基于业务的电力通信网络脆弱性分析评价方法
为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法。利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网络参数,在蓄意攻击和随机攻击的策略下,以链路或节点失效所造成的业务量损失大小来描述网络的脆弱性,并找出网络中相应的脆弱部位。以电力IEEE30节点测试系统作为仿真实例,结果表明,网络业务分布越不均匀,网络脆弱性就会越高,进而网络抵御级联故障的能力就越差。而且在蓄意攻击的情况下,网络脆弱性极高。得出结论,网络业务分布越均匀,网络脆弱性就会越低。针对结论,提出了改进业务路由策略的方法以降低网络的脆弱性。仿真证明了该方法的有效性和可用性,并...
Saved in:
| Published in | 电力系统保护与控制 Vol. 45; no. 24; pp. 138 - 145 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | Chinese |
| Published |
四川大学电气信息学院,四川成都,610065%华北电力大学经济与管理学院,北京102206
16.12.2017
国网新疆电力公司信息通信公司,新疆乌鲁木齐830018 |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1674-3415 |
| DOI | 10.7667/PSPC161974 |
Cover
| Abstract | 为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法。利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网络参数,在蓄意攻击和随机攻击的策略下,以链路或节点失效所造成的业务量损失大小来描述网络的脆弱性,并找出网络中相应的脆弱部位。以电力IEEE30节点测试系统作为仿真实例,结果表明,网络业务分布越不均匀,网络脆弱性就会越高,进而网络抵御级联故障的能力就越差。而且在蓄意攻击的情况下,网络脆弱性极高。得出结论,网络业务分布越均匀,网络脆弱性就会越低。针对结论,提出了改进业务路由策略的方法以降低网络的脆弱性。仿真证明了该方法的有效性和可用性,并可为电力通信网络规划和维护提供参考,具有现实意义。 |
|---|---|
| AbstractList | 为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法.利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网络参数,在蓄意攻击和随机攻击的策略下,以链路或节点失效所造成的业务量损失大小来描述网络的脆弱性,并找出网络中相应的脆弱部位.以电力IEEE30节点测试系统作为仿真实例,结果表明,网络业务分布越不均匀,网络脆弱性就会越高,进而网络抵御级联故障的能力就越差.而且在蓄意攻击的情况下,网络脆弱性极高.得出结论,网络业务分布越均匀,网络脆弱性就会越低.针对结论,提出了改进业务路由策略的方法以降低网络的脆弱性.仿真证明了该方法的有效性和可用性,并可为电力通信网络规划和维护提供参考,具有现实意义. |
| Abstract_FL | In order to solve the limitation of the traditional complex network vulnerability analysis and improve the performance of the network,a vulnerability analysis method of power communication network based on the business is proposed.A power communication network model based on complex network theory is established.Business importance and business traffic are regarded as the network parameters,under the intentional and random attack strategy,the network vulnerability is measured by the loss of business when some nodes or links failed.And the corresponding vulnerable parts in the network is found.IEEE30-bus test system is used as a simulation example.The result shows that the more concentrated the distribution of business on network is,the higher the network vulnerability is and poorer the network is to withstand cascading failure.What's more,the network vulnerability is extremely high under intentional attacks.Based on the analysis,a method which can reduce the network vulnerability by changing routing strategy is given.The simulation results show that the method is effective and usable,can provide reference for the planning and maintenance of power communication network,and has practical significance. |
| Author | 孙静月;崔力民;李珊君 |
| AuthorAffiliation | 四川大学电气信息学院,四川成都610065;华北电力大学经济与管理学院,北京102206;国网新疆电力公司信息通信公司,新疆乌鲁木齐830018 |
| AuthorAffiliation_xml | – name: 四川大学电气信息学院,四川成都,610065%华北电力大学经济与管理学院,北京102206;国网新疆电力公司信息通信公司,新疆乌鲁木齐830018 |
| Author_FL | LI Shanjun SUN Jingyue CUI Limin |
| Author_FL_xml | – sequence: 1 fullname: SUN Jingyue – sequence: 2 fullname: CUI Limin – sequence: 3 fullname: LI Shanjun |
| Author_xml | – sequence: 1 fullname: 孙静月;崔力民;李珊君 |
