Full Text:   <688>

Summary:  <347>

CLC number: TM711; TP11

On-line Access: 2016-05-04

Received: 2015-12-13

Revision Accepted: 2016-04-10

Crosschecked: 2016-04-19

Cited: 3

Clicked: 1342

Citations:  Bibtex RefMan EndNote GB/T7714


Zhi-yun Lin


-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.5 P.465-478


On modeling of electrical cyber-physical systems considering cyber security

Author(s):  Yi-nan Wang, Zhi-yun Lin, Xiao Liang, Wen-yuan Xu, Qiang Yang, Gang-feng Yan

Affiliation(s):  College of Electrical Engineering, Zhejiang University, Hangzhou 310027, China; more

Corresponding email(s):   11410065@zju.edu.cn, linz@zju.edu.cn

Key Words:  Cyber-physical systems, Cyber attacks, Cascading failure analysis, Smart grid

Yi-nan Wang, Zhi-yun Lin, Xiao Liang, Wen-yuan Xu, Qiang Yang, Gang-feng Yan. On modeling of electrical cyber-physical systems considering cyber security[J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17(5): 465-478.

@article{title="On modeling of electrical cyber-physical systems considering cyber security",
author="Yi-nan Wang, Zhi-yun Lin, Xiao Liang, Wen-yuan Xu, Qiang Yang, Gang-feng Yan",
journal="Frontiers of Information Technology & Electronic Engineering",
publisher="Zhejiang University Press & Springer",

%0 Journal Article
%T On modeling of electrical cyber-physical systems considering cyber security
%A Yi-nan Wang
%A Zhi-yun Lin
%A Xiao Liang
%A Wen-yuan Xu
%A Qiang Yang
%A Gang-feng Yan
%J Frontiers of Information Technology & Electronic Engineering
%V 17
%N 5
%P 465-478
%@ 2095-9184
%D 2016
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1500446

T1 - On modeling of electrical cyber-physical systems considering cyber security
A1 - Yi-nan Wang
A1 - Zhi-yun Lin
A1 - Xiao Liang
A1 - Wen-yuan Xu
A1 - Qiang Yang
A1 - Gang-feng Yan
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 17
IS - 5
SP - 465
EP - 478
%@ 2095-9184
Y1 - 2016
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1500446

This paper establishes a new framework for modeling electrical cyber-physical systems (ECPSs), integrating both power grids and communication networks. To model the communication network associated with a power transmission grid, we use a mesh network that considers the features of power transmission grids such as high-voltage levels, long-transmission distances, and equal importance of each node. Moreover, bidirectional links including data uploading channels and command downloading channels are assumed to connect every node in the communication network and a corresponding physical node in the transmission grid. Based on this model, the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service (DoS) attacks, replay attacks, and false data injection attacks. Control strategies such as load shedding and relay protection are also verified using this model against these attacks.

This paper describes a new model for the electrical cyber-physical systems (ECPSs) for the power grid. The authors extend control protocols to the proposed model and study several attack scenarios through numerical simulation. The new model incorporates power grid with communication network by taking advantages of their special characteristics. Specifically, the high voltage level, long transmission distance, and a meshed topology for the communication network.




Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article


[1]Baldick, R., Chowdhury, B., Dobson, I., et al., 2008. Initial review of methods for cascading failure analysis in electric power transmission systems. Proc. IEEE Power and Energy Society General Meeting, p.1-8.

[2]Bao, Z.J., Cao, Y.J., Wang, G.Z., et al., 2009. Analysis of cascading failure in electric grid based on power flow entropy. Phys. Lett. A, 373(34):3032-3040.

[3]Bishop, M., 2002. Computer Security: Art and Science. Addison-Wesley Prefessional, USA.

[4]Buldyrev, S.V., Parshani, R., Paul, G., et al., 2010. Catastrophic cascade of failures in interdependent networks. Nature, 464:1025-1028.

[5]Buldyrev, S.V., Shere, N.W., Cwilich, G.A., 2011. Interdependent networks with identical degrees of mutually dependent nodes. Phys. Rev. E, 83:016112.

[6]Chakrabarti, A., Manimaran, G., 2002. Internet infrastructure security: a taxonomy. IEEE Netw., 16(6):13-21.

