Abstract
Modeling of the modern electric power infrastructure (EPI) which is a typical Cyber-Physical System has been an important method to analyzing the possible vulnerabilities in it and promoting its security. A modeling and simulation method based on Multi-Agent System (MAS) is proposed. And the modeling of generation dispatching in cyber-physical interdependent perspective has been completed first. The simulation experiment using the data coming from a real power grid system shows that our system could model the electrical characteristic of the real system and the generation dispatching according to the changing loads in reason.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Siddharth, S., Adam, H., Manimaran, G.: Cyber-physical system security for the electric power grid. Proceedings of the IEEE 100(1), 210–224 (2012)
US-Canada, Power System Outage Task Force — Final Report on the August 14, 2003, Blackout in the United States and Canada: Causes and Recommendations (2004)
Sergey, V.B., Roni, P., Gerald, P., Eugene, S.H., Shlomo, H.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010)
Pourbeik, P., Kundur, P.S., Taylor, C.W.: The Anatomy of a Power Grid Blackout. IEEE Power & Energy Magazineno, 22–29 (2006)
Xiao-Feng, H., Pi, L., Ming-Zhi, Z.: Social Simulation- New area of information warfare researches. Publishing House of Electronics Industry (2010)
May, R.P., Kenneth, R.: Cyber assessment methods for SCADA security. In: 15th Annual Joint ISA POWID/EPRI Control and Instrumentation Conference (2005)
Davis, C.M., Tate, J.E., Okhravi, H., Grier, C., Overbye, T.J., Nicol, D.: SCADA cyber security testbed development. In: 38th North American Power Symposium, pp. 483–488 (2006)
Chee-Wooi, T., Chen-Ching, L., Govindarasu, M.: Vulnerability Assessment of Cybersecurity for SCADA Systems. IEEE Transactions on Power Systems 23(4), 1836–1846 (2008)
Kevin, S., Chen-Ching, L., Jean-Philippe, P.: Assessment of Interactions between Power and Telecommunications Infrastructures. IEEE Transactions on Power Systems 21(3), 1123–1130 (2006)
Chee-Wooi, T., Govindarasu, M., Chen-Ching, L.: Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. IEEE Transactions on Systems. Man. and Cybernetics- Part A: Systems and Humans 40(4), 853–865 (2010)
Laprie, J.-C., Kanoun, K., Kaâniche, M.: Modelling Interdependencies Between the Electricity and Information Infrastructures. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 54–67. Springer, Heidelberg (2007)
Dondossola, G., Garrone, F., Szanto, J.: Supporting cyber risk assessment of power control system with experimental data. In: 2009 IEEE/PES Power Systems Conference and Exposition (2009)
Tranchita, C., Hadjsaid, N., Torres, A.: Overview of the Power Systems Security with Regard to Cyberattacks. In: 2009 4th International Conference on Critical Infrastructures (2009)
Rozel, B., Viziteu, M., Caire, R., Hadjsaid, N., Rognon, J.P.: Towards a common model for studying critical infrastructure interdependencies. In: IEEE Power and Energy Society 2008 General Meeting: Conversion and Delivery of Electrical Energy in the 21st Century (2008)
Silvano, C., Felicita, D.G., Paolo, L.: Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems. International Journal of Critical Infrastructure Protection 4, 24–40 (2011)
Marco, B., Silvano, C., Felicita, D.G., Susanna, D., Giovanna, D., Giuliana, F.: Quantification of dependencies between electrical and information infrastructure. International Journal of Critical Infrastructure Protection 5, 14–27 (2012)
Pederson, P., Dudenhoeffer, D., Hartley, S., Permann, M.: Critical infrastructure interdependency modeling: a survey of U.S. and international research. Technical Report INL/EXT-06-11464, Idaho National Laboratory (2006)
HadjSaid, N., Tranchita, C., Rozel, B., Viziteu, M., Caire, R.: Modeling Cyber and Physical Interdependencies Application in ICT and Power Grids. In: 2009 IEEE/PES Power Systems Conference and Exposition. IEEE Press (2009)
Deepa, K., Xianyong, F., Shan, L., Takis, Z., Karen, L.B.: Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid. In: 2010 First IEEE International Conference on Communications, pp. 244–249 (2010)
Igor, N.F., Andrea, C., Marcelo, M., Alberto, T.: An experimental investigation of malware attacks on SCADA systems. International Journal of Critical Infrastructure Protection 2, 139–145 (2009)
Bush, B., Giguere, P., et al.: NISAC ENERGY SECTOR: Interdependent Energy Infrastructure Simulation System. Technical report, Los Alamos National Laboratory (2003)
Andjelka, K., Drake, E.W., Laurence, R.P.: Cyber and Physical Infrastructure Interdependencies. Technical report, Sandia National Laboratories (2008)
Siddharth, S., Manimaran, G.: Data Integrity attacks and their impacts on SCADA control system. In: IEEE/PES General Meeting (2010)
Ming-Guang, Z., Yu-Wu, C., Qun-Feng, N.: Telecontrol and Dispatching Automation of the Electrical System. China Electric Power Press (2010)
Shi-Zheng, W.: Control and Dispatching Automation of the Electrical System. China Electric Power Press (2008)
Wen-Yuan, L.: Electric Power System functioning economically and in security: models and methods. Chongqing University Press (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, Y., Si, G. (2012). Modeling the Power Generation Dispatching in Cyber-Physical Interdependent Perspective. In: Xiao, T., Zhang, L., Ma, S. (eds) System Simulation and Scientific Computing. ICSC 2012. Communications in Computer and Information Science, vol 327. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34396-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-34396-4_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34395-7
Online ISBN: 978-3-642-34396-4
eBook Packages: Computer ScienceComputer Science (R0)