cascade failure is carried out in two steps as follows:
(1)
The integrated importance and vulnerability indexes of node pairs are established by combining the functional characteristics of the system.
(2)
Based on the update of indicators, dynamic load redistribution of information flow and power flow of failed nodes is carried out in the process of cascading failure, so that the fault can be terminated quickly.

2. The Comprehensive Characteristics of the Coupling Node Pair

In this paper, the degree-betweenness coupling interface strategy [11] takes a pair of coupled power nodes and cyber nodes as a whole. The coupling part of the two subnetworks within the power CPS is the key link, which includes the corresponding power grid node, cyber network node, and cyber-physical connection edge.

2.1. Active-Business Degree Index

A large amount of literature shows that the number of node degrees alone does not reflect the importance of nodes or node pairs in the system.
As shown in Figure 1, on the power side, each power node is connected to multiple power lines, and there is power inflow or outflow on each node. The importance of each power node is evaluated by combining the magnitude of the power flow and its flow direction. On the cyber side, each cyber node is connected to multiple links, and each link carries one or more different services, and different services have different importance. So, the structural characteristics are combined with the business characteristics on the cyber side to quantify the cyber node importance.
The importance of the power side node i can be characterized as Ipi:
I p i = k i i p i i + k i o p i o < k p > 2
where the average degree value of the power network node is represented as < k p > ; k i i is the number of active lines injected into the i node, and p i i is the input active value of the i node; k i o is the number of active lines flowing out of the i node, and p i o is the output active value of the i node.
In order to simplify the calculation, the average importance of the service is taken according to the security partition [12], that is, the importance of the security zone I to IV is 0.835, 0.41, 0.315, 0.223, respectively. The cyber-side node service importance formula is as follows:
I c i = a = 1 n l = 1 K b a l h a l
where bxl is the importance of class x service on the service link l connected by node i, hxl is the number of class x services on the service link l, and K is the collection of adjacent links of node i. The service importance is evaluated according to the latency, bit error rate, real-time, reliability, etc. [13].
Therefore, the active-business degree of the coupled node pair can be established according to the power node active degree and the service importance of the cyber node, which is used to characterize the importance of the node in the whole network:
I v i = ( 1 β c p ) I p i + β c p I c i
where β c p is the weight allocation coefficient for importance, I p i and I c i are normalized subnet node importance metrics, respectively.

2.2. Node Pair Utilization Index

Coupled networks in power systems have proven to be more vulnerable than single-layer networks [14].
As shown in Figure 2, on the power side, the ratio of the power transmitted on the line to the upper limit of its capacity is defined as the utilization rate of the transmission line [15]. The power nodes are connected by transmission lines, so the node utilization rate is defined, which is the ratio of the power flowing through the node to the capacity of the node. The higher the utilization, the easier it is for the node to approach the limit value when the load increases. Therefore, the power node utilization rate can be defined as:
U p i = ( P F l i 2 + Q F l i 2 + P T l i 2 + Q T l i 2 ) 2 C p i
where li is the adjacent line of node i. P F l i and Q F l i are the active and reactive power at the outflow end of line li, respectively. P T l i and Q T l i are the active and reactive power at the receiving end of the line li, respectively.
For a power-side node, the one delivering power to the node is called the parent node, and the one receiving power from the node is called the child node, which is shown in Figure 3 below.
The more children nodes a node has, the more risk will be passed on to that node, making it more vulnerable, and conversely, the more parent nodes it has, the more risk it can be to help share. Therefore, the vulnerability indicator of the power side can be defined as:
η p i = U p i · e k i o k i i
The cyber side adopts a variety of technologies for defense, such as firewalls, identity authentication, VPN, intrusion detection, isolation, encryption, and other means [16]. Therefore, the threat degree formula for the cyber-side coupling node can be defined as follows:
η c i = f u t i I d i s k i C i C c i
Among them, f u t i represents the vulnerability utilization of node i on the cyber side; I d i s indicates the degree of vulnerability distribution; ki is the degree of node i. The security zone where the vulnerability is located is used as the main basis to assess the vulnerability utilization and vulnerability distribution impact degree. After a comprehensive statistical measurement [16]. it can be seen that the threatened degree f u t i I d i s of vulnerabilities in each security zone is shown in Table 1:
Therefore, the comprehensive vulnerability indexes of the coupling node pair based on utilization can be established as follows:
η v i = ρ ( γ c p η p i + ( 1 γ c p ) η c i )
Further, ρ is the probability of inter-network failure (0 < ρ < 1), characterizing the odds of risk spreading across space, and γ c p is the vulnerability weight coefficient, and η p i and η c i are normalized subnet node vulnerability metrics, respectively.

