期刊论文详细信息
IET Cyber-Physical Systems
Flexible hardware-in-the-loop testbed for cyber physical power system simulation
Heqin Tong1  Lili Zhao1  Manli Li1  Ming Ni1 
[1] NARI Technology Co., Ltd, NARI Group Corporation;
关键词: power system security;    smart power grids;    voltage control;    synchronisation;    computer network security;    power engineering computing;    hardware-in-the loop simulation;    power system simulation;    power system stability;    stability control system;    flexible hardware-in-the-loop testbed;    cyber physical power system simulation;    information system;    communication network;    cyber-attack;    communication co-simulator systems;    nonreal-time synchronisation mechanism;    false data injection attack;    automation voltage control;    communication bit error;    stability control equipment;   
DOI  :  10.1049/iet-cps.2019.0001
来源: DOAJ
【 摘 要 】

Nowadays, the power system is evolving into a complex cyber physical system with the closely merged physical system, information system, and communication network. It is critical to understand the connections between the power and cyber systems, and the potential impact of cyber vulnerability. In this study, a flexible hardware-in-the-loop (HIL) testbed is proposed for studying the cyber physical power system. By using the flexible interface, various co-simulation systems for different purposes are generated. Based on this testbed, three sample co-simulators are built as proofs. First, a HIL power and communication co-simulator with non-real-time synchronisation mechanism is introduced, and a case of false data injection attack on automation voltage control is studied. Then, a real-time power and communication HIL co-simulator is introduced, and a case considering the impact of communication bit error on the stability control system is simulated to demonstrate the performance of stability control equipment. Finally, another co-simulator for simulating the actual cyber-attack on the stability control system is introduced, and a case of a man-in-the-middle attack on the data link is simulated to demonstrate the impact of cyber-attack on the stability control system.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次