Abstract
With the widespread use of communication and information technology, power system has been evolving into cyber-physical power system (CPPS) and becoming more vulnerable to cyber-attacks. Therefore, it is necessary to enhance the ability of the communication and information system in CPPS to defend against cyber-attacks. This paper proposes a method to enhance the survivability of the communication and information system in CPPS. Firstly, the communication and information system for critical business of power system is decomposed into certain types of atomic services, and then the survivability evaluation indexes and their corresponding calculation method for the communication and information system are proposed. Secondly, considering the efficacy and cost defensive resources, a defensive resource allocation model is proposed to maximize the survivability of communication and information system in CPPS. Then, a modified genetic algorithm is adopted to solve the proposed model. Finally, the simulation results of CPPS for an IEEE 30-node system verify the proposed method.
Keywords
Cyber-physical power system (CPPS); cyber-attacks; survivability evaluation; communication and information system; defensive resource
WITH the large-scale application of modern advanced communication and information technology, power system has been evolving into cyber-physical power system (CPPS) [
In recent years, many researches on the decision making of real-time defense strategy against cyber-attacks have been reported. The behavior and purpose of cyber-attacks are analyzed in [
Therefore, for existing power systems and their auxiliary communication and information system, there may be cyber-attacks that cannot be defended or can be defended but costly even with cyber-attack defense measures. This problem can only be solved by optimizing the defense resource allocation and improving the inherent survivability of CPPS. Many researchers have proposed some resource allocation methods for improving the survivability of CPPS. References [
Targeting at improving the survivability of the communication and information system in CPPS, this paper proposes a model and the method for the defense resource allocation. Firstly, based on the analysis of the evaluation of the survivability in CPPS, each critical power business of CPPS is broken down into many atomic services. Then, a set of survivability indexes of atomic services and the corresponding calculation methods are proposed, and the defense resources for improving different survivability are given. Secondly, a defensive resource allocation model to decide the kind and number of defensive measures for enhancing the survivability of atomic services is established. The main contributions of this paper are as follows.
1) The goal of cyber-attack defense is to guarantee the key power businesses undertaken by the communication and information system in CPPS, but these critical businesses are difficult to be guaranteed. By decomposing the critical businesses into more operational atomic services, the critical businesses can be guaranteed by enhancing the survivability of these atomic services.
2) From the perspectives of attack identification ability at the beginning of the cyber-attacks, the resistance during the effect propagation of cyber-attacks and the recovering ability of critical businesses after cyber-attacks, the defensive resource allocation model for enhancing the survivability of the atomic services is established.
The rest of this paper is organized as follows. The method for assessing the survivability of communication and information system is given in Section II. A defensive resource allocation model for improving the survivability of communication and information system is proposed in Section III. An improved genetic algorithm for solving the optimal configuration of defensive resources is introduced in Section IV. Section V shows the simulations and Section VI draws the conclusion.
The main mission of the communication and information system in CPPS is to complete the power businesses. According to the regulations issued by the Economic and Trade Commission of the People’s Republic of China [
The power businesses are difficult to be guaranteed. In this section, the concept of atomic service is defined as the smallest independent unit of power business and can be implemented by one or several communication and information elements. Therefore, the consequences of attacking atomic services are independent of each other [
Three indexes are selected based on the time scale which are defined as follows.
1) Identifiability index: the ability of CPPS to identify cyber-attack at the beginning.
2) Resistibility index: the ability of CPPS to ensure critical businesses during the effect propagation of cyber-attack.
3) Recoverability index: the ability of CPPS to recover the critical businesses after cyber-attack.
In this section, the framework of survivability evaluation is proposed, as shown in

Fig. 1 Framework of survivability evaluation by decomposing power businesses into atomic services.
The effect of defensive measures is needed to calculate the survivability evaluation indexes of atomic services. In order to calculate the survivability index, the effect of defensive measures is collected through the simulation after the defense resources are configured. The steps shown in