3. Power CPS Risk Propagation Considering Load Redistribution

The work of the actual power system shows that in order to ensure real-time observation of the grid operation, cyber-side nodes are often stocked with a large number of UPS power supplies, and the failure of a power node does not directly affect the normal operation of the cyber network [17].
When considering the load-capacity model, the survival conditions of the coupled nodes change [18] and only fail when the node exceeds its maximum capacity. A distribution strategy that considers only the centrality of nodes can invalidate nodes in a central position due to a larger distribution load [19]. At present, the information-focused routing strategies commonly used are: routing based on the shortest path, even distribution policies, etc. [20], and there are few articles on load redistribution by establishing indicators.

3.1. Initial Load and Capacity of CPS Nodes

In a subnetwork, when a node fails, the load on that node is redistributed to the other nodes. Cascade failure occurs if the node capacity is exceeded.

3.1.1. Power Side

On the power side, the power flow consists of active and reactive components and is calculated in terms of apparent power:
S l = j i j = 1 n S i j = j i j = 1 n V i y i j * ( V i * V j * ) = V i ( Y V ) i *
In general, due to the existence of line impedance, the voltage of the node at the sending power end and the node at the receiving power end on the same line are different, resulting in different apparent power on both sides of the line. Thus, the power flow of the line can be defined as:
| L l i ( 0 ) | = | S F l | + | S T l | 2
where | L l i ( 0 ) | is the initial average power flow on line l, | S F l | is the apparent power at the sending-power end of the line, and | S T l | is the apparent power at the receiving-power end of the line.
Expand it to get:
| L l i ( 0 ) | = P F l i 2 + Q F l i 2 + P T l i 2 + Q T l i 2 2
Then, the initial load of node i is the sum of the initial loads of all connected neighboring lines:
L p i ( 0 ) = l i Γ i L l i ( 0 )
where L p i ( 0 ) is the initial total load of node i.
Power node capacity is proportional to the initial load:
C p i = ( 1 + α p ) L p i ( 0 )
where α p is the power-side capacity margin factor.

3.1.2. Cyber Side

The initial amount of information of cyber node i can be defined as:
L c i ( 0 ) = n τ + n τ + n τ + n τ
Among them, nI, nII, nIII, and nIV are the traffic volume belonging to the four security zones carried on the i node, τI, τII, τIII, and τIV are the load adjustable parameters to control the load intensity of different safety zones of the node i.
The maximum capacity of an information node is related to the initial amount of information as follows [21]:
C c i = ( 1 + α c ) L c i ( 0 )
where α c is the capacity margin factor of cyber nodes.
The constraints for cyber nodes and power nodes to operate normally without exceeding the capacity limit are:
{ 0 < L p i ( 0 ) C p i 0 < L c i ( 0 ) C c i

3.2. Subnetwork Load Reallocation

This paper adopts the dynamic allocation strategy of nearest neighbor selection based on indicators, and processes the risk propagation at each stage in two rounds, making the best choice under the current situation and terminating the cascade failure as soon as possible.

