期刊
IEEE TRANSACTIONS ON POWER SYSTEMS
卷 36, 期 6, 页码 5185-5197出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPWRS.2021.3070390
关键词
Topology; Network topology; Contracts; Blockchain; Distribution networks; Data privacy; Measurement errors; Dynamic topology awareness (DTA); distribution networks; blockchain; data privacy; contract settlement
资金
- National Natural Science Foundation of China [51707117]
The paper proposes a blockchain-based privacy-protecting approach for identifying topology changes and cyber anomalies in distribution networks. Through partitioning the network, checking data consistency, using consensus algorithms and voting mechanisms, the method achieves comprehensive monitoring and protection from the physical layer to the business layer.
With growing complexity and uncertainty from distributed generations and active customers, distribution networks are facing more unexpected events and topology changes; while very limited measurements may degrade the observability of distribution system states and endanger the security of the system. Meanwhile, massive data from various types of users (if they can be used), can be valuable for power utilities. This makes privacy and data security a more critical issue, while being endowed with operation and market flexibilities. Thus, we propose a blockchain-based privacy-protecting approach for Dynamic Topology Awareness (DTA) to distinguish topology changes from cyber anomalies, including physical, cyber and business layers. At the bottom layer (physical layer), the distribution network is partitioned into subareas and tie-line areas, coping with local data from measurement devices or users. Estimated border values from parallel local estimations would be examined through data consistency checking. And DTA consensus algorithm might be triggered, querying historical status stored as blockchain contracts for anomalies detections and new block formations. Voting mechanism is then adopted to verify new blocks from data tampering. The performance of the proposed DTA approach is validated through simulations to identify topology changes and cyber anomalies, with additional discussions on the trade-off between DTA sensitivity and estimation accuracy.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据