Risk Assessment Method for CPS-Based Distributed Generation Cluster Control in Active Distribution Networks Under Cyber Attacks

In modern power systems, distributed generation (DG) clusters such as wind and solar resources are increasingly being integrated into active distribution networks through DG cluster control, which enhances the economic efficiency and adaptability of the DGs. However, cyber attacks on cyber–physical...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:Sensors
المؤلفون الرئيسيون: Jinxin Ouyang, Fan Mo, Fei Huang, Yujie Chen
التنسيق: مقال
اللغة:الإنجليزية
منشور في: MDPI AG 2025-10-01
الموضوعات:
الوصول للمادة أونلاين:https://www.mdpi.com/1424-8220/25/19/6053
الوصف
الملخص:In modern power systems, distributed generation (DG) clusters such as wind and solar resources are increasingly being integrated into active distribution networks through DG cluster control, which enhances the economic efficiency and adaptability of the DGs. However, cyber attacks on cyber–physical systems (CPS) may disable control links within the DG cluster, leading to the loss of control over slave DGs and resulting in power deficits, thereby threatening system stability. Existing CPS security assessment methods have limited capacity to capture cross-domain propagation effects caused by cyber attacks and lack a comprehensive evaluation framework from the attacker’s perspective. This paper establishes a CPS system model and control–communication framework and then analyzes the cyber–physical interaction characteristics under DG cluster control. A logical model of cyber attack strategies targeting DG cluster inverters is proposed. Based on the control topology and master–slave logic, a probabilistic failure model for DG cluster control is developed. By considering power deficits at cluster point of common coupling (PCC) and results in internal network of the DG cluster, a physical consequence quantification method is introduced. Finally, a cyber risk assessment method is proposed for DG cluster control under cyber attacks. Simulation results validate the effectiveness of the proposed method.
تدمد:1424-8220