• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2013, Vol. 35 ›› Issue (3): 168-172.

• 论文 • 上一篇    下一篇

基于CML的变电站自动化系统脆弱性分析

袁磊1,张其林1,2,王先培2,赵永标1   

  1. (1.湖北文理学院数学与计算机学院,湖北 襄阳 441053;2.武汉大学系统集成与故障诊断实验室,湖北 武汉 430072)
  • 收稿日期:2012-04-25 修回日期:2012-07-10 出版日期:2013-03-25 发布日期:2013-03-25
  • 基金资助:

    国家自然科学基金资助项目(61272296);湖北省自然科学基金资助项目(2010CDZ051);湖北省教育厅科学技术基金资助项目(D20092505,B20122503)

Vulnerability analysis of substation
automation system based on CML   

YUAN Lei1,ZHANG Qilin1,2,WANG Xianpei2,ZHAO Yongbiao1   

  1. (1.College of Mathematics and Computer,Hubei University of Arts and Science,Xiangyang 441053;2.System Integration and Fault Diagnosis Laboratory,Wuhan University,Wuhan 430072,China)
  • Received:2012-04-25 Revised:2012-07-10 Online:2013-03-25 Published:2013-03-25

摘要:

以信息技术为基础的电力自动化系统是典型的实时系统,它为电力系统的生产与管理带来了极大的便利,但其技术隐患也影响着电力系统的安全。研究开放的网络环境下实时系统潜在的脆弱性以保证电力系统安全稳定运行有着重要的现实意义。本文首先将基于IEC61850标准的变电站自动化系统中逻辑节点之间的交互关系抽象成一个复杂网络,统计网络的相关特性,结果表明逻辑节点之间的交互关系具有小世界特性。然后基于CML连锁故障模型分析了因变电站自动化系统的脆弱性导致的故障在系统中的传播规律,为变电站自动化系统的设计提供一定的参考价值。

关键词: 耦合映像格子, 变电站自动化, 复杂网络, 脆弱性

Abstract:

ITbased electric power automation system is a typical realtime system.Although it has brought great convenience to the production and management of the power system,its risks also affect the safety of the power system.Researching the potential vulnerability of realtime systems on open network environments has important practical significance to ensure the security and stability of the power system. On the one hand,this paper abstracts the interaction among logical nodes in the substation automation system based on IEC61850 into a complex network and calculates the network characteristics.The results show that the interaction among logical nodes has small world characteristics.On the other hand,this paper analyzes faults' propagation caused by vulnerability in the substation automation system based on CML (coupled map lattices) cascading fault model,which should provide a reference value to the design of the substation automation system.

Key words: coupled map lattices;substation automation;complex network;vulnerability