[7]Chen, P.Y., Cheng, S.M., Chen, K.C., 2012. Smart attacks in smart grid communication networks. IEEE Commun. Mag., 50(8):24-29.

[8]Dobson, I., Carreras, B.A., Lynch, V.E., et al., 2001. An initial model for complex dynamics in electric power system blackouts. Proc. Hawaii Int. Conf. on System Sciences, p.1-9.

[9]Gungor, V.C., Sahin, D., Kocak, T., et al., 2011. Smart grid technologies: communication technologies and standards. IEEE Trans. Ind. Inform., 7(4):529-539.

[10]Hu, Y., Ksherim, B., Cohen, R., et al., 2011. Percolation in interdependent and interconnected networks: abrupt change from second- to first-order transitions. Phys. Rev. E, 84:066116.

[11]Huang, T.E., Sun, H.B., Guo, Q.L., et al., 2015. Knowledge management and security early warning based on big simulation data in power grid operation. Power Syst. Technol., 39(11):3080-3087 (in Chinese).

[12]Huang, X., Gao, J., Buldyrev, S.V., et al., 2011. Robustness of interdependent networks under targeted attack. Phys. Rev. E, 83:065101.

[13]Koç, Y., Warnier, M., Mieghem, P.V., et al., 2014. The impact of the topology on cascading failures in a power grid model. Phys. A, 402:169-179.

[14]Liu, Y., Ning, P., Reiter, M.K., 2011. False data injection attacks against state estimation in electric power grids. ACM Trans. Inform. Syst. Secur., 14(1):13.1-13.33.

[15]Morris, R.G., Barthelemy, M., 2013. Interdependent networks: the fragility of control. Sci. Reports, 3:2764.1-2764.5.

[16]Parandehgheibi, M., Modiano, E., Hay, D., 2014. Mitigating cascading failures in interdependent power grids and communication networks. Proc. IEEE Int. Conf. on Smart Grid Communications, p.242-247.

[17]Parshani, R., Buldyrev, S.V., Havlin, S., 2010. Interdependent networks: reducing the coupling strength leads to a change from a first to second order percolation transition. Phys. Rev. Lett., 105:048701.

[18]Pasqualetti, F., Dörfler, F., Bullo, F., 2013. Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Contr., 58(11):2715-2729.

[19]Schneider, C.M., Yazdani, N., Araújo, N.A.M., et al., 2013. Towards designing robust coupled networks. Sci. Reports, 3:1969.1-1969.7.

[20]Shao, J., Buldyrev, S.V., Havlin, S., et al., 2011. Cascade of failures in coupled network systems with multiple support-dependence relations. Phys. Rev. E, 83:036116.

[21]Shin, D.H., Qian, D., Zhang, J., 2014. Cascading effects in interdependent networks. IEEE Netw., 28(4):82-87.

[22]Stott, B., Jardim, J., Alsac, O., 2009. DC power flow revisited. IEEE Trans. Power Syst., 24(3):1290-1300.

[23]Teixeira, A., Shames, I., Sandberg, H., et al., 2015a. A secure control framework for resource-limited adversaries. Automatica, 51:135-148.

[24]Teixeira, A., Sou, K.C., Sandberg, H., et al., 2015b. Secure control systems: a quantitative risk management approach. IEEE Contr. Syst., 35(1):24-45.

[25]Wang, S.Z., 2012. Power System Control and Dispatching Automation (2nd Ed.). China Electric Power Press, China (in Chinese).

[26]Wei, J., Kundur, D., Zourntos, T., et al., 2014. A flocking-based paradigm for hierarchical cyber-physical smart grid modeling and control. IEEE Trans. Smart Grid, 5(6):2687-2700.

[27]Yang, Q., Barria, J.A., Green, T.C., 2011. Communication infrastructures for distributed control of power distribution networks. IEEE Trans. Ind. Inform., 7(2):316-327.

[28]Zhao, F., Sun, H.B., Huang, T.E., et al., 2015. Design and engineering application of automatic discovery system for critical flowgates and security operation rules in power grids. Autom. Elect. Power Syst., 39(1):117-123 (in Chinese).

Open peer comments: Debate/Discuss/Question/Opinion


Please provide your name, email address and a comment

Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE