Font Size: a A A

Cloud Edge Collaborative Structure Modeling And Security Risk Analysis For Power Internet Of Thingsby

Posted on:2022-08-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y F SiFull Text:PDF
GTID:2492306731986989Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the Power of things,the network scale expands unceasingly,the structure characteristics of Power System has become increasingly complex,a grid side more and more of the sensing and control equipment,secondary side more and more complex computing and decision making equipment and modern communication network,to form the complex Power of coupling degree is more and more deep information Physical System(Cyber-Physical Power systems,CPPS).The traditional centralized control CPPS model has gradually been unable to adapt to the large and complex data scale and structure of the power grid.So,the significance of establishing a more practical power information physical dependent network model becomes more prominent.Based on existing research results on the basis of the study and research,based on the national grid company pan in power network hierarchy principle of the construction of the Internet of things,strive to build based on the cloud side collaborative data processing of the structure of the electric power network architecture,to create a new kind of focus-the joint control CPPS uniform calculation model,and considering the situation of the typical network attack will promote the model for the risk analysis model.(1)Based on the specific analysis of the four-layer structural system framework of the electric power Internet of Things,we propose a centralized and distributed joint control mode of the power system based on the cloud-edge collaborative structure,which is more suitable for the multi-task parallel and fast response characteristics of the electric power Internet of Things;On the basis of the four-layer structure division,the unit level CPPS topology model is firstly established by using the node-branch association matrix,which is based on the concept of "nodes" describing the network state parameters and "branches" describing the node connection relationship.Then,according to the central-distributed joint control mode,multiple unit models are integrated into the whole network topology model.Finally,IEEE39 node system is taken as an example to explain the establishment process of topology model and analyze the advantages of cloud edge collaboration structure.(2)Analyze the weight characteristics of branches of each layer of the power Internet of Things,and build the weight model of each layer under the goal of secondary voltage regulation control in combination with the three-machine and ninenode power system;Based on the connection logic of each layer of the unit level CPPS model,the weight models of each layer were combined into the edge calculation group weight model with computing ability.Then according to the specific control objects and synergistic logic,the multi-unit or whole-network synergistic model is established.Finally,the weight model was established based on the IEEE 39-node system topology model,and the accuracy and practicability of the model were verified by the pressure regulation calculation based on the dominant node.(3)The influence of information network failure caused by typical network attacks on the information side on the state monitoring and voltage regulation process of the power network is analyzed,and the change rule of the elements of the weight model in the face of network attacks is studied.Based on this,the weight model is extended to the risk analysis model;The simulation network attack is applied to IEEE39 node system,and the influence of different types of attacks on the power system is analyzed quantitatively,and the applicability of the risk analysis model is verified.
Keywords/Search Tags:Electric Internet of Things, Cloud edge collaboration, Centraldistributed joint control, Information physics system modeling, Unit level CPPS model, Weight model, Injection of false data, Blocking data transmission, Risk analysis model
PDF Full Text Request
Related items