3.2.1. Cyber Network Load Reallocation

The best routing of the cyber network itself may not be optimal for the power system, so optimal routing in favor of the power system should be established to ensure the accessibility of critical information flows [22]:
(1)
The first round of redistribution on the information side
When multiple nodes fail at t-time, the nodes with relatively high importance in the front row are prioritized for load redistribution. The specific allocation steps are as follows:
The first stage of load redistribution of a single failed node vi is carried out, and the full load of the vi node is distributed to all neighbor nodes.
For the information-side failure node vi, the load is zeroed, that is, Li = 0, the relevant row and column elements are zeroed in the coupling adjacency matrix, and the neighbor node set of vi is collected and recorded while removing the line connected to the vi node. For multiple neighbor nodes of node vi, their comprehensive vulnerability is sorted according to at the t + 1 moment, one of vi’s neighbor nodes vj will be allocated to a certain proportion of the load, then vi reassigned to vj. The load increment is:
L i j ( t + 1 ) = L i ( t ) η ( v j ) n Γ i η ( v n )
where L i j ( t + 1 ) is the load reallocated to node j at the moment of t + 1, and L i ( t ) is the load before node i fails; η ( v j ) is the comprehensive vulnerability index of node j, and η ( v j ) n Γ i η ( v n ) is the weight assigned to the load, following the node parameters after each round of redistribution; Γ i is the set of neighbor nodes of node i.
If multiple neighbor nodes of node j fail, then all failed neighbor nodes may redistribute load to j, and the load increment on node j at the t + 1 moment is:
Δ L j ( t + 1 ) = i Γ j L i j ( t + 1 )
where Γ j is the set of failed neighbor nodes for node j.
The total load on node j is:
L j ( t + 1 ) = Δ L j ( t + 1 ) + L j ( t )
where L j ( t ) is the load of node j at t-time.
(2)
The second round of redistribution on the information side
The first round of redistribution ends with updating the loads and metrics for all changed nodes. At this time, the status of the remaining nodes of the information network is divided into three cases:
(1)
Normal state, can operate normally;
(2)
In the overload state, but not exceeding the capacity, it can maintain normal operation in the short term, but it needs to be processed as soon as possible;
(3)
Exceeding the maximum capacity and being in a failed state requires a new round of load redistribution.
No processing is required when the node is in the first case. Repeat the actions in the first round when the third case occurs. In the second case, the overload of the information node will cause the throughput of the node to mismatch, and the system will gradually become congested. During this time, the excess portion of the load can be redistributed again.
The steps for the second round of load redistribution are:
Step 1: Collect nodes that are in an overloaded state and newly failed with their load.
Step 2: Redistribute the excess load of the overloaded nodes, and redistribute the entire load of the nodes that exceed the capacity according to the method of the first round.
Step 3: Calculate the load amount of all nodes after this round of load redistribution, if the case of no node overload is satisfied (1), no operation is required, and the cascade failure ends; if (2) or (3), return to step 1.
Constraints satisfied: L j ( t + 1 ) C c j . C c j is the capacity of node j. When L j ( t + 1 ) > C c j , it means that the load of node j exceeds its capacity, and the cyber node j fails, causing a new load redistribution.

3.2.2. Power Grid Load Redistribution

After the cascade of the information side is completed, all the failed information nodes are counted and the corresponding failure nodes of the coupling power side are found, and the first round of redistribution of the power side is carried out.
Considering the node heterogeneity of the power side, it can be divided into three types of nodes, namely the generator node, the load node, and the intermediate node, which constitute the power side directed topology network. It is divided into two steps to suppress the cascade fault propagation on the power side, first adjust the generator output according to the real-time operation situation for power flow adjustment, and if the power flow has not converged, the partial load is removed.
(1)
The first round of redistribution on the power side
As can be seen from Figure 4, after the failure of the i node, the recovered power flow is all returned to the j node and the k node. When the system is operating normally, power conservation is met:
L j i + L k i = Δ L i + L i o
where L j i and L k i are the power flowing to the i node, Δ L i is the power consumed by the node i, and L i o is the power flowing out of the i node.
When node i fails, the lines directly connected around it will be cut. The power carried by nodes j and k at this time is:
{ L j = L j o + L j i + L j l o s s L k = L k o + L k i + L k l o s s
If the parent node of the i node is not a generator node, continue to go back up to find the nearest generator.
When traced back to generator nodes j and k, the power flow is redistributed according to the sum of the recovered tide and the original tide according to the real-time redundancy of the node. Taking apart the j node in the above figure, it is connected to the i1 and i3 nodes and other child nodes, in addition to the i node.
As shown in Figure 5, at the generator node, according to the capacity redundancy allocation strategy, the power flow allocated to the i1 node is:
Δ L j i 1 = Δ L j C i 1 L i 1 ( C j x L j x )
The tide reassigned to the i3 node is:
Δ L j i 3 = Δ L j C i 3 L i 3 ( C j x L j x )
where jx denotes the neighbor node of node j.
The other failed nodes in the first round on the power side operate as above.
(2)
The second round of redistribution on the power side
The first round of cascading failure under the power flow redistribution has ended, update the adjacency matrix and node pair indicators. At this time, the generator node has begun to readjust the power flow. If the final power flow does not converge, then take the way to reduce the load to make the tide converge. The subsequent redistribution process is also carried out according to the established node-to-synthetic vulnerability indicator.
As shown in Figure 6, the new loads allocated to i1 and i3 in the first round are Δ L j i 1 and Δ L j i 3 , and the child nodes are a, b, c, and d. Similar to the information side, according to the updated comprehensive importance indicator I i = [ I 1 , I 2 , I 3 , , I n   ] , the excess tide of the node with high importance is first redistributed. Unlike the information side, only child nodes on the power side receive the power flow. The child nodes of i1 are a and b, according to the comprehensive vulnerability indicator η i = [ η 1 , η 2 , η 3 , , η n   ] , where the tide that node a needs to receive is:
Δ L a , r e d = ( Δ L j i 1 + L i 1 C i 1 ) η a η i 1 , x
where Li1 is the load before node i1 is allocated, Ci1 is the maximum capacity of node i1, and i1, x is the neighbor child node collection of node i1.
Need to meet the constraints: L j C c j . When L j > C c j , the load of node j exceeds its capacity and requires a new load redistribution. Traverse the entire network in the same way, and if the tide has been redistributed to the load nodes and still does not converge, the excess load is removed and all parameters of the node and adjacency matrix are updated. In the same way, the remaining three child nodes of i1 and i3 need to receive the tide, as well as the result of network redistribution.
Since there is a backup power supply in the information side of the collection and monitoring equipment node, it is not supplied through the coupling power grid, so the failure of the power side in a short period of time has only a small probability of propagation to the information side, which is ignored in this paper.

