全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

电力通信网脆弱性分析

DOI: 10.13334/j.0258-8013.pcsee.2014.07.022, PP. 1191-1197

Keywords: 电力通信网,电力业务,业务重要度,网络脆弱性,链路失效模型

Full-Text   Cite this paper   Add to My Lib

Abstract:

电力通信网作为智能电网的支撑网络,其可靠性已成为智能电网智能化和经济、安全运行的先决条件。脆弱性作为网络可靠性的一种有效测度,可以衡量网络在遭受攻击或设备自然失效时的网络性能。提出了一种基于电力业务重要度的电力通信网业务层脆弱性分析方法:针对传统电力业务重要度评价中,专家评分环节产生的主观不确定性,给出了一种以客观指标要求替代专家主观评分的业务重要度评价方法,即特征指标评价法;将业务重要度作为网络参数,在业务层上建立电力通信网网络模型,以链路失效造成的业务重要度损失来衡量网络的脆弱性,并对4种链路失效模型下的电力通信网脆弱性进行了分析,分析结果表明,网络在蓄意攻击下的脆弱性较高,且业务重要度在各链路上的分布越集中,网络的脆弱性越高;以分析结果为基础,提出通过调整路由策略改进电力通信网脆弱性的方法并应用于实例网络,仿真结果证明了方法的有效性。

References

[1]  李思.基于业务重要度的电力通信网可靠性评估[D].保定:华北电力大学, 2010.Li Si.The reliability evaluation of power communication networks based on service importance[D].Baoding, China:North China Electric Power University, 2010(in Chinese).
[2]  中国南方电网有限责任公司.Q/CSG 110020-2011 南方电网通信网络生产应用接口技术规范[S].广东:中国南方电网系统运行部, 2012.China Southern Power Grid Corporation.Q/CSG 110020-2011 Application of communication network interface technical specifications of CSG[S].Guangdong:System Operation Department of CSG, 2012(in Chinese).
[3]  Vardi Y, Zhang Cun Hui.Measures of network vulnerability[J].IEEE Signal Processing Letters, 2007, 14(5):313-316.
[4]  Peng Wei, Li Zimu, Liu Yujing, et al.Assessing the vulnerability of network topologies under large-scale regional failures[J].IEEE Journal of Communications and Networks, 2012, 14(4):451-460.
[5]  Wang Xiaoliang, Jiang Xiaohong, Pattavina A.Assessing network vulnerability under probabilistic region failure model[C]//IEEE 12th International Conference on High Performance Switching and Routing (HPSR).Cartagena, Spain:IEEE, 2011.
[6]  丁道奇.复杂大电网安全性分析:智能电网的概念与实现[M].北京:中国电力出版社, 2010:306.Ding Daoqi.Security analysis of large and complex grid:the concepts and the realization of smart grid [M].Beijing:China Electric Power Press, 2010:306(in Chinese).
[7]  Hauser C H, Bakken D E, Bose A.A failure to communicate:next generation communication requirements, technologies, and architecture for the electric power grid[J].IEEE Power & Energy Magazine, 2005, 3(2):47-55.
[8]  Zhaoxia X, Manimaran G, Vittal V.An information architecture for future power systems and its reliability analysis[J].IEEE Transactions on Power Systems, 2002, 17(3):857-863.
[9]  Chvatal V.Tough graphs and Hamiltonian circuits [J].Discrete Mathematics, 1973, 5(3):215-228.
[10]  Barefoot C A, Entringer R, Swart H.Vulnerability in graphs-a comparative survey[J].Journal of Combinatorial Mathematics and Combinatorial Computing, 1987(1):13-22.
[11]  Cozzens M, Moazzami D, Stueckle S.The tenacity of a graph[C]//Seventh International Conference on the Theory and Applications of Graphs.New York, USA:Wiley, 1995:1111-1122.
[12]  Jung H A.Class of posets and corresponding comparability graphs[J].Journal of Combinatorial Theory Series B, 1978, 24(2):125-133.
[13]  Bassalygo L A, Pinsker M S.The complexity of an optimal non-blocking communication scheme without reorganization[J].Problemy Peredaci Informacii, 1973, 9(1):84-87.
[14]  Wu J, Barahona M, Tan Y J, et al.Natural connectivity of complex networks[J].Chinese Physics Letters, 2010, 27(7):295-298.
[15]  Dinh T N, Ying Xuan, Thai M T, et al.On new approaches of assessing network vulnerability: hardness and approximation[J].IEEE/ACM Transactions on Networking, 2012, 20(2):609-619.
[16]  彭静, 卢继平, 汪洋, 等.广域测量系统通信主干网的风险评估[J].中国电机工程学报, 2010, 30(5):84-90.Peng Jing, Lu Jiping, Wang Yang, et al.Risk assessment of backbone communication network in WAMS [J].Proceedings of the CSEE, 2010, 30(5):84-90(in Chinese).
[17]  刘文霞, 罗红, 张建华.WAMS通信业务的系统有效性建模与仿真[J].中国电机工程学报, 2012, 32(16):144-150.Liu Wenxia, Luo Hong, Zhang Jianhua.Modeling and simulation on effectiveness of communication services system in WAMS[J].Proceedings of the CSEE, 2012, 32(16):144-150(in Chinese).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133