[1]罗逸夫,喻志谦,王启瑞,等.一种针对物理层攻防特性的电力系统受击损失分析模型[J].南京师大学报(自然科学版),2026,49(02):98-109.[doi:10.3969/j.issn.1001-4616.2026.02.010]
 Luo Yifu,Yu Zhiqian,Wang Qirui,et al.A Power System Loss Analysis Model Targeting the Offensive and Defensive Characteristics at Physical Layer[J].Journal of Nanjing Normal University(Natural Science Edition),2026,49(02):98-109.[doi:10.3969/j.issn.1001-4616.2026.02.010]
点击复制

一种针对物理层攻防特性的电力系统受击损失分析模型()

《南京师大学报(自然科学版)》[ISSN:1001-4616/CN:32-1239/N]

卷:
49
期数:
2026年02期
页码:
98-109
栏目:
计算机科学与技术
出版日期:
2026-04-10

文章信息/Info

Title:
A Power System Loss Analysis Model Targeting the Offensive and Defensive Characteristics at Physical Layer
文章编号:
1001-4616(2026)02-0098-12
作者:
罗逸夫1喻志谦2王启瑞3曾志红1刘乃通1
1.长沙理工大学电气与信息工程学院,湖南 长沙 410114
2.广东电网有限责任公司珠海供电局,广东 珠海 519075
3.南京师范大学南瑞电气与自动化学院,江苏 南京 210096
Author(s):
Luo Yifu1Yu Zhiqian2Wang Qirui3Zeng Zhihong1Liu Naitong1
1.School of Electrical and Information Engineering,Changsha University of Science and Technology,Changsha 410114,China
2.Zhuhai Power Supply Bureau,Guangdong Power Grid Co.,Ltd.,Zhuhai 519075,China
3.School of Electrical and Automation Engineering,Nanjing Normal University,Nanjing 210096,China
关键词:
鲁棒优化零和博弈电力系统安全防御线性化
Keywords:
robust optimization zero-sum game power system security defense linearization
分类号:
O224
DOI:
10.3969/j.issn.1001-4616.2026.02.010
文献标志码:
A
摘要:
聚焦于电力系统作为关键基础设施在军事行动和恐怖袭击等外部物理攻击过程中的易受击性,区别于信息网络单点攻击过程,构建了一种考虑物理层攻防范围特性的电力系统受击损失鲁棒优化模型. 首先,根据电力系统的地理信息和网架结构,建立了区域受击毁伤关联传播模型. 其次,考虑攻防双方的决策互动,建立了零和博弈双层模型. 最后,利用KKT条件和对非线性约束的逻辑展开实现模型线性化和精确求解. 算例验证表明,本文所提模型能够准确求解电力系统在面对物理攻击者最优进攻方案时的最小损失; 同时,不同防御资源分配方案的优劣会随着攻击者的能力而变化,反映了攻防博弈问题的复杂交互过程,进一步验证模型的合理性.
Abstract:
This study focuses on the vulnerability of power system as critical infrastructure during external physical attacks such as military operations and terrorist strikes, distinguishing it from the process of single-point attacks on information networks. A robust optimization model for power system loss under attack is constructed, considering the scope characteristics of attack and defense at the physical layer. Firstly, based on the geographical information and grid structure of the power system, a model for regional damage correlation propagation is established. Secondly, a two-level zero-sum game model is constructed considering the decision-making interactions between the attacker and the defender. Finally, the model is linearized and solved accurately using the Karush-Kuhn-Tucker(KKT)conditions and logical expansion of nonlinear constraints. Case studies demonstrate that the proposed model can accurately determine the minimum loss of the power system when facing the most dangerous attack plan by a physical attacker. Additionally, the superiority and inferiority of different defense resource allocation schemes vary with the attacker's capabilities, reflecting the complex interaction process of the attack-defense game and further validating the rationality of the model.

参考文献/References:

[1]Soltan S,Zussman G. EXPOSE the line failures following a cyber-physical attack on the power grid[J]. IEEE Transactions on Control of Network Systems,2019,6(1):451-461.
[2]Physical attacks on power grid surge to new peak[EB/OL].(2022-12-26)[2025-03-15]. https://www.politico.com/news/2022/12/26/physical-attacks-electrical-grid-peak-00075216.
[3]Sanginov A. Chemeris,Resilience of Ukrainian energy system:behavioral simulation of the war influence[C]//2023 13th International Conference on Dependable Systems,Services and Technologies(DESSERT),Athens,Greece,2023:1-4.
[4]秦有权,吴爱民,高永红. 电力系统面临的灾害与战争威胁及关键节点防护对策[J]. 防护工程,2018,40(4):64-69.
[5]Zhu Y H,Yan J,Tang Y F,et al. Coordinated attacks against substations and transmission lines in power grids[C]//Proceedings of the IEEE Global Communications Conference,Austin,TX,USA,2014:655-661.
[6]Salmeron J,Wood K,Baldick R. Analysis of electric grid security under terrorist threat[J]. IEEE Transactions on Power Systems,2004,19(2):905-912.
[7]Arroyo J M,Galiana F D. On the solution of the bilevel programming formulation of the terrorist threat problem[J]. IEEE Transactions on Power Systems,2005,20(2):789-797.
[8]Shao C W,Li Y F. Optimal defense resources allocation for power system based on bounded rationality game theory analysis[J]. IEEE Transactions on Power Systems,2021,36(5):4223-4234.
[9]Xiang Y M,Wang L,Yu D,et al. Coordinated attacks against power grids:Load redistribution attack coordinating with generator and line attacks[C]//2015 IEEE Power & Energy Society General Meeting,Denver,CO,USA,2015:1-5.
[10]蔡晔,刘放,曹一家,等. 电力信息物理系统低代价多阶段高危攻击策略研究[J]. 电力系统自动化,2021,45(20):1-8.
[11]阮振,吕林,刘友波,等. 考虑负荷数据虚假注入的电力信息物理系统协同攻击模型[J]. 电力自动化设备,2019,39(2):181-187.
[12]Li Z,Shahidehpour M,Alabdulwahab A,et al. Analyzing locally coordinated cyber-physical attacks for undetectable line outages[J]. IEEE Transactions on Smart Grid,2018,9(1):35-47.
[13]蔡星浦,王琦,黄建业,等. 电力系统网络攻击信息物理双层协同紧急控制方法[J]. 全球能源互联网,2020,3(6):560-568.
[14]Li Y,Quevedo D E,Dey S,et al. A game-theoretic approach to fake-acknowledgment attack on cyber-physical systems[J]. IEEE Transactions on Signal and Information Processing over Networks,2017,3(1):1-11.
[15]钱胜,王琦,颜云松,等. 计及网络攻击影响的安全稳定控制系统风险评估方法[J]. 电力工程技术,2022,41(3):14-21.
[16]刘念,余星火,张建华. 网络协同攻击:乌克兰停电事件的推演与启示[J]. 电力系统自动化,2016,40(6):144-147.
[17]Ranjbar M H,Kheradmandi M,Pirayesh A. Assigning operating reserves in power systems under imminent intelligent attack threat[J]. IEEE Transactions on Power Systems,2019,34(4):2768-2777.
[18]王坤,苏盛,赵奕,等. 变电站自动化系统时间同步协同攻击的检测与防护方法[J]. 电力系统自动化,2021,45(6):231-239.
[19]Liu X,Li Z. Trilevel modeling of cyber attacks on transmission lines[J]. IEEE Transactions on Smart Grid,2017,8(2):720-729.
[20]李田,苏盛,杨洪明,等. 电力信息物理系统的攻击行为与安全防护[J]. 电力系统自动化,2017,41(22):162-167.
[21]杨玉泽,刘文霞,刘耕铭,等. 不完全信息下计及残差污染的虚假数据注入攻击研究[J]. 中国电机工程学报,2025,49(15):7481-7493.
[22]Motto A L,Arroyo J M,Galiana F D. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat[J]. IEEE Transactions on Power Systems,2005,20(3):1357-1365.
[23]Wu X,Conejo A J. An efficient tri-level optimization model for electric grid defense planning[J]. IEEE Transactions on Power Systems,2017,32(4):2984-2994.
[24]俄密集轰炸乌克兰能源设施,法媒:可能是大规模攻势前的针对性措施[EB/OL].(2024-4-29)[2024-10-25]. http://www.news.cn/mil/2024-04/29/c_1212357993.htm.
[25]唐夏菲,孙溶佐,谭玉东,等. 面向IED攻击的多变电站防御-攻击-防御鲁棒优化模型[J]. 电力系统及其自动化学报,2024,36(9):124-134.
[26]Yuan W,Zhao L,Zeng B. Optimal power grid protection through a defender-attacker-defender model[J]. Reliability Engineering and System Safety,2014,121:83-89.
[27]刘肇军,刘宗谦,冯素芬. 有限策略型博弈中的相关策略与具有合约的博弈及其均衡[J]. 南京师大学报(自然科学版),2008,31(3):33-38.
[28]伊娜,徐建军,陈月,等. 基于深度强化学习的多阶段信息物理协同拓扑攻击方法[J]. 电力工程技术,2023,42(4):149-158.
[29]孙旺青,刘晓峰,季振亚,等. 基于分布鲁棒优化的社区型能源系统低碳经济调度[J]. 南京师范大学学报(工程技术版),2022,22(2):15-22.
[30]马圣容,杨正豪. 一类凸二次规划的对偶方法[J]. 南京师大学报(自然科学版),2003,26(1):39-44.

备注/Memo

备注/Memo:
收稿日期:2025-04-23.
基金项目:广西青年创新人才科研专项项目(桂科AD22080052).
通讯作者:罗逸夫,博士研究生,研究方向:电力系统运行优化与受击分析. E-mail:ifluomiou@163.com
更新日期/Last Update: 2026-04-10