Fig. 2 Process of data acquisition.
Step 1: based on the steps for the execution process of critical businesses, the critical businesses are decomposed into atomic services. The cyber-attacks are selected to form a cyber-attack library according to the degree of cyber-attack threat to different atomic services. The cyber-attack library includes the probability that different attacks choose different types of atomic services as targets.
Step 2: an unselected cyber-attack is selected in the cyber-attack library randomly.
Step 3: based on the characteristics of cyber-attacks, the consequences of cyber-attacks on the system are simulated for multiple times. And the basic data used to calculate the evaluation indexes are collected.
Step 4: judge if all cyber-attacks in the cyber-attack library have been selected. If yes, Step 5 is executed. Otherwise, go back to Step 2.
Step 5: calculate the expectation values of the collected data used to calculate the evaluation indexes.
This section quantifies the survivability indexes. The attack hazard index and the attack impedance rate index are used to evaluate the resistibility. The indexes of attack identification rate and the attack identification time are adopted to evaluate the identifiability while the indexes of attack recovery time and the attack recovery rate are utilized to evaluate the recoverability.
The index of attack identification rate for the
(1) |
(2) |
where is the identification result when
The attack identification rate indexes of the
(3) |
(4) |
where is the total number of atomic services included in the
The index of attack identification time for the
(5) |
(6) |
where is the rate of ; and is the attack identification time when the
The indexes of attack identification time for the
(7) |
(8) |
The extent to which an atomic service is destroyed by an attack is:
(9) |
(10) |
where is the attack hazard index of the
The attack hazard index of the
(11) |
The attack hazard index of the entire system is:
(12) |
The probability that an atomic service is attacked successfully is:
(13) |
where is the probability that the
The probability of successful attack on the
(14) |
The probability of successful attack on the entire system is:
(15) |
The attack impedance index for the entire system is:
(16) |
The attack recovery time index of atomic service is:
(17) |
(18) |
where is the index of attack recovery time for the
The indexes of attack recovery time for critical business and the entire system are:
(19) |
(20) |
where is the index of attack recovery time for the
The index of attack recovery rate for critical business is:
(21) |
where is the system suffering from the
The index of attack recovery rate for the entire system is:
(22) |
The fusion index can directly reflect the survivability of the system. Among all the above indexes, the smaller the ADS and RTS, the better the system survivability, and the larger the RIS, TIS, APS and RRS, the better the system survivability. The relationship between unified indexes and survivability is that the composition vector R= [RIS, TIS, APS, RRS, 1ADS, 1RTS]. The formula for calculating the fusion index is:
(23) |
where a and b are the weight coefficients which satisfy , and this paper takes ; E is the total number of indexes; and and are the 1 norm and the infinite norm of the vector R, respectively.
(24) |
where is the
Defensive resources are defense measures (hardware or software) equipped in CPPS to enhance its survivability. Corresponding to the survivability assessment indexes, the defensive resources are divided into three categories, which are respectively used to enhance the corresponding survivability [
1) Identifiability defensive resources are used to enhance the system recognizability. Commonly-used defensive measures include intrusion detection technology, honeypot technology [
(25) |
where is the cost of adding an intrusion detection software to the atomic service; is the cost of adding a honeypot component to the atomic service; is the number of intrusion detection software on the
2) Resistibility defensive resources are used to enhance the system resistance ability. Commonly-used defensive measures are firewall technology, access control technology, and the deployment of camouflage components [
(26) |
where is the cost of adding a firewall to the atomic service; is the number of firewalls on the
3) Recoverability defensive resources are used to enhance the system recoverability capabilities. Commonly-used defensive measures include the creation of redundant components, data backup and recovery technology [
(27) |
where is the cost of adding a spare component to the atomic service; is the number of spare components on the
Different defense effects can be achieved by configuring different numbers and types of defensive measures on the atomic service. Considering the constraints of defense resource configuration, we configure different numbers and types of defensive measures on all atomic services, and form different configuration schemes of defense resources. The optimization variables in the model are the number and type of defense measures on atomic services. The consequences of cyber-attacks are simulated and the survivability defense effect is evaluated by calculating the indexes.
Quantify system survivability through survivability fusion indexes based on (23). The objective function is:
(28) |
where L is the atomic service defensive measure allocation matrix. The number of columns in L represents different atomic services. The number of rows in L represents the type of defensive measures. The elements in L represent the number of types of defensive measures configured on different atomic services.
Resource allocation in the system is subject to the following conditions.
1) The total amount of defensive resources is limited as:
(29) |
where is the total cost of defensive resources.
2) Each defensive resource configurable on each atomic service also has a cost cap as:
(30) |
where is the upper limit of the cost of identifiability defensive resource on atomic services; is the upper limit of the cost of resistibility defensive resource on atomic services; and is the upper limit of the cost of identifiability defensive resource on atomic services.
This paper uses an improved genetic algorithm [
1) In the encoding process, the decimal encoding is adopted.
2) The objective function of the proposed model is not directly selected as the fitness function. The following fitness function is used.
(31) |
where H is an improved fitness function; F is the objective function value in (28); Fmax and Fmin are the maximum and minimum values of the objective function without consideration of constraints, respectively; is the average of the maximum and minimum values of the objective function; and t is an evolutionary algebra with different values depending on the environment.
3) Roulette selection operator, adaptive crossover operator and adaptive mutation operator are adopted.
4) Chaotic perturbations are added to the algorithm. After performing selection, crossover, and mutation operations, we add some individuals with low fitness to the progeny population. Therefore, it is difficult for the group to fall into the local optimal solution.
The specific process of applying improved genetic algorithm to the survivability defensive resource allocation of the communication and information system is given in
This section takes IEEE 30-node system as an example. The single-line diagram and its communication and information system are given in

Fig. 3 Diagram of IEEE 30-node system and its communication network. (a) IEEE 30-node system. (b) Communication network.
The functions of SSS include: data collection (DC) on the power nodes such as frequency, voltage, and power data, data uploading (DU) to the substation, substation processing (SP) of the data, transmitting data to control center (CC) through communication nodes (CNs) by the substation, making decisions by CC, transmitting orders to substation through CNs by CC, substation analysis (SA) of orders, substation sending orders (SI), controlling the action (CA) of electric components to adjust the power output of power plant. Based on these functions, the SSS can be decomposed into the following atomic services, as shown in

Fig. 4 Schematic diagram of SSS decomposition into atomic services.
The functions of RP include: DC (current, voltage, and phase data), DU, SP, CN, CC, CN, SA, SI, CA (adjusting the power output of the power plant). Based on these functions, the RP can be decomposed into the following atomic services, as shown in

Fig. 5 Schematic diagram of RP decomposition into atomic services.
The functions of PD include: DC (frequency, voltage, and power data), DU, SP, CN, CC, CN, SA, SI, CA (adjusting power to power plants and loads). Based on these functions, the PD can be decomposed into the following atomic services, as shown in

Fig. 6 Schematic diagram of PD decomposition into atomic services.
According to the functions of atomic services, they are classified into three categories: data acquisition atomic services (DCAS), data transfer and processing atomic services (DTPAS) and control action atomic services (CAAS). The number of atomic services of all power businesses are shown in Table I.
ALL the CN critical services are in the same topology. The DCAS in PD and part of the DCAS in SSS are the same. In summary, there are 180 DCAS, 378 DTPAS, 54 CAAS, and a total of 612 atomic services.
Three various cyber-attacks F1, F2, and F3 are set in the simulation. The probabilities of each atomic service being attacked by these cyber-attacks are given in Table II [
Seven defensive measures of three defensive resource are adopted for enhancing the survivability of atomic services. Since the cost of these defensive measures is difficult to determine, this paper does not quantify the specific value of defensive measures. The cost and cost caps for all types of defensive measures are shown in Table III [
Different atomic services have different degrees of impact on the survivability of power business. The weights of atomic services in Table IV [
Firstly, the effect of defensive measures used to calculate the indexes is collected by simulation. There are three types of atomic services, and each type of atomic services can suffer from three types of cyber-attacks, with a total of nine attack scenarios. In

Fig. 7 Effect of defensive measures. (a) In the case of DCAS attacked by F1. (b) In the case of DCAS attacked by F2 or F3. (c) In the case of DTPAS attacked by F1 or F3. (d) In the case of DTPAS attacked by F2. (e) In the case of CAAS attacked by F1 or F2. (f) In the case of CAAS attacked by F3.
With the data in

Fig. 8 Overall allocation of defensive resources.
As shown in

Fig. 9 Specific allocation of defensive resources on atomic services. (a) SSS. (b) RP. (c) PD.
A total 1000 simulations have been performed, in which the system configured with defensive resources are attacked by a randomly selected cyber-attack. As a comparison, 1000 simulations have been also performed for the system without defense resources. Then, the objective function of the proposed model and the fusion indexes are calculated based on these simulations. The results are shown in
Considering there may be cyber-attacks that cannot be defended or can be defended but costly for the existing power systems and their auxiliary communication and information system, even with cyber-attack defense measures, a method of defense resource allocation is proposed to enhance the survivability of the communication and information system in CPPS.
Simulation results show that the method of defense resource allocation is effective to enhance the inherent survivability of the CPPS. This paper is a preliminary study on the research methods of cyber-attack defense resource allocation. In the future, it can be further studied from the following aspects: ① after configuring defense resources on atomic services, the survivability of atomic services can be enhanced. But the degree of improvement is still quantified by the simulation. In the future, the effect of defensive measures can be obtained through actual experiments to make the optimization result more realistic; ② this paper focuses on how to enhance the survivability by configuring defense resources on atomic services (that is, configuring defense resources on the nodes of the communication and information system). One of the most noteworthy aspects of future research is how to optimize the topology of the communication and information system to enhance its survivability.
REFERENCES
Y. Han, C. Guo, S. Ma et al., “Modeling cascading failures and mitigation strategies in PMU based cyber-physical power systems,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 944-957, Sept. 2018. [百度学术]
Z. Su, L. Xu, S. Xin et al., “A future outlook for cyber-physical power system,” in Proceedings of IEEE Conference on Energy Internet and Energy System Integration, Beijing, China, Nov.2017, pp. 1-4. [百度学术]
K. D. Kim and P. R. Kumar, “Cyber-physical systems:a perspective at the centennial,” Proceedings of the IEEE, vol. 100, pp.1287-1380, May 2012. [百度学术]
Y. Tang, Q. Chen, M. Li et al., “Overview on cyber-attacks against cyber physical power system,” Automation of Electric Power Systems, vol. 40, no. 17, pp. 59-69, Sept. 2016. [百度学术]
M. H. Ansari, V. T. Vakili, B. Bahrak et al., “Graph theoretical defense mechanisms against false data injection attacks in smart grids,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 860-871, Sept. 2018. [百度学术]
G. Liang, J. Zhao, F. Luo et al., “A review of false data injection attacks against modern power systems,” IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1630-1638, Jul.2017. [百度学术]
S. Amini, F. Pasqualetti, and H. Mohsenian-Rad, “Dynamic load altering attacks against power system stability: attack models and protection schemes,” IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 2862-2872, Oct.2016. [百度学术]
N. Živkovic and A. T. Saric, “Detection of false data injection attacks using unscented Kalman filter,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 847-859, Sept. 2018. [百度学术]
J. Zhao, G. Zhang, M. L. Scala et al., “Short-term state forecasting-aided method for detection of smart grid general false data injection attacks,” IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1580-1590, Jul.2017. [百度学术]
J. Letchford and Y. Vorobeychik, “Optimal interdiction of attack plans,” in Proceedings of International Conference on Autonomous Agents and Multi-Agent Systems, Saint Paul, USA, May 2013, pp. 199-206. [百度学术]
A. K. Nandi, H. R. Medal, and S. Vadlamani, “Interdicting attack graphs to protect organizations from cyber attacks: a bi-level defender-attacker model,” Computers & Operations Research, vol. 75, pp. 118-131, Nov.2016. [百度学术]
S. Mei, Y. Wang, and L. Chen, “Overviews and prospects of the cyber security of smart grid from the view of complex network theory,” High Voltage Engineering, vol. 37, no. 3, pp. 672-679, Mar.2011. [百度学术]
Q. Guo, S. Xin, J. Wang et al., “Comprehensive security assessment for a cyber physical energy system: a lesson from Ukraine’s blackout,” Automation of Electric Power Systems, vol. 40, no. 5, pp. 145-147, Mar.2016. [百度学术]
Z. Li, W. Tong, and X. Jin, “Construction of cyber security defense hierarchy and cyber security testing system of smart grid: thinking and enlightenment for network attack events to national power grid of Ukraine and Israel,” Automation of Electric Power Systems, vol. 40, no. 8, pp. 147-151, Apr.2016. [百度学术]
X. Yi and Y. Zhang, “Survivability of information system,” in Proceedings of International Conference on Information, Communications and Signal Processing, Bangkok, Thailand, Dec.2005, pp. 1551-1555. [百度学术]
I. Garasym, “Information security system survivability assessment method based on logical-probabilistic models,” in Proceedings of International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), Polyana-Svalyava, Ukraine, Feb.2011, pp. 160-161. [百度学术]
A. K. Srivastava, T. A. Ernster, R. Liu et al., “Graph-theoretic algorithms for cyber-physical vulnerability analysis of power grid with incomplete information,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 887-899, Sept. 2018. [百度学术]
H. Abie, R. Savola, J. Bigham et al., “Self-healing and secure adaptive messaging middleware for business-critical systems,” International Journal on Advances in Security, vol. 3, no. 1 & 2, 2010. [百度学术]
Z. Bao, “Active defense of security risk in train control system,” Ph.D. dissertation, Beijing Jiaotong University, Beijing, China, 2017. [百度学术]
X. Dong, L. Lin, X. Zhang et al., “The application of active defense technology in the communication network,” Information Security & Technology, no. 1, Jan.2016. [百度学术]
S. Huang, H. Zhang, J. Wang et al., “Markov differential game for network defense decision-making method,” IEEE Access, vol. 6, pp. 39621-39634, Jun.2018. [百度学术]
L. Zhang, “Research on network information system survivability technology,” Ph.D. dissertation, Harbin Engineering University, Harbin, China, 2008. [百度学术]
Power Grid and Power Plant Computer Monitoring System and Dispatching Data Network Security Protection Rules, Order No. 30 of the National Economic and Trade Commission of the People’s Republic of China, 2002. [百度学术]
Power Secondary System Security Protection Regulations, State Electricity Regulatory Commission Order No. 5, 2005. [百度学术]
D. Chen, S. Han, M. Munro et al., “An analytic model of atomic service for services descriptions,” in Proceedings of International Conference on Service Sciences (ICSS), Hangzhou, China, May 2010, pp. 197-202. [百度学术]
P. Wei, M. Yan, Y. Tan et al.,“Micro variation Chaos genetic algorithm,” in Proceedings of Chinese Control and Decision Conference (CCDC), Shenyang, China, Jun.2018, pp. 4523-4528. [百度学术]
T. L. Saaty, “How to make a decision: the analytic hierarchy process,” European Journal of Operational Research, vol. 48, no. 1, pp. 9-26, Jan.1990. [百度学术]