Framework of Resilient Transmission Network Reconfiguration Considering Cyber-Attacks Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2401.16446
Fast and reliable transmission network reconfiguration is critical in improving power grid resilience to cyber-attacks. If the network reconfiguration following cyber-attacks is imperfect, secondary incidents may delay or interrupt post-attack restoration of the power grid. This paper proposes a framework of resilient transmission network reconfiguration, taking into account the impacts of cyber-attacks in the network reconfiguration process. First, the mechanism of cyber-attack propagation is analyzed based on the characteristics of network reconfiguration. Second, systematic resilience indices are specially extracted in which the impact of cyber-attacks on network reconfiguration is quantified. These indices are defined in terms of the restoration characteristics of the transmission power system. Third, representative cyber-attack incidents motivate an optimization-based model of resilient transmission network reconfiguration, and an optimal reconstruction scheme is obtained. Finally, simulation results based on the IEEE 39-bus system verify the feasibility and effectiveness of the proposed framework in enhancing power grid resilience to cyber-attacks.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2401.16446
- https://arxiv.org/pdf/2401.16446
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4391420744
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4391420744Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2401.16446Digital Object Identifier
- Title
-
Framework of Resilient Transmission Network Reconfiguration Considering Cyber-AttacksWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-01-28Full publication date if available
- Authors
-
Chao Yang, Gaoqi Liang, Steven R. Weller, Shaoyan Li, Junhua Zhao, Zhaoyang DongList of authors in order
- Landing page
-
https://arxiv.org/abs/2401.16446Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2401.16446Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2401.16446Direct OA link when available
- Concepts
-
Control reconfiguration, Computer security, Computer science, Transmission (telecommunications), Computer network, Transmission network, Telecommunications, Embedded systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4391420744 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2401.16446 |
| ids.doi | https://doi.org/10.48550/arxiv.2401.16446 |
| ids.openalex | https://openalex.org/W4391420744 |
| fwci | |
| type | preprint |
| title | Framework of Resilient Transmission Network Reconfiguration Considering Cyber-Attacks |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10917 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.991599977016449 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2207 |
| topics[0].subfield.display_name | Control and Systems Engineering |
| topics[0].display_name | Smart Grid Security and Resilience |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9688000082969666 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T10714 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.95169997215271 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Software-Defined Networks and 5G |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C119701452 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8132016062736511 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q5165881 |
| concepts[0].display_name | Control reconfiguration |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.5930480360984802 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.5825040340423584 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C761482 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5805450677871704 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q118093 |
| concepts[3].display_name | Transmission (telecommunications) |
| concepts[4].id | https://openalex.org/C31258907 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4940941631793976 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[4].display_name | Computer network |
| concepts[5].id | https://openalex.org/C2986640423 |
| concepts[5].level | 3 |
| concepts[5].score | 0.4155532419681549 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q200928 |
| concepts[5].display_name | Transmission network |
| concepts[6].id | https://openalex.org/C76155785 |
| concepts[6].level | 1 |
| concepts[6].score | 0.26591140031814575 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[6].display_name | Telecommunications |
| concepts[7].id | https://openalex.org/C149635348 |
| concepts[7].level | 1 |
| concepts[7].score | 0.24732553958892822 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[7].display_name | Embedded system |
| keywords[0].id | https://openalex.org/keywords/control-reconfiguration |
| keywords[0].score | 0.8132016062736511 |
| keywords[0].display_name | Control reconfiguration |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.5930480360984802 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.5825040340423584 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/transmission |
| keywords[3].score | 0.5805450677871704 |
| keywords[3].display_name | Transmission (telecommunications) |
| keywords[4].id | https://openalex.org/keywords/computer-network |
| keywords[4].score | 0.4940941631793976 |
| keywords[4].display_name | Computer network |
| keywords[5].id | https://openalex.org/keywords/transmission-network |
| keywords[5].score | 0.4155532419681549 |
| keywords[5].display_name | Transmission network |
| keywords[6].id | https://openalex.org/keywords/telecommunications |
| keywords[6].score | 0.26591140031814575 |
| keywords[6].display_name | Telecommunications |
| keywords[7].id | https://openalex.org/keywords/embedded-system |
| keywords[7].score | 0.24732553958892822 |
| keywords[7].display_name | Embedded system |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2401.16446 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2401.16446 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2401.16446 |
| locations[1].id | doi:10.48550/arxiv.2401.16446 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2401.16446 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5110222627 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Chao Yang |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Yang, Chao |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5090253720 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-9060-1675 |