3.3. System Survivability Assessment

After the system risk propagation is over, the remaining surviving nodes on the power side and cyber side are compared with the total number of nodes before the failure occurred. A larger ratio G indicates more surviving nodes after the failure and better connectivity of the remaining structures.
G = N c + N p N c + N p
where N c and N p denote the number of cyber nodes and power nodes remaining functional after the end of cascade failure propagation, respectively, and N c , N p denote the number of all cyber nodes and power nodes.
This section may be divided by subheadings. It should provide a concise and precise description of the experimental results, their interpretation, as well as the experimental conclusions that can be drawn.

4. Simulation Analysis

The IEEE 30-node system is used for the power side network in the power CPS, which is simulated by MATPOWER. The 30-node scale-free network is generated by MATLAB for the cyber-side network. The adjacency matrix of the dual network is established according to the degree-betweenness coupling, and the “one-to-one” type is used between nodes.

4.1. Initial Topology of Bilateral Subnetwork

The power side builds a topology based on the IEEE30 node system, as shown in Figure 7 below:
The node and line connection relationship of part of the power network is shown in Table 2 below:
The topology of the cyber side before the failure is shown in Figure 8 below:
The initial number of nodes on the cyber side is 5, and each newly generated node generates 3 edges connected to the old network. As can be seen from the Figure 8, scale-free networks have unequal connectivity between nodes, with large differences between the degrees of each node.
Cyber-side nodes are laid with the power-side nodes, and the information links are denser than those of the transmission lines. Due to the large number of nodes, the adjacency matrix is no longer listed, and only the corresponding connections between the nodes on both sides using the degree-betweenness coupling are shown in Table 3 below:

4.2. Establishment of Comprehensive Indexes

As described in Section 2, the active-business importance index is established according to (1) to (5), and then the coupled node pair utilization index is established according to (6) to (11). The horizontal coordinate indicates the information side node number in the coupled node pair. Index weighting coefficients β c p and γ c p are taken as 0.5, dual network capacity margin coefficients α p and α c are taken as 0.5, inter-network failure probability ρ is 0.5, load adjustable parameters are selected according to information security partition, I and II are taken as 1.1, III and IV are taken as 1.0.
From Figure 9 and Figure 10, it is seen that there is no linear relationship between the two indexes of vulnerability and importance. From Figure 9, it can be seen that the 6th pair of nodes has the highest active-business degree index, i.e., this pair of nodes is relatively the most important, and from Figure 10, it can be seen that the vulnerability of this pair of nodes is also the highest, so when some nodes on the cyber side are attacked for load reallocation, the load of this pair of nodes should be allocated first, and due to its highest combined vulnerability, it should receive the smallest proportion of the load when accepting the load allocated by the failed neighbor nodes. Then, look at the 1th node pair, which has a low vulnerability and low importance relative to the other nodes, this means even if it is attacked, it should be allocated later, and when its neighbor node fails and needs to allocate load to it, it can take most of the load and thus reduce the burden of other nodes.

