1. 贺州学院 人工智能学院,广西,贺州,542899
2. 中国移动通信集团有限公司贺州分公司,广西,贺州,542899
[ "黄华成,1993-,男,实验师,硕士,主要从事新型电力系统网络安全、新能源技术研究(e-mail)201907070@hzxy.edu.cn" ]
[ "岑东坤,1996-,女,学士,主要从事人工智能技术研究(e-mail)2818841085@qq.com" ]
[ "黄梦丹,1993-,女,实验师,学士,主要从事新能源安全技术研究(e-mail)992585019@qq.com" ]
纸质出版:2026
移动端阅览
黄华成, 梁焕莲, 岑东坤, 等. 新型电力系统网络安全智能防护革新与应用[J]. 南方能源建设, 2026, 13(1): 70-92.
.
黄华成, 梁焕莲, 岑东坤, 等. 新型电力系统网络安全智能防护革新与应用[J]. 南方能源建设, 2026, 13(1): 70-92. DOI: 10.16516/j.ceec.2025-121.
. DOI: 10.16516/j.ceec.2025-121.
目的
2
方法
2
结果
2
结论
2
Objective
2
Method
2
Result
2
Conclusion
2
ZHANG J, PU T J, GAO W Z, et al. Key technologies and application prospects of intelligent computing in power systems [J]. Power generation technology, 2025, 46(3): 421-437. DOI: 10.12096/j.2096-4528.pgt.24240.
MASHIMA D, CHEN Y, ROOMI M M, et al. Cybersecurity for modern smart grid against emerging threats [J]. Foundations and trends in privacy and security, 2023, 5(4): 70-246. DOI: 10.1561/3300000035.
LI Y, YU Y C, ZHANG L W, et al. Intrusion detection in smart grid based on unsupervised learning [J]. Computer systems applications, 2022, 31(9): 136-144. DOI: 10.15888/j.cnki.csa.008657.
CAI X P, WANG Q, TAI W, et al. A multi-stage game based defense method against false data injection attack on cyber physical power system [J]. Electric power construction, 2019, 40(5): 48-54. DOI: 10.3969/j.issn.1000-7229.2019.05.006.
LI J J, GAO L, LI P, et al. Detection of imbalanced multi-class false data injection attacks in cyber-physical systems based on DDPM-Light GBM [J]. Journal of Kunming University of Science and Technology (natural science), 2025, 50(3): 49-57. DOI: 10.16112/j.cnki.53-1223/n.2025.03.522.
ZHU W P, TANG Y, WEI X S, et al. Defense methods for adversarial attacks against power CPS data-driven algorithms [J]. Electric power, 2024, 57(9): 32-43. DOI: 10.11930/j.issn.1004-9649.202312067.
YANG Y W, WU J B, GAO Z H, et al. Wargaming technology towards cybersecurity threat evolution in power information network [J]. Southern power system technology, 2025, 19(6): 51-61. DOI: 10.13648/j.cnki.issn1674-0629.2025.06.005.
FENG Y, LU H P, ZHAO B, et al. Lightweight security authentication method and application mechanism in the scenario of massive power IoT terminal access [J]. Power system technology, 2025, 49(12): 5282-5291. DOI: 10.13335/j.1000-3673.pst.2024.16680.
ZHENG W, ZHANG L, ZHANG J J, et al. V2G scheduling control strategy based on virtual synchronization [J]. Southern energy construction, 2025, 12(2): 116-127. DOI: 10.16516/j.ceec.2024-271.
LIU W, LI K, WEI X S, et al. Analysis of information-physical coordinated attack paths based on vulnerability of critical nodes in cyber-physical power system [J]. Electric power construction, 2025, 46(12): 96-106. DOI: 10.12204/j.issn.1000-7229.2025.12.009.
ZHANG Y F, YUAN Z. FENG X, et al. PUF-based lightweight authentication protocol for power IoT devices [J]. Application research of computers, 2025, 42(5): 1541-1548. DOI: 10.19734/j.issn.1001-3695.2024.06.0345.
LUO S G, YANG P, ZHANG Y H, et al. Design of online real-time transmission model of massive electricity data [J]. Electric power information and communication technology, 2021, 19(8): 69-75. DOI: 10.16543/j.2095-641x.electric.power.ict.2021.08.010.
LIANG L, REN T Y, ZHANG W K. Construction of enterprise multidimensional value map based on customer input and output of State Grid Jiangsu Power [J]. Finance accounting, 2023(24): 30-33. DOI: 10.3969/j.issn.1003-286X.2023.24.011.
ZHANG K, HU P, FENG J, et al. A data-driven approach to fault prognosis for wind turbines [J]. Electric engineering, 2024(12): 75-78. DOI: 10.19768/j.cnki.dgjs.2024.12.023.
LI G Y, WANG N, GAO R T, et al. Research on multi-source heterogeneous data integration technology for smart efficiency improvement in novel power system [J]. Electrical measurement instrumentation, 2024, 61(11): 116-121. DOI: 10.19753/j.issn1001-1390.2024.11.015.
ABAZARI A, GHAFOURI M, JAFARIGIV D, et al. Developing a security metric for assessing the power grid's posture against attacks from EV charging ecosystem [J]. IEEE transactions on smart grid, 2025, 16(1): 254-276. DOI: 10.1109/TSG.2024.3451970.
PRESEKAL A, JORJANI M, RAJKUMAR V S, et al. Cyber security of HVDC systems: a review of cyber threats, defense, and testbeds [J]. IEEE access, 2024, 12: 165756-165773. DOI: 10.1109/ACCESS.2024.3490605.
LI Z Y, XU Y, HAN X T. Application of quantum computing technology in decision-making optimization of new power system [J]. Automation of electric power systems, 2024, 48(6): 62-73. DOI: 10.7500/AEPS20230704013.
ZIA M F, NASIR M, ELBOUCHIKHI E, et al. Energy management system for a hybrid PV-Wind-Tidal-Battery-based islanded DC microgrid: modeling and experimental validation [J]. Renewable and sustainable energy reviews, 2022, 159: 112093. DOI: 10.1016/j.rser.2022.112093.
WANG H P, HU Y Z, ZHUANG Y F, et al. Analyzing the vulnerability of electrified transportation road networks [J]. Journal of Tsinghua University (science and technology), 2023, 63(10): 1584-1597. DOI: 10.16511/j.cnki.qhdxxb.2023.22.036.
WANG W X, SUN Z, PAN M Y, et al. Information security risk assessment method for electric vehicle charging piles based on fuzzy analytic hierarchy process [J]. Electric power, 2021, 54(1): 96-103. DOI: 10.11930/j.issn.1004-9649.202002053.
WANG P, ZHANG D, ZHANG Y J, et al. Research and prospects for key digital-intelligent technology applications in new power systems [J]. Power system protection and control, 2025, 53(6): 175-187. DOI: 10.19783/j.cnki.pspc.240637.
GAO Y J, CAI D F, YU Y W, et al. Digital twin method for security-constrained economic dispatch of power system [J]. Electric power automation equipment, 2025, 45(7): 197-203. DOI: 10.16081/j.epae.202502005.
LI J W, WANG Y, SONG J T, et al. Research and application of key technology of cooperative scheduling for new power system cross-domain hierarchical computing network [J]. Automation instrumentation, 2024(11): 130-134. DOI: 10.14016/j.cnki.1001-9227.2024.11.130.
ZHAO L, LUO W, MA Y L, et al. Research on secure two-party authentication key agreement protocol for smart grid [J]. Computer engineering and applications, 2025, 61(5): 279-288. DOI: 10.3778/j.issn.1002-8331.2311-0085.
LIANG H L, LIU D Q, ZENG X J, et al. Dynamic modeling and optimal defense strategy against DDoS attacks on power advanced metering infrastructure [J]. Journal of Shanghai Jiao Tong University, 2025, 59(11): 1660-1674. DOI: 10.16183/j.cnki.jsjtu.2024.006.
LU Q Y, AN K X, LI J, et al. Network intrusion detection for modern smart grids based on adaptive online incremental learning [J]. IEEE transactions on smart grid, 2025, 16(3): 2541-2553. DOI: 10.1109/TSG.2025.3535949.
XU L, LIU W J, LI Y, et al. Application analysis and prospect of zero-knowledge proof in new power system [J]. Proceedings of the CSEE, 2024, 44(Suppl.1): 114-130. DOI: 10.13334/j.0258-8013.pcsee.240006.
WANG Z, LIU D, XU C Y, et al. Status quo and prospect of multi-source heterogeneous data fusion technology for new power system [J]. Electric power, 2023, 56(4): 1-15. DOI: 10.11930/j.issn.1004-9649.202211077.
LIU J, SHI F, SONG X M, et al. Frequency safety assessment of power systems based on multivariable-sample convolution and interaction network [J]. Automation of electric power systems, 2024, 48(22): 160-170. DOI: 10.7500/AEPS20231101004.
China Southern Power Grid Co. Electric power communication data processing method and system, electronic equipment and storage medium: CN119766734A [P]. 2025-04-04.
HAN K X, CHAI H K. Research on electricity theft detection method in smart grid [J]. Automation application, 2025, 66(2): 13-16. DOI: 10.19769/j.zdhy.2025.02.004.
RUAN J Q, WANG Q H, CHEN S C, et al. On vulnerability of renewable energy forecasting: adversarial learning attacks [J]. IEEE transactions on industrial informatics, 2024, 20(3): 3650-3663. DOI: 10.1109/TII.2023.3313526.
WANG Z Y, BU S Q. Design and defense of modal resonance-oriented cyber-attack against wide-area damping control [J]. IEEE transactions on smart grid, 2024, 15(2): 2164-2178. DOI: 10.1109/TSG.2023.3313523.
KESICI M, PAL B, YANG G Y. Detection of false data injection attacks in distribution networks: a vertical federated learning approach [J]. IEEE transactions on smart grid, 2024, 15(6): 5952-5964. DOI: 10.1109/TSG.2024.3399396.
SELIM A, ZHAO J B, DING F, et al. Adaptive deep reinforcement learning algorithm for distribution system cyber attack defense with high penetration of DERs [J]. IEEE transactions on smart grid, 2024, 15(4): 4077-4089. DOI: 10.1109/TSG.2023.3345314.
NIU Z W, JI Y, LI B Y, et al. Preventive control method of power system transient stability based on multi-agent deep reinforcement learning with advantage decomposition [J]. Power system technology, 2025, 49(6): 2311-2321. DOI: 10.13335/j.1000-3673.pst.2024.0389.
QU R, XU P Y, TANG B J, et al. Research on the stability of wind-solar hybrid power generation system under extreme weather and suggestions on transmission planning: taking the impact of sandstorm events as an example [J]. Coal economic research, 2025, 45(2): 59-67. DOI: 10.13202/j.cnki.cer.2025.02.006.
LIN L, CUI H, XU N. Coordinated configuration strategy of grid-forming stations and synchronous condensers in renewable energy base considering short-circuit ratio constraints [J]. Automation of electric power systems, 2025, 49(23): 57-67. DOI: 10.7500/AEPS20241120002.
WU A T, XU Y, WU X Y. Research on emergency frequency control of urban local power grid off-grid process based on frequency response reduction model under extreme events [J]. Power system technology, 2025, 49(2): 427-436. DOI: 10.13335/j.1000-3673.pst.2024.1281.
LOU Q H, LI Y B, ZHAO Y C, et al. A review of research on resilience planning and investment strategies for distribution networks adapted to extreme events [J]. Electric power construction, 2024, 45(5): 37-47. DOI: 10.12204/j.issn.1000-7229.2024.05.005.
YUE F, WANG X Z, JIANG S. Network security risks and new countermeasures under the smart grid environment [J]. Science technology review, 2024, 42(9): 6-16. DOI: 10.3981/j.issn.1000-7857.2023.11.01692.
LIN Y F, FU B B, LU Z X, et al. Research and experience on the security risks control countermeasures of constructing new type power system in Gansu province under the dual carbon goals [J]. New type power systems, 2025, 3(1): 1-11. DOI: 10.20121/j.2097-2784.ntps.N20240039.
ZHANG S T, LIN X B, WU L, et al. Power system CC threat detection based on traffic clustering analysis [J]. Netinfo security, 2021(Suppl. 1): 173-176.
LIU S, LI R, WANG Y. Research on new energy station network security assessment method based on improved LSTM network [J]. Telecommunications science, 2024, 40(10): 124-133. DOI: 10.11959/j.issn.1000-0801.2024226.
ZHANG B, LIU X, ZHENG H F, et al. Hidden Markov model-based cyberattack prediction in power systems [J]. IEEE transactions on smart grid, 2025, 16(2): 1694-1705. DOI: 10.1109/TSG.2024.3481294.
PRESEKAL A, TEFANOV A, SEMERTZIS I, et al. Spatio-temporal advanced persistent threat detection and correlation for cyber-physical power systems using enhanced GC-LSTM [J]. IEEE transactions on smart grid, 2025, 16(2): 1654-1666. DOI: 10.1109/TSG.2024.3474039.
QI B, ZHU K H, LUO Y, et al. Research status and future prospects of intelligent perception and evaluation technology for the health condition of power transformers [J]. High voltage engineering, 2025, 51(8): 4395-4416. DOI: 10.13336/j.1003-6520.hve.20250421.
LI N G, CHEN M, LU Z A, et al. A security detection method for multi-modal applications incorporating external knowledge [J]. Information technology, 2025(3): 76-85. DOI: 10.13274/j.cnki.hdzj.2025.03.012.
LEI X, CHENG G, ZHANG Y J, et al. Association analysis of alarm information based on power network situation awareness platform [J]. Computer engineering science, 2023, 45(7): 1197-1208. DOI: 10.3969/j.issn.1007-130X.2023.07.007.
LENG M R, SAHOO S, BLAABJERG F. Stabilization of DC microgrids under cyber attacks-optimal design and sensitivity analysis [J]. IEEE transactions on smart grid, 2024, 15(1): 113-123. DOI: 10.1109/TSG.2023.3278094.
ELBEZ G, NAHRSTEDT K, HAGENMEYER V. Early attack detection for securing GOOSE network traffic [J]. IEEE transactions on smart grid, 2024, 15(1): 899-910. DOI: 10.1109/TSG.2023.3272749.
BALTA E C, PEASE M, MOYNE J, et al. Digital twin-based cyber-attack detection framework for cyber-physical manufacturing systems [J]. IEEE transactions on automation science and engineering, 2024, 21(2): 1695-1712. DOI: 10.1109/TASE.2023.3243147.
LI X, LYU B. Safety risk identification system of power infrastructure construction based on front-end intelligent perception [J]. Ordnance industry automation, 2025, 44(1): 43-47. DOI: 10.7690/bgzdh.2025.01.009.
GUO L, ZHENG X B, DUAN C M, et al. Data integration method of multi-source heterogeneous power grid based on decision rough set [J]. Ordnance industry automation, 2025, 44(1): 48-52. DOI: 10.7690/bgzdh.2025.01.010.
GUO S Y, LIU Y, SHAO S J, et al. Ubiquitous security boundary protection technology for cross-domain data circulation in new power system [J]. Automation of electric power systems, 2024, 48(6): 96-111. DOI: 10.7500/AEPS20230629001.
ZHANG D Q, QIAN B, YANG L, et al. Data driven analysis and control of power system security and stability [J]. Electric power, 2025, 58(8): 156-163. DOI: 10.11930/j.issn.1004-9649.202410010.
HE J Y. Analysis of incremental learning-enhanced network security attack detection in power monitoring systems [J]. Electric engineering, 2024(13): 43-45, 52. DOI: 10.19768/j.cnki.dgjs.2024.13.012.
HE Y J, LIU H D, XIANG Y, et al. Research on evaluation method of new power system construction effect based on improved fuzzy analytic hierarchy process [J]. Jilin electric power, 2024, 52(2): 10-14. DOI: 10.16109/j.cnki.jldl.2024.02.001.
GONG Y, HU W X, YU Y X, et al. Chaotic encryption control of secure access to distributed database of power monitoring under binary Trie tree [J]. Journal of Shenyang University of Technology, 2025, 47(1): 83-91. DOI: 10.7688/j.issn.1000-1646.2025.01.11.
ZENG R, CAO Y J, LI Y, et al. A general real-time cyberattack risk assessment method for distribution network involving the influence of feeder automation system [J]. IEEE transactions on smart grid, 2024, 15(2): 2102-2115. DOI: 10.1109/TSG.2023.3302287.
HUANG T, WU D, ILIĆ M. Cyber-resilient automatic generation control for systems of AC microgrids [J]. IEEE transactions on smart grid, 2024, 15(1): 886-898. DOI: 10.1109/TSG.2023.3272632.
CHEN X Q, WANG F, MAO G J, et al. Privacy-preserving data aggregation scheme for smart grid based on blockchain [J]. Computer engineering and design, 2024, 45(5): 1343-1350. DOI: 10.16208/j.issn1000-7024.2024.05.009.
BANERJEE T, CHOWDHURY D R. SECRET: secured real-time authentication tag for smart grid based on cellular automata [J]. IEEE transactions on smart grid, 2025, 16(2): 1682-1693. DOI: 10.1109/TSG.2024.3477618.
XIA Z Q, ZHANG Y C, GU K, et al. Virtual ring privacy preserving scheme based on fog computing for smart meter system [J]. Journal of electronics information technology, 2023, 45(3): 819-827. DOI: 10.11999/JEIT220618.
DUBAL P K, DAS S, SIDHU T S. Wide area measurement-based cyber-attack-resilient breaker failure protection scheme [J]. IEEE transactions on smart grid, 2024, 15(4): 4228-4244. DOI: 10.1109/TSG.2024.3372632.
LIU X F, LIN Z Z, TIAN Q D, et al. Research on the fusion technology of power multi-source heterogeneous information based on big data mining [J]. Manufacturing automation, 2023, 45(9): 75-78. DOI: 10.3969/j.issn.1009-0134.2023.09.016.
XIANG Y, ZHANG S, CHANG X. Attack graph based power network security risk measurement method [J]. Computer engineering and design, 2025, 46(1): 88-96. DOI: 10.16208/j.issn1000-7024.2025.01.013.
LIN N, WU L F, FANG H B. Simulation of intrusion model for power network data security in big data environment [J]. Modern electronics technique, 2022, 45(4): 118-122. DOI: 10.16652/j.issn.1004-373x.2022.04.022.
BIE Z H, BIAN Y H, ZHANG L Y, et al. Key technologies of risk prevention and emergency management against extreme events for new power systems [J]. Proceedings of the CSEE, 2024, 44(18): 7049-7067. DOI: 10.13334/j.0258-8013.pcsee.241046.
LI B Y, ZHAO J M, HAN X Q, et al. Static security oriented preventive control of power system based on double deep reinforcement learning [J]. Proceedings of the CSEE, 2023, 43(5): 1818-1830. DOI: 10.13334/j.0258-8013.pcsee.220005.
CAI Y, TANG L, TANG X F, et al. Backbone network identification of cyber-physical power system based on non-dominated sorting genetic algorithm-Ⅱ [J]. Automation of electric power systems, 2023, 47(12): 38-46. DOI: 10.7500/AEPS20221031006.
WU R C, ZHANG Z B, JIANG H, et al. Behavior based coordinated response and collaborative disposal method for security events of power network [J]. Microcomputer applications, 2023, 39(1): 53-56. DOI: 10.3969/j.issn.1007-757X.2023.01.017.
LIU D N, LI Z, XU E F, et al. Flexible block order trading clearing model for new power systems [J]. Power system technology, 2022, 46(11): 4150-4162. DOI: 10.13335/j.1000-3673.pst.2022.0703.
PENG S, LIU M X, CHAI L, et al. DST-GNN: a dynamic spatiotemporal graph neural network for cyberattack detection in grid-tied photovoltaic systems [J]. IEEE transactions on smart grid, 2025, 16(1): 330-343. DOI: 10.1109/TSG.2024.3445113.
BAMIGBADE A, DVORKIN Y, KARRI R. Cyberattack on phase-locked loops in inverter-based energy resources [J]. IEEE transactions on smart grid, 2024, 15(1): 821-833. DOI: 10.1109/TSG.2023.3270348.
LI Y C, LUO H, WANG Q L, et al. An advanced persistent threat model of new power system based on ATTCK [J]. Netinfo security, 2023, 23(2): 26-34. DOI: 10.3969/j.issn.1671-1122.2023.02.004.
XIA Y, XU Y, MONDAL S, et al. A transfer learning-based method for cyber-attack tolerance in distributed control of microgrids [J]. IEEE transactions on smart grid, 2024, 15(2): 1258-1270. DOI: 10.1109/TSG.2023.3302309.
ZHANG H F, YU C Q, ZENG M L, et al. Homomorphic encryption based resilient distributed energy management under cyber-attack of micro-grid with event-triggered mechanism [J]. IEEE transactions on smart grid, 2024, 15(5): 5115-5126. DOI: 10.1109/TSG.2024.3390108.
SELIM A, ZHAO J B, YANG B. Large language model for smart inverter cyber-attack detection via textual analysis of Volt/VAR commands [J]. IEEE transactions on smart grid, 2024, 15(6): 6179-6182. DOI: 10.1109/TSG.2024.3453648.
WANG P Y. Research on power cyber-physical system defense resource allocation based on attack path prediction [D]. Qinhuangdao: Yanshan University, 2024. DOI: 10.27440/d.cnki.gysdu.2024.002460.
AN H P, YI J B, XING Y K, et al. A robust V2G voltage control scheme for distribution networks against cyber attacks and customer interruptions [J]. IEEE transactions on smart grid, 2024, 15(4): 3966-3978. DOI: 10.1109/TSG.2024.3365069.
YANG W J, WANG Q F. Research on automatic monitoring and early warning of power intelligent optical fiber network based on machine learning [J]. Automation instrumentation, 2023(7): 134-137, 142. DOI: 10.14016/j.cnki.1001-9227.2023.07.134.
ZHANG X Y, LIU Q F, FENG L, et al. Smart grid data security sharing model based on multi-authority attribute-based encryption [J]. Netinfo security, 2025, 25(1): 98-109. DOI: 10.3969/j.issn.1671-1122.2025.01.009.
HU B W, ZHOU Y D, ZHOU Y X, et al. Data protection method against cross-domain inference threat in cyber–physical power grid [J]. IEEE transactions on smart grid, 2024, 15(4): 4170-4181. DOI: 10.1109/TSG.2024.3363049.
JIANG Z M, ZHANG P, ZHOU Y F. Differential duffing oscillator-based cyberattack detection for inverters [J]. IEEE transactions on smart grid, 2024, 15(1): 1192-1195. DOI: 10.1109/TSG.2023.3328160.
LIU M X, TENG F, ZHANG Z Y, et al. Enhancing cyber-resiliency of DER-based smart grid: a survey [J]. IEEE transactions on smart grid, 2024, 15(5): 4998-5030. DOI: 10.1109/TSG.2024.3373008.
TAN S, XIE P L, GUERRERO J M, et al. Lyapunov-based resilient cooperative control for DC microgrid clusters against false data injection cyber-attacks [J]. IEEE transactions on smart grid, 2024, 15(3): 3208-3222. DOI: 10.1109/TSG.2023.3332946.
LI Z, XIE Y B, WU Q Q, et al. Review of deep learning-based false data injection attack detection in power systems [J]. Power System Protection and Control, 2024, 52(19): 175-187. DOI: 10.19783/j.cnki.pspc.231632.
YAO Y, LIU D. Short-term wind power forecasting based on attention mechanism of CNN-LSTM [J]. Modern electric power, 2022, 39(2): 212-218. DOI: 10.19725/j.cnki.1007-2322.2021.0108.
TAO L, LUO P P, LIN J K. Two-stage detection method for DC microgrid false data injection attack based on deep learning [J]. Electric power, 2024, 57(9): 11-19. DOI: 10.11930/j.issn.1004-9649.202311112.
WU T Y, SUN B Y, LU P D, et al. Analysis of security assurance and attack and defense technologies in power networks [J]. Application of IC, 2024, 41(6): 210-211. DOI: 10.19339/j.issn.1674-2583.2024.06.094.
JIA X C, LV T, LI B, et al. Decentralized secure load frequency control for multi-area power systems under complex cyber attacks [J]. IEEE transactions on smart grid, 2024, 15(5): 5043-5054. DOI: 10.1109/TSG.2024.3379411.
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621