| authorships[1].author.display_name | Gaoqi Liang |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Liang, Gaoqi |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5015701582 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-5758-8034 |
| authorships[2].author.display_name | Steven R. Weller |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Weller, Steven R. |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5058308157 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-1715-1561 |
| authorships[3].author.display_name | Shaoyan Li |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Li, Shaoyan |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5065487554 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-5446-2655 |
| authorships[4].author.display_name | Junhua Zhao |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Zhao, Junhua |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5112415925 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Zhaoyang Dong |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Dong, Zhaoyang |
| authorships[5].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2401.16446 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Framework of Resilient Transmission Network Reconfiguration Considering Cyber-Attacks |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10917 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.991599977016449 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2207 |
| primary_topic.subfield.display_name | Control and Systems Engineering |
| primary_topic.display_name | Smart Grid Security and Resilience |
| related_works | https://openalex.org/W2357657342, https://openalex.org/W2153432761, https://openalex.org/W1580144672, https://openalex.org/W2152623100, https://openalex.org/W2142042635, https://openalex.org/W4214878056, https://openalex.org/W4248634784, https://openalex.org/W2103296973, https://openalex.org/W2560361912, https://openalex.org/W2909827418 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2401.16446 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2401.16446 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2401.16446 |
| primary_location.id | pmh:oai:arXiv.org:2401.16446 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2401.16446 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2401.16446 |
| publication_date | 2024-01-28 |
| publication_year | 2024 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 38 |
| abstract_inverted_index.If | 15 |
| abstract_inverted_index.an | 110, 119 |
| abstract_inverted_index.in | 8, 52, 79, 94, 143 |
| abstract_inverted_index.is | 6, 21, 63, 88, 123 |
| abstract_inverted_index.of | 31, 40, 50, 60, 69, 83, 96, 100, 113, 139 |
| abstract_inverted_index.on | 66, 85, 129 |
| abstract_inverted_index.or | 27 |
| abstract_inverted_index.to | 13, 148 |
| abstract_inverted_index.and | 1, 118, 137 |
| abstract_inverted_index.are | 76, 92 |
| abstract_inverted_index.may | 25 |
| abstract_inverted_index.the | 16, 32, 48, 53, 58, 67, 81, 97, 101, 130, 135, 140 |
| abstract_inverted_index.Fast | 0 |
| abstract_inverted_index.IEEE | 131 |
| abstract_inverted_index.This | 35 |
| abstract_inverted_index.grid | 11, 146 |
| abstract_inverted_index.into | 46 |
| abstract_inverted_index.These | 90 |
| abstract_inverted_index.based | 65, 128 |
| abstract_inverted_index.delay | 26 |
| abstract_inverted_index.grid. | 34 |
| abstract_inverted_index.model | 112 |
| abstract_inverted_index.paper | 36 |
| abstract_inverted_index.power | 10, 33, 103, 145 |
| abstract_inverted_index.terms | 95 |
| abstract_inverted_index.which | 80 |
| abstract_inverted_index.39-bus | 132 |
| abstract_inverted_index.First, | 57 |
| abstract_inverted_index.Third, | 105 |
| abstract_inverted_index.impact | 82 |
| abstract_inverted_index.scheme | 122 |
| abstract_inverted_index.system | 133 |
| abstract_inverted_index.taking | 45 |
| abstract_inverted_index.verify | 134 |
| abstract_inverted_index.Second, | 72 |
| abstract_inverted_index.account | 47 |
| abstract_inverted_index.defined | 93 |
| abstract_inverted_index.impacts | 49 |
| abstract_inverted_index.indices | 75, 91 |
| abstract_inverted_index.network | 4, 17, 43, 54, 70, 86, 116 |
| abstract_inverted_index.optimal | 120 |
| abstract_inverted_index.results | 127 |
| abstract_inverted_index.system. | 104 |
| abstract_inverted_index.Finally, | 125 |
| abstract_inverted_index.analyzed | 64 |
| abstract_inverted_index.critical | 7 |
| abstract_inverted_index.motivate | 109 |
| abstract_inverted_index.process. | 56 |
| abstract_inverted_index.proposed | 141 |
| abstract_inverted_index.proposes | 37 |
| abstract_inverted_index.reliable | 2 |
| abstract_inverted_index.enhancing | 144 |
| abstract_inverted_index.extracted | 78 |
| abstract_inverted_index.following | 19 |
| abstract_inverted_index.framework | 39, 142 |
| abstract_inverted_index.improving | 9 |
| abstract_inverted_index.incidents | 24, 108 |
| abstract_inverted_index.interrupt | 28 |
| abstract_inverted_index.mechanism | 59 |
| abstract_inverted_index.obtained. | 124 |
| abstract_inverted_index.resilient | 41, 114 |
| abstract_inverted_index.secondary | 23 |
| abstract_inverted_index.specially | 77 |
| abstract_inverted_index.imperfect, | 22 |
| abstract_inverted_index.resilience | 12, 74, 147 |
| abstract_inverted_index.simulation | 126 |
| abstract_inverted_index.systematic | 73 |
| abstract_inverted_index.feasibility | 136 |
| abstract_inverted_index.post-attack | 29 |
| abstract_inverted_index.propagation | 62 |
| abstract_inverted_index.quantified. | 89 |
| abstract_inverted_index.restoration | 30, 98 |
| abstract_inverted_index.cyber-attack | 61, 107 |
| abstract_inverted_index.transmission | 3, 42, 102, 115 |
| abstract_inverted_index.cyber-attacks | 20, 51, 84 |
| abstract_inverted_index.effectiveness | 138 |
| abstract_inverted_index.cyber-attacks. | 14, 149 |
| abstract_inverted_index.reconstruction | 121 |
| abstract_inverted_index.representative | 106 |
| abstract_inverted_index.characteristics | 68, 99 |
| abstract_inverted_index.reconfiguration | 5, 18, 55, 87 |
| abstract_inverted_index.reconfiguration, | 44, 117 |
| abstract_inverted_index.reconfiguration. | 71 |
| abstract_inverted_index.optimization-based | 111 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile |