CN106789190A - A kind of power telecom network vulnerability assessment and routing optimization method - Google Patents
A kind of power telecom network vulnerability assessment and routing optimization method Download PDFInfo
- Publication number
- CN106789190A CN106789190A CN201611106431.1A CN201611106431A CN106789190A CN 106789190 A CN106789190 A CN 106789190A CN 201611106431 A CN201611106431 A CN 201611106431A CN 106789190 A CN106789190 A CN 106789190A
- Authority
- CN
- China
- Prior art keywords
- fragility
- node
- business
- network
- power telecom
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/14—Routing performance; Theoretical aspects
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention relates to a kind of power telecom network vulnerability assessment and routing optimization method, belong to technical field of electric power communication.The present invention is modeled to the network topology of power telecom network, and power telecom network definition is turned into a Undirected networks of having the right;According to influence node and while the topology fragility sexual factor of fragility, business fragility sexual factor and equipment fragility sexual factor set up node and while vulnerability assessment model, and the fragility of power telecom network is estimated according to the vulnerability assessment model.The present invention will influence the factor of node and side fragility to be summarized as topological fragility, three kinds of factors of business fragility and equipment fragility, and comprehensive vulnerability inder is obtained according to triadic relation, the fragility size on node and side can be comprehensively showed, the accuracy to power telecom network vulnerability assessment is improved.
Description
Technical field
The present invention relates to a kind of power telecom network vulnerability assessment and routing optimization method, belong to power system telecommunications technology neck
Domain.
Background technology
Power telecom network is the indispensable important component of power system, is power network schedule automation, network operation
The marketization and the basis of management modernization, are the important infrastructures of intelligent grid development.The net loaded relay of power communication is protected
The business energy communication service such as shield, stability contorting, power distribution automation, it is closely related with power generation, once break down will be right
The stable operation of power network threatens, therefore development power telecom network fragility correlative study has great importance.
Definition angle from the index such as reliability is different, and fragility refers to the weakness or defect being present in a system,
System is specific to one to threaten the sensitiveness of attack or hazard event, or the possibility that the threat attacked is acted on.And
In power telecom network, fragility is commonly defined as after removal node or side, the decline degree of network performance.The index can refer to
Weak link in bright network, while being that network management and optimization provide distinguishing rule.By setting up rational power telecom network
Vulnerability assessment index system, realizes the vulnerability assessment to nodes and side, and the network after assessment obtains its tender spots:
Fragility some nodes higher and side, the traffic failure risk carried on the node and side are big, therefore enter according to assessment result
Row further business route adjustment has practical significance with optimization.
Vulnerability assessment to power telecom network at present is based primarily upon Complex Networks Theory to carry out, further, main flow
Research method be divided into three kinds.The first is the power telecom network architectural vulnerability assessment side based on classical Complex Networks Theory
Method.The method breaches the limitation of network size, but can only provide network topology architectural vulnerability in itself, also not yet considers electricity
Influence of the different grades of business of power communication network to network;Second is that Complex Networks Theory is combined with convectional reliability calculating
Method, but still without distinguish carrying business grade;The third is the fragility that service impact is combined with Complex Networks Theory
Property appraisal procedure, rational optimization method is not given.In terms of fragility optimization, there are highly several sections of point protection strategies at present
Network vulnerability is reduced with low powered posterior chamber node edged strategy, but both strategies need to rise the structure of existing network
Level, can bring extra artificial and capital input;The business routing optimization method of comentropy is also based on, but algorithm is relatively simple
It is single, do not consider the dynamic updating process of fragility.Method for configuring route mainly has following four in existing power telecom network.
Technical scheme 1:Patent publication No. is CN105306364A's《Energy communication service route based on business importance degree
Distribution method》Patent, discloses a kind of energy communication service route distribution method based on business importance degree.First, to electric power
Communication route network carries out network reduction, sets source node and destination node, and K bars road is found according to different electrical circuit transmission paths
Every paths are set corresponding importance degree, wherein K >=1 by footpath;Then according to power communication route network reliability analysis model
Logical mappings matrix G, and threshold value TH are obtained, and according to logical mappings matrix G and threshold value TH, finds complete set CS and searching
Contact set TS;Finally, node reliability is replaced using service node risk, while replacing side using service path risk
Reliability, finally calculates reliability values, so as to obtain power communication route network optimal path.It is important that the program is based on business
Business route of making rational planning for is spent, system centralized risk is changed into diversifying risks, had to risk prevention system caused by business concentrations
It is significant, but the method does not account for the weight of node device and link.
Technical scheme 2:Patent publication No. is CN104468355A's《A kind of power train based on power communication reciprocal effect
The detection method of fragility of uniting》Patent, discloses a kind of detection of the power system vulnerability based on power communication reciprocal effect
Method, the detection method is comprised the following steps:Step 10):Set up electric power-communication hybrid system incidence matrix;Step 20):Survey
Power system vulnerability is calculated, electric power networks node vulnerability inder and electric power networks branch vulnerability index is obtained;Step 30):
Measuring and calculating communication service fragility, including communication network node vulnerability inder and communication network branch vulnerability index;Step
40):Calculate power communication information interaction passage fragility;Step 50):By step 20), step 30) and step 40) obtain it is crisp
Weak property index substitutes into electric power-communication hybrid system incidence matrix, obtains electric power-communication hybrid system fragility matrix, and be directed to
Hybrid system fragility numerical value carries out sequence from big to small.The detection method can combine shadow of the communication system to power system
The factor of sound, more accurately detects the fragility of power system, but the method is not very in the vulnerability assessment of communication network
Comprehensively.
Technical scheme 3:Patent publication No. is CN101667972's《Power communication network service routing method and equipment》Specially
Profit, discloses a kind of power communication network service routing method and device, and methods described includes:A. given birth to according to network optimization target
Into objective optimization function;B. the start node of business is determined, and as present node;C. calculate and work as using ant group algorithm
The transition probability of the connected each bar link of front nodal point, the transition probability is calculated according to the pheromones on current each bar link
Arrive;D. next-hop node is selected according to the transition probability;Whether the next-hop node for E. judging selection is the business
Destination node;If it is, the next-hop node that will be selected is used as present node, and determined to work as according to the objective optimization function
Pheromones on preceding each bar link, then repeat step C to step E;Otherwise, according to business start node, Yi Jixuan
The route of all next-hop nodes generation correspondence business selected, the program can ensure multi-service road in powerline network
By best performance, but do not consider the delay characteristics of power communication network service, the consideration for business risk is also not complete enough.
Technical scheme 4:Patent publication No. is CN103873363A's《A kind of double route of power optical fiber communication network service is matched somebody with somebody
Put method》, disclose a kind of double route collocation method of power optical fiber communication network service.The method includes:According to Practical Project,
Set up rationally effective power optical fiber communication network service mode;Business is ranked up according to importance degree, and by improving
Bhandari algorithms, configure two complete disjoint routes.New algorithm processes two aside network figure according to actual conditions, and allows
Every maximum bearer traffic of optical cable of setting.The program disclosure satisfy that and all should configure two electric power for being kept completely separate path
The demand of business, it is ensured that business is still safe and reliable in the case of the failures such as disconnected cable;But have ignored energy communication service when
Prolong feature, the consideration for business risk is also not complete enough.
The content of the invention
It is crisp to power communication at present to solve it is an object of the invention to provide a kind of power telecom network vulnerability assessment method
Weak property assesses not accurate enough problem;Meanwhile, present invention also offers a kind of power telecom network routing optimization method, solve current
The unbalanced problem of power telecom network fragility.
The present invention provides a kind of power telecom network vulnerability assessment method to solve above-mentioned technical problem, the appraisal procedure
Comprise the following steps:
1) network topology to power telecom network is modeled, and power telecom network definition is turned into a Undirected networks of having the right
G=(V, E), wherein V={ v1,v2,…,vNRepresent network set of node, E={ eijRepresent network side collection;
2) according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility
Factor sets up the vulnerability assessment model on node and side, and according to the vulnerability assessment model to the fragility of power telecom network
It is estimated,
NV(vi)=(B (vi)+NI(vi))×NP(vi)
EV(eij)=(B (eij)+EI(eij))×EP(eij)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) opening up for node
Flutter fragility, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side
Property;NI(vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side.
Further, the topological fragility B (v of described nodei) it is by the shortest path institute in a network of the node
There is shared ratio in shortest path;The topological fragility B (e on sideij) it is own in a network by the shortest path of the link
Shared ratio in shortest path.
Further, the business fragility NP (v of the nodei) and side business fragility EP (eij) be respectively:
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service
It is the number of services of k;nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service is the business weight of k
Spend.
Further, the equipment fragility NI (v of the nodei) represented using pitch point importance, the equipment on the side
Fragility EI (eij) represented using link importance degree.
Further, the step 1) in set up Undirected networks of having the right in each edge weight by the biography on this link
Defeated time delay determines that time delay includes equipment delay and propagation delay time.
Present invention also offers a kind of power telecom network routing optimization method, the optimization method is comprised the following steps:
1) network topology to power telecom network is modeled, and power telecom network definition is turned into a Undirected networks of having the right
G=(V, E), wherein V={ v1,v2,…,vNRepresent network set of node, E={ eijRepresent network side collection;
2) according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility
Factor sets up the vulnerability assessment model on node and side,
NV(vi)=(B (vi)+NI(vi))×NP(vi)
EV(eij)=(B (eij)+EI(eij))×EP(eij)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) opening up for node
Flutter fragility, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side
Property;NI(vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side;
3) according to step 2) in the assessment models set up, the fragility value on the maximum side of the whole network fragility is dropped to most
It is low for optimization aim to route optimize.
Further, the step 3) including procedure below:
A. according to according to step 2) in the assessment models set up set up fragility weight matrix VM={ mij, wherein mij
=EV (eij)+NV(vj), and set up maximum side fragility value array Vmax={ vmx, wherein vm1It is the initial maximum before optimization
Fragility value;
B. the corresponding side e of maximum EV are selectedab, make mab=mba=∞, and by eabDeleted in topology on corresponding side;
C. by service path by side eabBusiness be stored in collection of services B={ B to be plannedy, one is randomly selected from B
Individual business B1, extract business B1Starting point start and terminal end;
D. with the minimum optimization aim of accumulative fragility, to business B1Route adjustment is carried out, according to fragility weight matrix
VM obtains B1New route;
E. the fragility NV ' and EV ' on the whole network node and side are recalculated, and the maximum of EV ' is deposited into vmx;
F. vm is comparedxChange, if vmx≤vmx-1, then this business routing optimality success is illustrated, the whole network maximum side is fragile
Property decline, and repeat step A to step F changes fragility weight matrix VM, selection fragility it is maximum while and this while on
One business completes gravity treatment road;If vmx> vmx-1, this business routing optimality failure is illustrated, the path optimizing is not adopted, is route
Optimization terminates.
Further, the business fragility NP (v of the nodei) and side business fragility EP (eij) be respectively:
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service
It is the number of services of k;nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service is the business weight of k
Spend.
Further, when network is initial using based on the Floyd shortest paths route selecting method of time delay weight come complete route
Configuration.
Further, the topological fragility B (v of described nodei) it is by the shortest path institute in a network of the node
There is shared ratio in shortest path;The topological fragility B (e on sideij) it is own in a network by the shortest path of the link
Shared ratio in shortest path.
The beneficial effects of the invention are as follows:The present invention is modeled to the network topology of power telecom network, by power telecom network
Definition turns into a Undirected networks of having the right;According to influence node and side fragility topology fragility sexual factor, business fragility because
Element and equipment fragility sexual factor set up the vulnerability assessment model on node and side, and according to the vulnerability assessment model to electricity
The fragility of power communication network is estimated.The present invention will influence the factor of node and side fragility to be summarized as topological fragility, industry
Business three kinds of factors of fragility and equipment fragility, and comprehensive vulnerability inder is obtained according to triadic relation, can show comprehensively
Node and the fragility size on side, improve the accuracy to power telecom network vulnerability assessment.
In addition the characteristics of being weighed present invention is alternatively directed to fragility skewness, it is proposed that based on the dynamic of Min-Max principles
Business routing optimization method, the method using above-mentioned node and while vulnerability assessment model obtain node and while fragility
Value, and node and the fragility value on side to obtain are used as the foundation of business routing optimality, by the whole network maximum side fragility value drop
To minimum, network vulnerability is also reached equilibrium, enhance the robustness of network.
Brief description of the drawings
Fig. 1 is the network topological diagram of power telecom network in the embodiment of the present invention.
Specific embodiment
Specific embodiment of the invention is described further below in conjunction with the accompanying drawings.
The embodiment of power telecom network vulnerability assessment method of the present invention
The present invention analyzes topology, business, three kinds of influence factors of Chemical Apparatus Importance Classification, and combine in terms of vulnerability assessment
These factors propose a comprehensive vulnerability inder to evaluate the fragility of nodes and side, and different attacking is selected afterwards
Model is hit to be estimated the reasonability of index.The method is comprised the following steps that.
1. the network topology of pair power telecom network is modeled, and power telecom network definition is turned into an indirected net of having the right
Network.
The present invention is modeled using Complex Networks Theory to the network topology of power telecom network, and power telecom network is defined
As a Undirected networks of having the right, the node device in the network does not consider the inactive components such as distributing frame.The weight of each edge by
Propagation delay time on this link determines that time delay includes equipment delay and propagation delay time.Therefore, power telecom network can be with containing
N number of node, undirected network G of having the right=(V, the E) expressions on M bars side, wherein V={ v1,v2,…,vNRepresent network set of node, E
={ eijRepresent network side collection.It is the adjacency matrix of power telecom network, if being deposited between node i and node j
Connected in optical cable, then aij=1, otherwise aij=0.Weight matrixElement wijRepresent side eijTime delay power
Weight.
2. according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility
Factor sets up the vulnerability assessment model on node and side, and according to the vulnerability assessment model to the fragility of power telecom network
It is estimated.
Modeling from power network is different, the class of business that power telecom network is carried by it, quantity, and the difference of importance degree causes
It is as follows to business model when assessing the fragility of network, it is necessary to consider the influence of the business to network of the network carrying:Definition business
Collection is combined into S={ sk, single service class skThere are four attribute (start, end, route, Ck), they represent starting point respectively, eventually
Point, the transmission path of business, business importance degree.
1) topology fragility sexual factor
Complex Networks Theory defines many parameters for describing network topology characteristic, some of them parameter and networks vulnerable
Sexual intercourse is close.Node viBetweenness B (vi) be defined as by the shortest path institute in all shortest paths in a network of the node
The ratio for accounting for, side eijBetweenness B (eij) it is by the shortest path of link ratio shared in all shortest paths in a network
Example.Betweenness index can weigh node and side significance level in a network, therefore reflect node and side using betweenness herein
Topological fragility.
2) business fragility sexual factor
When carrying out vulnerability analysis to actual power telecom network, it is necessary to the influence that consideration business is brought.Use node pressure
(Node Pressure, NP) and channel pressure (Edge Pressure, EP) represent the business fragility of node and side.Its
In, node pressure refers to the comprehensive embodiment of the number of services that a certain node is carried in power telecom network and importance degree.Pressure refers to
The bigger node of number, its failure is bigger to the potential impact of operation of power networks and threat, and its business fragility is higher.Use node pressure
Index NP (vi) represent node viPressure size.Wherein NP (vi) be expressed as:
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service
It is the number of services of k;CkFor type of service is the business importance degree of k.
Channel pressure refers to the business that a certain passage section (such as multiplex section or optical cable segment) is carried in power telecom network
The comprehensive embodiment of quantity and importance degree.A certain channel pressure index is bigger, shows potential shadow of the channel failure to operation of power networks
Ring and threaten bigger, its business fragility is higher.EP(eij) it is side eijChannel pressure index, its expression formula is as follows:
Wherein, nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service is the business weight of k
Spend.
3) equipment fragility sexual factor
Its importance degree of the node of different stage and link is different, and such as the importance degree of transformer station's class node is with website voltage level
Change, control centre's class node and data, disaster recovery center class node its importance degree increase etc. with the increase of rank.Attack
The importance degree of node or link is bigger, and the influence degree to network performance is bigger, therefore uses pitch point importance (Node
Importance, NI) and link importance degree (Link Importance, LI) come represent equipment fragility sexual factor.
4) comprehensive vulnerability inder
In summary three kinds of fragile sexual factors, obtain the comprehensive vulnerability inder on node and side, i.e. node and side fragility
Assessment models.Definition node fragility (Node Vulnerability, NV) and side fragility (Edge Vulnerability,
EV), institute's established model is as follows
NV(vi)=(B (vi)+NI(vi))×NP(vi) (3)
EV(eij)=(B (eij)+EI(eij))×EP(eij) (4)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) opening up for node
Flutter fragility, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side
Property;NI(vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side.
The definition of above expression formula combine the probability attacked in node or side and attacked after influence.Attacked in selection
When hitting target, often select that there is key position in topology and the big node of importance degree and side are attacked, and attacked
The influence that the service disconnection being mainly on the node or side into the rear influence caused to network is brought.Therefore, by taking node as an example, by
Knowable to formula (3), when the betweenness of node is larger with importance degree sum, while when node pressure is smaller, NV values are smaller, the node is illustrated
The probability attacked is big, but the business interrupted after attacking is seldom or the business importance degree very little interrupted, i.e. preemption penalty is smaller, crisp
Weak property is smaller;When node betweenness is smaller with importance degree sum, while when NP is larger, the NV values of the node are smaller, illustrate the node
Although losing larger after being attacked, attack probability is relatively low, and fragility is not high;As B (vi) and NV (vi) sum and NP be simultaneously larger
When, NV values are larger, and now node is not only big by attack probability, loses also larger after attack, and fragility is high;As B (vi) and NV (vi)
When sum is simultaneously smaller with NP, NV values are smaller, and now node is small by attack probability, lose also smaller after attack, and fragility is low.
The embodiment of power telecom network routing optimization method of the present invention
The characteristics of being weighed for fragility skewness, the present invention proposes the dynamic business road based on Min-Max principles
By optimization method, the method is based on the power telecom network vulnerability assessment model set up in above-described embodiment, and the whole network is crisp
The fragility value on the maximum side of weak property is preferably minimized as optimization aim is optimized to route.Concrete implementation step is as follows:
Step 1:Set up fragility weight matrix VM={ mij, wherein mij=EV (eij)+NV(vj), as side eijWith section
Point vjFragility value sum;Set up maximum side fragility value array Vmax={ vmx, for storing each routing optimality back
The change of maximum fragility value, wherein vm1It is the initial maximum fragility value before optimization;
Step 2:Often complete a business routing optimality and after updating network vulnerability, the corresponding side e of selection maximum EVab,
Make mab=mba=∞, will eabCorresponding side is deleted in topology, to carry out new route planning;
Step 3:By service path by side eabBusiness be stored in collection of services B={ B to be plannedy, from B in order
Choose a business B1, extract business B1Starting point start and terminal end;
Step 4:With the minimum optimization aim of accumulative fragility, to business B1Route adjustment is carried out, using Floyd algorithms,
It is routed according to fragility weight matrix VM, obtains B1New route;
Step 5:The fragility NV ' and EV ' on the whole network node and side are recalculated, and the maximum of EV ' is deposited into vmx;
Step 6:Compare vmxChange, if vmx≤vmx-1, then this business routing optimality success, the whole network maximum side are illustrated
Fragility declines, and repeat step one is to step 6, changes fragility weight matrix VM, selects the maximum side of fragility and is somebody's turn to do
A business on side completes gravity treatment road;If vmx> vmx-1, this business routing optimality failure is illustrated, the path optimizing is not adopted
Receive, algorithm terminates.
In order to verify effectiveness of the invention, emulated under the topology close to reality network.Simulation example is used
A part for certain provincial company power communication backbone transport networks.Shown in topological diagram G Fig. 1, net nodes N=17, side number M=25.
From emulation topological diagram 1, node and side in network have different ranks, and the importance degree of different stage is different, according to current
The importance degree on the actual conditions of electric power networks, 500KV nodes and side be respectively 2.22 and 1.25,220KV node and side it is important
Degree is respectively 1.86 and 0.8.
Collection of services S={ the s used in emulationkIn include 10 business, it is known that the terminal and business of business are important
Degree, by terminal and the propagation delay time on each side, initial road is obtained by Floyd algorithms by optimization aim of minimal service propagation delay time
By service conditions is as shown in table 1.
Table 1
Business sequence number | Terminal | Business importance degree | Initial route |
s1 | 1—4 | 9.793 | 1—3—4 |
s2 | 1—6 | 5.515 | 1—7—6 |
s3 | 3—7 | 7.970 | 3—6—7 |
s4 | 2—6 | 9.793 | 2—7—6 |
s5 | 2—5 | 7.970 | 2—7—6—5 |
s6 | 3—5 | 5.515 | 3—4—5 |
s7 | 3—1 | 9.793 | 3—1 |
s8 | 4—6 | 5.515 | 4—5—6 |
s9 | 4—7 | 7.970 | 4—5—6—7 |
s10 | 5—7 | 9.793 | 5—6—7 |
By the vulnerability assessment model in embodiment, the betweenness on calculate node and side, the index such as pressure obtains node and side
Fragility as shown in table 2 and table 3.