4.3. Node Survival Rate under Different Attack Methods

4.3.1. High-Degree Nodes Attacks

The simulation is compared to the existing redistribution methods in the literature, and the number of attacked nodes on the cyber side is increased sequentially by using the high-degree of nodes attack mode.
As can be seen from Figure 11, when the number of attacks is less than 6, the number of remaining nodes under both redistribution methods shows an obvious decreasing trend, and when the number of attacks exceeds 6, the system under the method of this paper still has more than 30% of surviving nodes, while the system under the other methods is close to 0. When the number of attacks is 7, the system under the other methods has completely failed, while the system under the method of this paper still has more than 20% of the survivability of the system, and it only shows a slow decreasing trend as the number of attacks gradually increases.

4.3.2. High-Load Nodes Attack

The simulation is compared to the existing redistribution methods in the literature, and the number of attacked nodes on the cyber side is increased sequentially by using the high-load of nodes attack mode.
As can be seen from Figure 12, similar to the degree attack, the blue curve declines more slowly than the red curve in the early stage, and the red curve drops to 0 when the number of attacking nodes is about 6, while the blue curve still has about 40% of the nodes operating normally. In addition, when four nodes on the cyber side suffer from high load attack, the blue curve has an obvious inflection point and the curve drops sharply, which is because the first four nodes on the cyber side with high load carry most of the information flow, and once these four nodes fail, they will cause a large amount of information flow redistribution, which will easily trigger more information nodes to overload and more risk propagation across space to the power side, resulting in the power side being threatened.

4.4. Parameter Analysis

4.4.1. Different Topologies

The cyber-side scale-free network and the small world network are established, respectively. The simulation results of the high-degree node attack and the high-load node attack are performed in these two networks, respectively, as follows in Figure 13.
As can be seen from the Figure 13, the trend of the system survivability curves under both topologies is similar. Under the allocation method in this paper, regardless of whether the scale-free network or the small-world network is used on the cyber side, when the attack ratio is small (less than 6), the loss of the number of nodes in the four curves is comparable, and when the number of nodes in the initial attack is about 6, i.e., the attack ratio is 20%, the curve drop suddenly increases. Besides, when the number of attacks continues to increase gradually, it can be seen that the survivability of the system with the scale-free network is better than that of the small-world network, both under the degree attack and the load attack.

4.4.2. Different Load Adjustable Parameters

The height number attack is used and five groups of load adjustable parameters are taken for comparison, and the results are shown in the following Figure 14.
Where τI, τI, τIII, and τIV denote the load adjustable parameters of safety zone I, II, and III, IV, respectively.
From Figure 14, it can be seen that there is a decreasing trend of different magnitudes in the five curves. When the load parameters of all security zones are not less than 1, the plunging trend of the curves appears when the number of attack nodes is 6. When the load parameter of zone II is less than 1, the yellow curve in the figure has been at the bottom of several curves, and it can be seen that the overall system survivability is the lowest at this time, which is because the security zone II has a large amount of business and high business importance, and it seems to be the most critical area, so when its load parameter is low, it will lead to a significant decrease in system survivability.

5. Conclusions

In this paper, the topological and functional characteristics of the dual-side network of power CPS are considered, and the active-business degree index and the coupled node pair utilization index, which consider the integrated characteristics of node pairs, are established accordingly. These two indexes are used to deal with the cross-space cascade failure and optimize the load redistribution strategy. The simulation example illustrates that the proposed coupling node pair integrated characteristic index can be effectively used in the load redistribution strategy.

Author Contributions

Conceptualization, Z.Q. and J.H.; methodology, Y.W.; software, J.D. and J.Z.; validation, J.H.; writing—original draft preparation, J.H.; writing—review and editing, Z.Q. and Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References and Note

  1. Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber–Physical System Security for the Electric Power Grid. Proc. IEEE 2011, 100, 210–224. [Google Scholar] [CrossRef]
  2. Cheng, Z.; Cao, J. Cascade of failures in interdependent networks coupled by different type networks. Phys. A Stat. Mech. Its Appl. 2015, 430, 193–200. [Google Scholar] [CrossRef]
  3. Clark, A.; Zonouz, S. Cyber-Physical Resilience: Definition and Assessment Metric. IEEE Trans. Smart Grid 2017, 10, 1671–1684. [Google Scholar] [CrossRef]
  4. Iudice, F.L.; Sorrentino, F.; Garofalo, F. On Node Controllability and Observability in Complex Dynamical Networks. IEEE Control Syst. Lett. 2019, 3, 847–852. [Google Scholar] [CrossRef]
  5. Gulcu, T.C.; Chatziafratis, V.; Zhang, Y.; Yağan, O. Attack vulnerability of power systems under an equal load redistribution model. IEEE/ACM Trans. Netw. 2018, 26, 1306–1319. [Google Scholar] [CrossRef]
  6. Yusuff, A.A.; Jimoh, A.-G.A.; Munda, J. Mitigation of cascade blackout in Power Systems by using Widest Path and Power Flow Redistribution Algorithms. In Proceedings of the 2010 International Conference on Advances in Energy Engineering, Beijing, China, 19–20 June 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 129–133. [Google Scholar]
  7. Fan, C.; Wang, B.; Tian, J. Cascading failure model in aviation network considering overload condition and failure probability. J. Comput. Appl. 2022, 42, 502–509. [Google Scholar]
  8. Wang, W.X.; Chen, G. Universal robustness characteristic of weighted networks against cascading failure. Phys. Rev. E 2008, 77, 026101. [Google Scholar] [CrossRef] [PubMed]
  9. Hong, S.; Wang, B.; Wang, J. Cascading failure propagation in interconnected networks with tunable load redistribution strategy. In Proceedings of the 2015 Prognostics and System Health Management Conference (PHM), Beijing, China, 21–23 October 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–7. [Google Scholar]
  10. Tianjie, Z.; Guoping, J.; Xiao, T.; Lingling, X.; Yurong, S. Local load redistribution strategy based on maximum residual capacity of nodes in complex networks. In Proceedings of the 2017 29th Chinese Control and Decision Conference (CCDC), Chongqing, China, 28–30 May 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 3692–3696. [Google Scholar]
  11. Pan, H.; Lian, H.; Na, C.; Li, X. Modeling and vulnerability analysis of cyber-physical power systems based on community theory. IEEE Syst. J. 2020, 14, 3938–3948. [Google Scholar] [CrossRef]
  12. National electric power secondary system security protection overall program. Electricity Regulatory Safety. 2006.
  13. Zhang, J.; Dong, Y. Reliable Remote Relay Protection in Smart Grid. ZTE Commun. 2015, 13, 21–32. [Google Scholar]
  14. Li, J.; Sun, C.; Su, Q. Analysis of cascading failures of power cyber-physical systems considering false data injection attacks. Glob. Energy Interconnect. 2021, 4, 204–213. [Google Scholar] [CrossRef]
  15. Chen, P.; Xiao, X.; Wang, X. Interval optimal power flow applied to distribution networks under uncertainty of loads and renewable resources. J. Mod. Power Syst. Clean Energy 2019, 7, 139–150. [Google Scholar] [CrossRef]
  16. Yang, G.; Wang, Y.; Luo, J. Electric CPS information network vulnerability and assessment method. Electr. Power 2018, 51, 83–89. [Google Scholar]
  17. Han, Y.; Guo, C.; Ma, S.; Song, D. Modeling cascading failures and mitigation strategies in PMU based cyber-physical power systems. J. Mod. Power Syst. Clean Energy 2018, 6, 944–957. [Google Scholar] [CrossRef] [Green Version]
  18. Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [PubMed]
  19. Fengzeng, L.; Bing, X.; Hao, L. Finding Key Node Sets in Complex Networks Based on Improved Discrete Fireworks Algorithm. J. Syst. Sci. Complex. 2021, 34, 1014–1027. [Google Scholar]
  20. Wu, S.; Yin, H.; Cao, H.; Yang, L.; Zhu, H. Node Ranking Strategy in Virtual Network Embedding: An Overview. China Commun. 2021, 18, 114–136. [Google Scholar] [CrossRef]
  21. Wang, S.; Yang, Y.; Sun, L.; Li, X.; Li, Y.; Guo, K. Controllability Robustness Against Cascading Failure for Complex Logistic Network Based on Dynamic Cascading Failure Model. IEEE Access 2020, 8, 127450–127461. [Google Scholar] [CrossRef]
  22. Xu, L.; Guo, Q.; Yang, T.; Sun, H. Robust routing optimization for smart grids considering cyber-physical interdependence. IEEE Trans. Smart Grid 2018, 10, 5620–5629. [Google Scholar] [CrossRef]
Figure 1. The active-business degree model.
Figure 1. The active-business degree model.
Processes 10 01937 g001
Figure 2. Utilization model for coupled node pairs.
Figure 2. Utilization model for coupled node pairs.
Processes 10 01937 g002
Figure 3. Parent and child nodes of a power node.
Figure 3. Parent and child nodes of a power node.
Processes 10 01937 g003
Figure 4. The first round of redistribution on the power side.
Figure 4. The first round of redistribution on the power side.
Processes 10 01937 g004
Figure 5. Load redistribution of the j node on the power side.
Figure 5. Load redistribution of the j node on the power side.
Processes 10 01937 g005
Figure 6. The second round of redistribution on the power side.
Figure 6. The second round of redistribution on the power side.
Processes 10 01937 g006
Figure 7. Power-side topology.
Figure 7. Power-side topology.
Processes 10 01937 g007
Figure 8. Cyber-side topology.
Figure 8. Cyber-side topology.
Processes 10 01937 g008
Figure 9. Active-business degrees index.
Figure 9. Active-business degrees index.
Processes 10 01937 g009
Figure 10. Node pair utilization index.
Figure 10. Node pair utilization index.
Processes 10 01937 g010
Figure 11. Comparison of survivability under different allocation methods.
Figure 11. Comparison of survivability under different allocation methods.
Processes 10 01937 g011
Figure 12. Comparison of survivability under different allocation methods.
Figure 12. Comparison of survivability under different allocation methods.
Processes 10 01937 g012
Figure 13. Effect of different topologies on system survivability.
Figure 13. Effect of different topologies on system survivability.
Processes 10 01937 g013
Figure 14. Effect of different load adjustable parameters on system survivability.
Figure 14. Effect of different load adjustable parameters on system survivability.
Processes 10 01937 g014
Table 1. Risk levels for each security partition.
Table 1. Risk levels for each security partition.
Security ZoneScoreRisk Levels
I4High
II3Medium
III4High
IV2Low
Table 2. Node and line connection relationship.
Table 2. Node and line connection relationship.
LineFrom-NodeTo-Node
112
213
324
434
525
626
746
857
The first column of the table indicates the line serial number, the second column indicates the node at the sending power end of the line, and the third column indicates the node at the receiving power end.
Table 3. Cyber-physical node coupling relationship.
Table 3. Cyber-physical node coupling relationship.
Node of Cyber-Side Node of Power-SideNode of Cyber-SideNode of Power-Side
1191611
2281718
3271817
410199
562013
6122114
7222221
822326
9202429
1042530
1115261
1223275
138283
1424297
15253016
The numbers listed in Table 3 represent the name or number of the node in their respective subnetworks, such as node 4.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, Y.; Dong, J.; Zhao, J.; Qu, Z.; Huang, J. Dynamic Load Redistribution of Power CPS Based on Comprehensive Index of Coupling Node Pairs. Processes 2022, 10, 1937. https://doi.org/10.3390/pr10101937

AMA Style

Wang Y, Dong J, Zhao J, Qu Z, Huang J. Dynamic Load Redistribution of Power CPS Based on Comprehensive Index of Coupling Node Pairs. Processes. 2022; 10(10):1937. https://doi.org/10.3390/pr10101937

Chicago/Turabian Style

Wang, Yunjing, Jie Dong, Jianjun Zhao, Zhengwei Qu, and Jinyi Huang. 2022. "Dynamic Load Redistribution of Power CPS Based on Comprehensive Index of Coupling Node Pairs" Processes 10, no. 10: 1937. https://doi.org/10.3390/pr10101937

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop