基于业务的电力通信网络脆弱性分析评价方法

为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法。利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网络参数,在蓄意攻击和随机攻击的策略下,以链路或节点失效所造成的业务量损失大小来描述网络的脆弱性,并找出网络中相应的脆弱部位。以电力IEEE30节点测试系统作为仿真实例,结果表明,网络业务分布越不均匀,网络脆弱性就会越高,进而网络抵御级联故障的能力就越差。而且在蓄意攻击的情况下,网络脆弱性极高。得出结论,网络业务分布越均匀,网络脆弱性就会越低。针对结论,提出了改进业务路由策略的方法以降低网络的脆弱性。仿真证明了该方法的有效性和可用性,并...

Full description

Saved in:
Bibliographic Details
Published in电力系统保护与控制 Vol. 45; no. 24; pp. 138 - 145
Main Author 孙静月;崔力民;李珊君
Format Journal Article
LanguageChinese
Published 四川大学电气信息学院,四川成都,610065%华北电力大学经济与管理学院,北京102206 16.12.2017
国网新疆电力公司信息通信公司,新疆乌鲁木齐830018
Subjects
Online AccessGet full text
ISSN1674-3415
DOI10.7667/PSPC161974

Cover

Abstract 为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法。利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网络参数,在蓄意攻击和随机攻击的策略下,以链路或节点失效所造成的业务量损失大小来描述网络的脆弱性,并找出网络中相应的脆弱部位。以电力IEEE30节点测试系统作为仿真实例,结果表明,网络业务分布越不均匀,网络脆弱性就会越高,进而网络抵御级联故障的能力就越差。而且在蓄意攻击的情况下,网络脆弱性极高。得出结论,网络业务分布越均匀,网络脆弱性就会越低。针对结论,提出了改进业务路由策略的方法以降低网络的脆弱性。仿真证明了该方法的有效性和可用性,并可为电力通信网络规划和维护提供参考,具有现实意义。
AbstractList 为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法.利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网络参数,在蓄意攻击和随机攻击的策略下,以链路或节点失效所造成的业务量损失大小来描述网络的脆弱性,并找出网络中相应的脆弱部位.以电力IEEE30节点测试系统作为仿真实例,结果表明,网络业务分布越不均匀,网络脆弱性就会越高,进而网络抵御级联故障的能力就越差.而且在蓄意攻击的情况下,网络脆弱性极高.得出结论,网络业务分布越均匀,网络脆弱性就会越低.针对结论,提出了改进业务路由策略的方法以降低网络的脆弱性.仿真证明了该方法的有效性和可用性,并可为电力通信网络规划和维护提供参考,具有现实意义.
Abstract_FL In order to solve the limitation of the traditional complex network vulnerability analysis and improve the performance of the network,a vulnerability analysis method of power communication network based on the business is proposed.A power communication network model based on complex network theory is established.Business importance and business traffic are regarded as the network parameters,under the intentional and random attack strategy,the network vulnerability is measured by the loss of business when some nodes or links failed.And the corresponding vulnerable parts in the network is found.IEEE30-bus test system is used as a simulation example.The result shows that the more concentrated the distribution of business on network is,the higher the network vulnerability is and poorer the network is to withstand cascading failure.What's more,the network vulnerability is extremely high under intentional attacks.Based on the analysis,a method which can reduce the network vulnerability by changing routing strategy is given.The simulation results show that the method is effective and usable,can provide reference for the planning and maintenance of power communication network,and has practical significance.
Author 孙静月;崔力民;李珊君
AuthorAffiliation 四川大学电气信息学院,四川成都610065;华北电力大学经济与管理学院,北京102206;国网新疆电力公司信息通信公司,新疆乌鲁木齐830018
AuthorAffiliation_xml – name: 四川大学电气信息学院,四川成都,610065%华北电力大学经济与管理学院,北京102206;国网新疆电力公司信息通信公司,新疆乌鲁木齐830018
Author_FL LI Shanjun
SUN Jingyue
CUI Limin
Author_FL_xml – sequence: 1
  fullname: SUN Jingyue
– sequence: 2
  fullname: CUI Limin
– sequence: 3
  fullname: LI Shanjun
Author_xml – sequence: 1
  fullname: 孙静月;崔力民;李珊君
BookMark eNotkDtLw1AYhs9QwVq7-BPENZov5-Q7J-AixRsULKhzycmlpmhiG0TcOoRSOoiCOlRROjmKiKit4p_Jpf4LI3V6l4fngXeOFPzAdwhZAHWZI_KV2m6tAggGZwVSBORMoQz0WVIOQ0-qKgVdR2EUyWryMIpH5_H7IOkPs0GUXb0m_dufziD-HmZfl9n4bhJ1k8_ntPOY9Lrp_cXkKYrHb-nNR_pyPU9mXPMwdMr_WyL7G-t7lS2lurO5XVmrKhZoaCgOMyRIFGBbyLnGhOASQQp0me4KbgsmNV2AyqRDmWaitASzKVi6DdSljkFLZGnqPTV91_Qb9WZw0vbzYr1ptzQVcqcKf9jiFLMOAr_R8nLwuO0dme2zen4AIArNoL9p5WjG
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 2RA
92L
CQIGP
W92
~WA
2B.
4A8
92I
93N
PSX
TCJ
DOI 10.7667/PSPC161974
DatabaseName 维普期刊资源整合服务平台
中文科技期刊数据库-CALIS站点
中文科技期刊数据库-7.0平台
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
DocumentTitleAlternate Vulnerability evaluation method of electric power communication network based on business
DocumentTitle_FL Vulnerability evaluation method of electric power communication network based on business
EndPage 145
ExternalDocumentID jdq201724019
674166829
GrantInformation_xml – fundername: 四川省科技支撑计划项目; 国网新疆电力公司科技项目
  funderid: (2017GZ0349); (SGXJXT00TJS1600206)
GroupedDBID -03
2RA
5XA
5XD
92L
ALMA_UNASSIGNED_HOLDINGS
CCEZO
CEKLB
CQIGP
GROUPED_DOAJ
U1G
W92
~WA
2B.
4A8
92I
93N
PSX
TCJ
ID FETCH-LOGICAL-c1269-e49b1b681dc67724887b61b86f45f87d84b258104be342a6bc84d31c5d13f3e93
ISSN 1674-3415
IngestDate Thu May 29 04:03:02 EDT 2025
Wed Feb 14 10:04:01 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 24
Keywords 业务重要度
业务流量
loss of business
network vulnerability
business importance
电力通信网
网络脆弱性
electric power communication network
业务损失
business traffic
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1269-e49b1b681dc67724887b61b86f45f87d84b258104be342a6bc84d31c5d13f3e93
Notes SUN Jingyue1, CUI Limin2,3, LI Shanjun1(1. School of Electrical Engineering and Information, Sichuan University, Chengdu 610065, China; 2. College of Economics and Management, North China Electric Power University, Beijing 102206, China;3. State Grid Xinjiang Information & Telecommunication Company, Urumqi 830018, China)
electric power communication network; network vulnerability; business importance; business traffic; loss of business
In order to solve the limitation of the traditional complex network vulnerability analysis and improve the performance of the network, a vulnerability analysis method of power communication network based on the business is proposed. A power communication network model based on complex network theory is established. Business importance and business traffic are regarded as the network parameters, under the intentional and random attack strategy, the network vulnerability is measured by the loss of business when some nodes or links failed. And the corresponding vulnerable parts in t
PageCount 8
ParticipantIDs wanfang_journals_jdq201724019
chongqing_primary_674166829
PublicationCentury 2000
PublicationDate 2017-12-16
PublicationDateYYYYMMDD 2017-12-16
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-12-16
  day: 16
PublicationDecade 2010
PublicationTitle 电力系统保护与控制
PublicationTitleAlternate Relay
PublicationTitle_FL Power System Protection and Control
PublicationYear 2017
Publisher 四川大学电气信息学院,四川成都,610065%华北电力大学经济与管理学院,北京102206
国网新疆电力公司信息通信公司,新疆乌鲁木齐830018
Publisher_xml – name: 四川大学电气信息学院,四川成都,610065%华北电力大学经济与管理学院,北京102206
– name: 国网新疆电力公司信息通信公司,新疆乌鲁木齐830018
SSID ssib003155689
ssib017479473
ssib023166999
ssj0002912115
ssib051374514
ssib002424069
ssib036435463
Score 2.2483392
Snippet 为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法。利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网...
为解决传统复杂网络理论脆弱性分析的局限性并改善网络性能,提出了一种基于业务的电力通信网络脆弱性分析方法.利用复杂网络理论构建网络模型,将业务重要度和业务流量作为网...
SourceID wanfang
chongqing
SourceType Aggregation Database
Publisher
StartPage 138
SubjectTerms 业务损失
业务流量
业务重要度
电力通信网
网络脆弱性
Title 基于业务的电力通信网络脆弱性分析评价方法
URI http://lib.cqvip.com/qk/90494A/201724/674166829.html
https://d.wanfangdata.com.cn/periodical/jdq201724019
Volume 45
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  issn: 1674-3415
  databaseCode: DOA
  dateStart: 20080101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.doaj.org/
  omitProxy: true
  ssIdentifier: ssj0002912115
  providerName: Directory of Open Access Journals
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Na9VAEF-e9eJFFBVrrfTgHqPZZLPZBS_Z1zyKoBRsobfH23y0eHi12l566qEU6UEU1MNTlJ48ioioreJ_4ul91P_CmU2aF0oR9bJMMjvZmcxm9zdJdpaQ69KIlKs8cUKTG4f7Hc_phCZ1jJuLhKfSy2ye7Tt3xdwiv70ULDUaP2t_LW2smxvJ5onrSv7Hq3AO_IqrZP_Bs9VF4QTQ4F8owcNQ_pWPaRxQ1aI6ojHHUsaWkFRFyJIRjRiNQzyU3BLADUqW0jRW9keHQrxVVtazVBWEpqpJY4myUqCUblINLIFSUWivIy1LUBVT5WLlqGXb4iiuQ8sSVCsktE-LrS6P0PBJKoVYTesjBVqlbmrWtgsW8dJGNFZgWWmiq7eMeCICOxSaqApCoDVQy9fWFI4tj5sF7Vy027c0iODlQypbWAFvM3B1_RUJTLvMc4oVnOWoLkLuwHQd1If9Iotl2b09XhvEWZFvpsQDrKh4fKoJhcCP3fP35psAmlWx1dCx1N0C4a6QnjpFTnsw67i1kL-ER7jwuDa-Yj646hiCRRgtx_ASoLgQahw--oAm67sZBMwPeVB-FUck4ilM4Id_8VZ3oMjQi8rfHKuOeUVWVrvLa4CW7OK1bt7pLtdw1sI5crYMkGaiorefJ43NlQvk1uDtfn__Sf9Lb7C7N-ptj55_Guy--rXV6__YG31_Njp4fbi9M_j2Ybj1bvB4Z_jm6eH77f7B5-HLr8OPLy6SxVa80Jxzyn0_nIR5QjkZV4YZAZFUIiD4gykmNIIZKXIe5DJMJTdeIJnLTeZzryNMInnqsyRImZ_7mfIvkYnuaje7TGZ87soEomLjScHdDu6d4OYIixlnGU_ZJJmqLG8_KPK7tCu3TZLp8l60y6f-Uft-uoZdDBzH1JU_Sk-RM-POeJVMrD_cyKYBwa6ba7Yb_AbDHXRS
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%9F%BA%E4%BA%8E%E4%B8%9A%E5%8A%A1%E7%9A%84%E7%94%B5%E5%8A%9B%E9%80%9A%E4%BF%A1%E7%BD%91%E7%BB%9C%E8%84%86%E5%BC%B1%E6%80%A7%E5%88%86%E6%9E%90%E8%AF%84%E4%BB%B7%E6%96%B9%E6%B3%95&rft.jtitle=%E7%94%B5%E5%8A%9B%E7%B3%BB%E7%BB%9F%E4%BF%9D%E6%8A%A4%E4%B8%8E%E6%8E%A7%E5%88%B6&rft.au=%E5%AD%99%E9%9D%99%E6%9C%88%3B%E5%B4%94%E5%8A%9B%E6%B0%91%3B%E6%9D%8E%E7%8F%8A%E5%90%9B&rft.date=2017-12-16&rft.issn=1674-3415&rft.volume=45&rft.issue=24&rft.spage=138&rft.epage=145&rft_id=info:doi/10.7667%2FPSPC161974&rft.externalDocID=674166829
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F90494A%2F90494A.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fjdq%2Fjdq.jpg