TY - JOUR
T1 - Defense Strategy for Resilient Shipboard Power Systems Considering Sequential Attacks
AU - Ding, Tao
AU - Qu, Ming
AU - Wu, Xiong
AU - Qin, Boyu
AU - Yang, Y.
AU - Blaabjerg, F.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - To increase the resilience of shipboard power systems, this paper presents an optimal defense strategy to protect critical lines against attacks. In the modeling, an attack is considered to destroy one critical bus, which may result in that all lines are connected to this bus will be out of service unless protection is enabled. Furthermore, after one true attack occurs, the network restoration is performed as soon as possible to pick up the critical loads and maintain system operation. To address the uncertain location of the attacks, a tri-level robust optimal defense strategy is set up to protect the critical lines under the worst attack. Moreover, a nested column-constraint generation method is employed to solve this model. A 60-bus shipboard power system is studied to demonstrate the effectiveness of the proposed model and the defense method.
AB - To increase the resilience of shipboard power systems, this paper presents an optimal defense strategy to protect critical lines against attacks. In the modeling, an attack is considered to destroy one critical bus, which may result in that all lines are connected to this bus will be out of service unless protection is enabled. Furthermore, after one true attack occurs, the network restoration is performed as soon as possible to pick up the critical loads and maintain system operation. To address the uncertain location of the attacks, a tri-level robust optimal defense strategy is set up to protect the critical lines under the worst attack. Moreover, a nested column-constraint generation method is employed to solve this model. A 60-bus shipboard power system is studied to demonstrate the effectiveness of the proposed model and the defense method.
KW - Shipboard power system
KW - resilience
KW - sequential attacks
KW - defense strategy
KW - triple-level optimization
UR - http://www.scopus.com/inward/record.url?scp=85084550399&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2019.2960657
DO - 10.1109/TIFS.2019.2960657
M3 - Journal article
SN - 1556-6021
VL - 15
SP - 3443
EP - 3453
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
M1 - 8939417
ER -