| BookMark | eNotkDtLw1AYhs9QwVq7-BPENZov5-Q7J-AixRsULKhzycmlpmhiG0TcOoRSOoiCOlRROjmKiKit4p_Jpf4LI3V6l4fngXeOFPzAdwhZAHWZI_KV2m6tAggGZwVSBORMoQz0WVIOQ0-qKgVdR2EUyWryMIpH5_H7IOkPs0GUXb0m_dufziD-HmZfl9n4bhJ1k8_ntPOY9Lrp_cXkKYrHb-nNR_pyPU9mXPMwdMr_WyL7G-t7lS2lurO5XVmrKhZoaCgOMyRIFGBbyLnGhOASQQp0me4KbgsmNV2AyqRDmWaitASzKVi6DdSljkFLZGnqPTV91_Qb9WZw0vbzYr1ptzQVcqcKf9jiFLMOAr_R8nLwuO0dme2zen4AIArNoL9p5WjG |
| ContentType | Journal Article |
| Copyright | Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
| Copyright_xml | – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
| DBID | 2RA 92L CQIGP W92 ~WA 2B. 4A8 92I 93N PSX TCJ |
| DOI | 10.7667/PSPC161974 |
| DatabaseName | 维普期刊资源整合服务平台 中文科技期刊数据库-CALIS站点 中文科技期刊数据库-7.0平台 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 Wanfang Data Journals - Hong Kong WANFANG Data Centre Wanfang Data Journals 万方数据期刊 - 香港版 China Online Journals (COJ) China Online Journals (COJ) |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| DocumentTitleAlternate | Vulnerability evaluation method of electric power communication network based on business |
| DocumentTitle_FL | Vulnerability evaluation method of electric power communication network based on business |
| EndPage | 145 |
| ExternalDocumentID | jdq201724019 674166829 |
| GrantInformation_xml | – fundername: 四川省科技支撑计划项目; 国网新疆电力公司科技项目 funderid: (2017GZ0349); (SGXJXT00TJS1600206) |
| GroupedDBID | -03 2RA 5XA 5XD 92L ALMA_UNASSIGNED_HOLDINGS CCEZO CEKLB CQIGP GROUPED_DOAJ U1G W92 ~WA 2B. 4A8 92I 93N PSX TCJ |
| ID | FETCH-LOGICAL-c1269-e49b1b681dc67724887b61b86f45f87d84b258104be342a6bc84d31c5d13f3e93 |
| ISSN | 1674-3415 |
| IngestDate | Thu May 29 04:03:02 EDT 2025 Wed Feb 14 10:04:01 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 24 |
| Keywords | 业务重要度 业务流量 loss of business network vulnerability business importance 电力通信网 网络脆弱性 electric power communication network 业务损失 business traffic |
| Language | Chinese |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c1269-e49b1b681dc67724887b61b86f45f87d84b258104be342a6bc84d31c5d13f3e93 |
| Notes | SUN Jingyue1, CUI Limin2,3, LI Shanjun1(1. School of Electrical Engineering and Information, Sichuan University, Chengdu 610065, China; 2. College of Economics and Management, North China Electric Power University, Beijing 102206, China;3. State Grid Xinjiang Information & Telecommunication Company, Urumqi 830018, China) electric power communication network; network vulnerability; business importance; business traffic; loss of business In order to solve the limitation of the traditional complex network vulnerability analysis and improve the performance of the network, a vulnerability analysis method of power communication network based on the business is proposed. A power communication network model based on complex network theory is established. Business importance and business traffic are regarded as the network parameters, under the intentional and random attack strategy, the network vulnerability is measured by the loss of business when some nodes or links failed. And the corresponding vulnerable parts in t |
| PageCount | 8 |
| ParticipantIDs | wanfang_journals_jdq201724019 chongqing_primary_674166829 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-12-16 |
| PublicationDateYYYYMMDD | 2017-12-16 |
| PublicationDate_xml | – month: 12 year: 2017 text: 2017-12-16 day: 16 |
| PublicationDecade | 2010 |
| PublicationTitle | 电力系统保护与控制 |
| PublicationTitleAlternate | Relay |
| PublicationTitle_FL | Power System Protection and Control |
| PublicationYear | 2017 |
| Publisher | 四川大学电气信息学院,四川成都,610065%华北电力大学经济与管理学院,北京102206 国网新疆电力公司信息通信公司,新疆乌鲁木齐830018 |
| Publisher_xml | – name: 四川大学电气信息学院,四川成都,610065%华北电力大学经济与管理学院,北京102206 – name: 国网新疆电力公司信息通信公司,新疆乌鲁木齐830018 |
| SSID | ssib003155689 ssib017479473 ssib023166999 ssj0002912115 ssib051374514 ssib002424069 ssib036435463 |
| Score | 2.2483392 |
| Snippet | 为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法。利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网... 为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法.利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网... |
| SourceID | wanfang chongqing |
| SourceType | Aggregation Database Publisher |
| StartPage | 138 |
| SubjectTerms | 业务损失 业务流量 业务重要度 电力通信网 网络脆弱性 |
| Title | 基于业务的电力通信网络脆弱性分析评价方法 |
| URI | http://lib.cqvip.com/qk/90494A/201724/674166829.html https://d.wanfangdata.com.cn/periodical/jdq201724019 |
| Volume | 45 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals issn: 1674-3415 databaseCode: DOA dateStart: 20080101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.doaj.org/ omitProxy: true ssIdentifier: ssj0002912115 providerName: Directory of Open Access Journals |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Na9VAEF-e9eJFFBVrrfTgHqPZZLPZBS_Z1zyKoBRsobfH23y0eHi12l566qEU6UEU1MNTlJ48ioioreJ_4ul91P_CmU2aF0oR9bJMMjvZmcxm9zdJdpaQ69KIlKs8cUKTG4f7Hc_phCZ1jJuLhKfSy2ye7Tt3xdwiv70ULDUaP2t_LW2smxvJ5onrSv7Hq3AO_IqrZP_Bs9VF4QTQ4F8owcNQ_pWPaRxQ1aI6ojHHUsaWkFRFyJIRjRiNQzyU3BLADUqW0jRW9keHQrxVVtazVBWEpqpJY4myUqCUblINLIFSUWivIy1LUBVT5WLlqGXb4iiuQ8sSVCsktE-LrS6P0PBJKoVYTesjBVqlbmrWtgsW8dJGNFZgWWmiq7eMeCICOxSaqApCoDVQy9fWFI4tj5sF7Vy027c0iODlQypbWAFvM3B1_RUJTLvMc4oVnOWoLkLuwHQd1If9Iotl2b09XhvEWZFvpsQDrKh4fKoJhcCP3fP35psAmlWx1dCx1N0C4a6QnjpFTnsw67i1kL-ER7jwuDa-Yj646hiCRRgtx_ASoLgQahw--oAm67sZBMwPeVB-FUck4ilM4Id_8VZ3oMjQi8rfHKuOeUVWVrvLa4CW7OK1bt7pLtdw1sI5crYMkGaiorefJ43NlQvk1uDtfn__Sf9Lb7C7N-ptj55_Guy--rXV6__YG31_Njp4fbi9M_j2Ybj1bvB4Z_jm6eH77f7B5-HLr8OPLy6SxVa80Jxzyn0_nIR5QjkZV4YZAZFUIiD4gykmNIIZKXIe5DJMJTdeIJnLTeZzryNMInnqsyRImZ_7mfIvkYnuaje7TGZ87soEomLjScHdDu6d4OYIixlnGU_ZJJmqLG8_KPK7tCu3TZLp8l60y6f-Uft-uoZdDBzH1JU_Sk-RM-POeJVMrD_cyKYBwa6ba7Yb_AbDHXRS |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%9F%BA%E4%BA%8E%E4%B8%9A%E5%8A%A1%E7%9A%84%E7%94%B5%E5%8A%9B%E9%80%9A%E4%BF%A1%E7%BD%91%E7%BB%9C%E8%84%86%E5%BC%B1%E6%80%A7%E5%88%86%E6%9E%90%E8%AF%84%E4%BB%B7%E6%96%B9%E6%B3%95&rft.jtitle=%E7%94%B5%E5%8A%9B%E7%B3%BB%E7%BB%9F%E4%BF%9D%E6%8A%A4%E4%B8%8E%E6%8E%A7%E5%88%B6&rft.au=%E5%AD%99%E9%9D%99%E6%9C%88%3B%E5%B4%94%E5%8A%9B%E6%B0%91%3B%E6%9D%8E%E7%8F%8A%E5%90%9B&rft.date=2017-12-16&rft.issn=1674-3415&rft.volume=45&rft.issue=24&rft.spage=138&rft.epage=145&rft_id=info:doi/10.7667%2FPSPC161974&rft.externalDocID=674166829 |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F90494A%2F90494A.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fjdq%2Fjdq.jpg |