智能变电站通信网络的广义信源和流量计算模型
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Generic Message Source and Flow Calculation Model for Communication Network in Smart Substation
  • 作者:章坚民 ; 张嘉誉 ; 倪明 ; 李康毅 ; 金乃正 ; 杨才明
  • 英文作者:ZHANG Jianmin;ZHANG Jiayu;NI Ming;LI Kangyi;JIN Naizheng;YANG Caiming;School of Automation, Hangzhou Dianzi University;NARI Group Corporation (State Grid Electric Power Research Institute);State Grid Shaoxing Electric Power Supply Company;
  • 关键词:信息物理融合 ; 广义信源模型 ; 通信网络流量计算 ; 网络演算法 ; OPNET
  • 英文关键词:cyber physical fusion;;generic message source model;;message flow calculation for communication system;;network calculus method;;OPNET
  • 中文刊名:DLXT
  • 英文刊名:Automation of Electric Power Systems
  • 机构:杭州电子科技大学自动化学院;南瑞集团有限公司(国网电力科学研究院有限公司);国网绍兴供电公司;
  • 出版日期:2019-04-28 11:35
  • 出版单位:电力系统自动化
  • 年:2019
  • 期:v.43;No.659
  • 基金:国家自然科学基金委员会-国家电网公司智能电网联合基金(U1866209);; 国家自然科学基金资助项目(51677047);; 国网浙江省电力有限公司科技项目(SGTYHT/17-JS-201)资助~~
  • 语种:中文;
  • 页:DLXT201913018
  • 页数:13
  • CN:13
  • ISSN:32-1180/TP
  • 分类号:210-222
摘要
对于智能变电站而言,用于预测各类场景下通信网络流量的计算模型至关重要。文中首先提出了基于信息物理融合的广义信源模型,包括一次系统状态激励的电力二次智能装置报文模型、信息设备物理故障信源模型以及寄生的拒绝服务(DoS)攻击信源模型等,形成信息设备的综合信源报文模型。然后,在网络演算链路汇流方法的基础上,给出了基于广义信源的智能电网信息流流量分布矩阵定义以及演算方法,形成了明确、详细的定量分析计算流程。最后,对过程层信息设备故障、DoS攻击及一次侧设备故障的大小方式等典型运行场景,分别进行理论计算算例验证,并对其进行OPNET仿真验证,证明了所提方法的有效性。
        The model used to predict the message flow of communication network in various scenarios is very important for smart substation. A generic source model based on cyber physical fusion is firstly proposed, including spontaneous message model of intelligent electronic device excited by the state of primary power system in secondary side, source model of physical fault in cyber devices and parasitic denial of service(DoS) attack, which establishes an integrated spontaneous message model of cyber devices. Then, based on the network calculus and transmission path of junction flow method, the distribution matrix definition and calculus method of smart grid information flow based on the generic message source are put forward, which forms a clear and detailed quantitative analysis and calculation process. Finally, some typical scenarios, such as cyber device failure in process layer, DoS attack and primary circuit faults in small or large operation modes, are validated as theoretical calculation examples, and OPNET simulation results show the effectiveness of the proposed method.
引文
[1] DERLER P,LEE E A,VINCENTELLI A S.Modeling cyber-physical systems[J].Proceedings of the IEEE,2012,100(1):13-28.
    [2] YOO H,SHON T.Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850:vulnerabilities,security requirements,and security architecture[J].Future Generation Computer Systems,2016,61:128-136.
    [3] 赵俊华,文福拴,薛禹胜,等.电力CPS的架构及其实现技术与挑战[J].电力系统自动化,2010,34(16):1-7.ZHAO Junhua,WEN Fushuan,XUE Yusheng,et al.Cyber physical power systems:architecture,implementation techniques and challenges[J].Automation of Electric Power Systems,2010,34(16):1-7.
    [4] 薛禹胜,李满礼,罗剑波,等.基于关联特性矩阵的电网信息物理系统耦合建模方法[J].电力系统自动化,2018,42(2):11-19.DOI:10.7500/AEPS20170705006.XUE Yusheng,LI Manli,LUO Jianbo,et al.Coupling modeling method for cyber physical power systems based on correlation characteristic matrix[J].Automation of Electric Power Systems,2018,42(2):11-19.DOI:10.7500/AEPS 20170705006.
    [5] EROL-KANTARCI M,MOUFTAH H T.Energy-efficient information and communication infrastructures in the smart grid:a survey on interactions and open issues[J].IEEE Communications Surveys and Tutorials,2015,17(1):179-197.
    [6] HUU-DUNG N,HYO-SIK Y.Latency and traffic reduction for process-level network in smart substation based on high-availability seamless redundancy[J].IEEE Transactions on Industrial Electronics,2016,63(4):2181-2189.
    [7] GAO Jixing,TONG Weiming,JIN Xianji,et al.Study on communication service strategy for congestion issue in smart substation communication network[J].Access IEEE,2018,6:44934-44943.
    [8] XU Luoyun,LI Haiyu,CHEN Linwei,et al.Assessment and analysis of different process bus redundancy networks performance for IEC 61850-based digital substation[J].The Journal of Engineering,2018,15:856-860.
    [9] SIDHU T S,YIN Y.Modelling and simulation for performance evaluation of IEC 61850-based substation communication systems[J].IEEE Transactions on Power Delivery,2007,22(3):1482-1489.
    [10] KANABAR M G,SIDHU T S,ZADEH M R D.Laboratory investigation of IEC 61850-9-2-based busbar and distance relaying with corrective measure for sampled value loss/delay[J].IEEE Transactions on Power Delivery,2011,26(4):2587-2595.
    [11] 杨安,孙利民,王小山,等.工业控制系统入侵检测技术综述[J].计算机研究与发展,2016,53(9):2039-2054YANG An,SUN Limin,WANG Xiaoshan,et al.Intrusion detection techniques for industrial control systems[J].Journal of Computer Research and Development,2016,53(9):2039-2054.
    [12] SPEROTTO A,SCHAFFRATH G,SADRE R,et al.An overview of IP flow-based intrusion detection[J].IEEE Communications Surveys & Tutorials,2010,12(3):343-356.
    [13] HADELI H,SCHIERHOLZ R,BRAENDLE M,et al.Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration[C]// 2009 IEEE Conference on Emerging Technologies & Factory Automation,Piscataway,September 22-25,2009,Mallorca,Spain.
    [14] HADELI H,SCHIERHOLZ R,BRAENDLE M,et al.Generating configuration for missing traffic detector and security measures in industrial control systems based on the system description files[C]// Proceedings of the IEEE Homeland Security Technologies,May 11-12,2009,Boston,USA.
    [15] Snort入侵检测系统简介[EB/OL].[2015-08-31].https://www.jianshu.com/p/113345bbf2f7.Introduction to Snort intrusion detection system[EB/OL].[2015-08-31].https://www.jianshu.com/p/113345bbf2f7.
    [16] TONG Weiming,GAO Jixing,LI Zhongwei,et al.A protection method based on message identification and flow monitoring for managing the congestion arising from network attacks on smart substation[J].IEEE Communications Letters,2018,22(11):2214-2217.
    [17] 赵俊华,文福拴,薛禹胜,等.电力信息物理融合系统的建模分析与控制研究框架[J].电力系统自动化,2011,35(16):1-8.ZHAO Junhua,WEN Fushuan,XUE Yusheng,et al.Modeling analysis and control research framework of cyber physical power systems[J].Automation of Electric Power Systems,2011,35(16):1-8.
    [18] XIN S,GUO Q,SUN H,et al.Cyber-physical modeling and cyber-contingency assessment of hierarchical control systems[J].IEEE Transactions on Smart Grid,2015,6(5):2375-2385.
    [19] 郭庆来,辛蜀骏,孙宏斌,等.电力系统信息物理融合建模与综合安全评估:驱动力与研究构想[J].中国电机工程学报,2016,36(6):1481-1489.GUO Qinglai,XIN Shujun,SUN Hongbin,et al.Power system cyber-physical modelling and security assessment:motivation and ideas[J].Proceedings of the CSEE,2016,36(6):1481-1489.
    [20] 王海柱,张延旭,蔡泽祥,等.智能变电站过程层网络信息流潮流模型与计算方法[J].电网技术,2013,37(9):2602-2607.WANG Haizhu,ZHANG Yanxu,CAI Zexiang,et al.Information flow calculation model and method for process bus network in smart substation[J].Power System Technology,2013,37(9):2602-2607.
    [21] ZHANG Y,CAI Z,LI X,et al.Analytical modeling of traffic flow in the substation communication network[J].IEEE Transactions on Power Delivery,2015,30(5):2119-2127.
    [22] 何瑞文,汪东,张延旭,等.智能电网信息流的建模和静态计算方法研究[J].中国电机工程学报,2016,36(6):1527-1535.HE Ruiwen,WANG Dong,ZHANG Yanxu,et al.Modeling and static calculation method of the information flow on smart grid[J].Proceedings of the CSEE,2016,36(6):1527-1535.
    [23] CHEN Yi,ZHANG Jianmin,HAN Qiguo,et al.Message flow modeling analysis and application for digital substation process layer network[C]// IEEE 7th Annual International Conference on CYBER Technology in Automation,Control,and Intelligent Systems (CYBER),July 31-August 4,2017,Honolulu,USA.
    [24] 陈益.基于信息流模型和时滞电网稳定的智能电网实时数据加密最大延时计算[D].杭州:杭州电子科技大学,2018.CHEN Yi.Maximum delay calculation of real time data encryption for smart grid based on information flow model and time-delay power grid stability[D].Hangzhou:Hangzhou Dianzi University,2018.
    [25] 龙华.OPNET Modeler与计算机网络仿真[M].西安:西安电子科技大学出版社,2006.LONG Hua.OPNET Modeler and computer network simulation[M].Xi’an:Xi’an Electronic Science and Technology University Press,2006.
    [26] 张志丹,黄小庆,曹一家,等.基于虚拟局域网的变电站综合数据流分析与通信网络仿真[J].电网技术,2011,35(5):204-209.ZHANG Zhidan,HUANG Xiaoqing,CAO Yijia,et al.Comprehensive data flow analysis and communication network simulation for virtual local area network-based substation[J].Power System Technology,2011,35(5):204-209.
    [27] ZHANG Zhidan,HUANG Xiaoqing,BJ?M K,et al.Modeling and simulation of data flow for VLAN-based communication in substations[J].IEEE Systems Journal,2017,11(4):2467-2478.
    [28] 黄明辉,邵向潮,张弛,等.基于OPNET的智能变电站继电保护建模与仿真[J].电力自动化设备,2013,33(5):144-149.HUANG Minghui,SHAO Xiangchao,ZHANG Chi,et al.Modeling and simulation of relay protection for intelligent substation based on OPNET[J].Electric Power Automation Equipment,2013,33(5):144-149.
    [29] 蔡煜,蔡泽祥,王奕,等.配电网广域保护控制通信网络建模与组网策略[J].电力自动化设备,2018,38(4):183-189.CAI Yu,CAI Zexiang,WANG Yi,et al.Modeling and networking strategy of communication network of wide-area protection and control for distribution network[J].Electric Power Automation Equipment,2018,38(4):183-189.
    [30] ALI I,HUSSAIN S.Communication design for energy management automation in microgrid[J].IEEE Transactions on Smart Grid,2018,9(3):2055-2064
    [31] 胡春潮,侯艾君,马凯,等.基于OPNET的电网SCADA系统通信建模与仿真[J].电力系统保护与控制,2016,44(10):54-59.HU Chunchao,HOU Aijun,MA Kai,et al.Communication modeling and simulation of SCADA system of power grid based on OPNET[J].Power System Protection and Control,2016,44(10):54-59.
    [32] GUO J,HUG G,TONGUZ O K.On the role of communications plane in distributed optimization of power systems[J].IEEE Transactions on Industrial Informatics,2018,14(7):2903-2913.
    [33] 汤奕,王琦,邰伟,等.基于OPAL-RT和OPNET的电力信息物理系统实时仿真[J].电力系统自动化,2016,40(23):15-21.TANG Yi,WANG Qi,TAI Wei,et al.Real-time simulation of cyber-physical power system based on OPAL-RT and OPNET[J].Automation of Electric Power Systems,2016,40(23):15-21.
    [34] CRUZ R L.Quality of service guarantees in virtual circuit switched networks[J].IEEE Journal on Selected Areas in Communications,1995,13(6):1048-1056.
    [35] CHANG Chengshang.Performance guarantees in communication networks[J].European Transactions on Telecommunications,2001,12(4):357-358.
    [36] 李目海.基于流量的分布式拒绝服务攻击检测[D].上海:华东师范大学,2010.LI Muhai.Distributed denial-of-service attack detection based on traffic[D].Shanghai:East China Normal University,2010.
    [37] 马涛,单洪.移动Ad Hoc网络中DoS攻击的建模与仿真[J].计算机工程,2009,35(5):4-6.MA Tao,SHAN Hong.Modeling and simulation of DoS attacks in mobile Ad Hoc network[J].Computer Engineering,2009,35(5):4-6.
    [38] 龚鑫.基于OPNET的TCP-SYN泛洪攻击设计与仿真[D].北京:北京邮电大学,2014.GONG Xin.Modeling and simulation of TCP-SYN flood attack based on OPNET[D].Beijing:Beijing University of Posts and Telecommunications,2014.
    [39] 刘运.DDoS Flooding攻击检测技术研究[D].长沙:国防科学技术大学,2011.LIU Yun.Research on the detection methods for distributed denial-of-service flooding attacks[D].Changsha:National University of Defense Technology,2011.
    [40] 余越,周春霞,詹荣荣,等.智能变电站继电保护装置网络压力产生原因及测试方法研究[J].电力系统保护与控制,2017,45(18):156-162.YU Yue,ZHOU Chunxia,ZHAN Rongrong,et al.Research on network stress causes and test method of relay protection in smart substation[J].Power System Protection and Control,2017,45(18):156-162.