Table 2
Node ID | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
NV | 55.7242 | 39.4338 | 76.5672 | 65.2915 | 71.8804 | 114.4007 | 102.8297 |
Table 3
Side sequence number | 1-2 | 1-3 | 1-7 | 2-3 | 2-7 |
EV | 0 | 26.3478 | 5.4624 | 0 | 17.5938 |
Side sequence number | 3-4 | 3-6 | 4-5 | 5-6 | 6-7 |
EV | 22.0508 | 7.1350 | 18.8190 | 33.9264 | 57.8796 |
Therefrom it can be seen that while 1-2 and while 2-3 fragility value be 0 because artificial network is undersized, business point
Cloth is not uniform enough, causes the initial route of 10 business not have by this two sides, and channel pressure is zero, ultimately results in fragility
Property be zero, but in real network do not exist such case.After obtaining the fragility value on node and side, the excellent of route is proceeded by
Change.From the EV values on side in table 3, the side fragility between node 6 and node 7 is maximum, therefore first to carrying on the side
Business carries out route planning, and step is as follows:
1) optimization front maximum fragility is side 6-7, and max (EV) is 57.8796;
2) it is { s by the collection of services of side 6-72, s3, s4, s5, s9, s10, selection business 2 is carried out with accumulative fragility most
The small route weight-normality for optimization aim is drawn, and it is 1-3-6 to obtain new route, updates the whole network fragility value, is obtained after the completion of renewal crisp
Maximum 6-7, the max (EV)=51.3667 when being still of weak property, than being reduced before this suboptimization, algorithm continues;
3) to business s3Carry out route weight-normality to draw, it is 3-2-7 to obtain new route, updates the whole network fragility value, updates and completes
After obtain fragility it is maximum while still for while 6-7, max (EV)=36.81, than being reduced before this suboptimization, algorithm continues;
4) to business s4Carry out route weight-normality to draw, it is 2-3-6 to obtain new route, updates the whole network fragility value, updates and completes
After obtain fragility maximum when being changed into 1-3, max (EV)=33.7668, than before this suboptimization reduce, algorithm continue;
5) it is { s by the collection of services of side 1-31, s2, s7, selection business s1Carry out route weight-normality to draw, newly route
It is 1-2-3-4, updates the whole network fragility value, fragility maximum side is obtained after the completion of renewal and is changed between node 2 and node 3
Side, max (EV)=37.0694, than being raised before this suboptimization, algorithm terminates;
So far, complete based on fragility routing optimality in a balanced way, the whole network fragility reaches equalization target.
The present invention uses the fragility value on node and side as the foundation of business routing optimality, and the result of routing optimality can be with
Make the maximum fragility value on side minimum, while network vulnerability is more balanced, enhance the robustness of network.
Claims (10)
1. a kind of power telecom network vulnerability assessment method, it is characterised in that the appraisal procedure is comprised the following steps:
1) network topology to power telecom network is modeled, by power telecom network definition as the Undirected networks G=that has the right
(V, E), wherein V={ v1,v2,…,vNRepresent network set of node, E={ eijRepresent network side collection;
2) according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility sexual factor
The vulnerability assessment model on node and side is set up, and the fragility of power telecom network is carried out according to the vulnerability assessment model
Assessment,
NV(vi)=(B (vi)+NI(vi))×NP(vi)
EV(eij)=(B (eij)+EI(eij))×EP(eij)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) it is the topology fragility of node
Property, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side;NI
(vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side.
2. power telecom network vulnerability assessment method according to claim 1, it is characterised in that the topology of described node
Fragility B (vi) it is by the shortest path of node ratio shared in all shortest paths in a network;Side it is topological crisp
Weak property B (eij) it is by the shortest path of link ratio shared in all shortest paths in a network.
3. power telecom network vulnerability assessment method according to claim 1, it is characterised in that the business of the node is crisp
Weak property NP (vi) and side business fragility EP (eij) be respectively:
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service is k
Number of services;nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service for the business of k is important
Degree.
4. power telecom network vulnerability assessment method according to claim 1, it is characterised in that the equipment of the node is crisp
Weak property NI (vi) represented using pitch point importance, the equipment fragility EI (e on the sideij) represented using link importance degree.
5. power telecom network vulnerability assessment method according to claim 1, it is characterised in that the step 1) in set up
Undirected networks of having the right in the weight of each edge determine that time delay includes equipment delay and transmission by the propagation delay time on this link
Time delay.
6. a kind of power telecom network routing optimization method, it is characterised in that the optimization method is comprised the following steps:
1) network topology to power telecom network is modeled, by power telecom network definition as the Undirected networks G=that has the right
(V, E), wherein V={ v1,v2,…,vNRepresent network set of node, E={ eijRepresent network side collection;
2) according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility sexual factor
The vulnerability assessment model on node and side is set up,
NV(vi)=(B (vi)+NI(vi))×NP(vi)
EV(eij)=(B (eij)+EI(eij))×EP(eij)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) it is the topology fragility of node
Property, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side;NI
(vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side;
3) according to step 2) in the assessment models set up, by the fragility value on the maximum side of the whole network fragility be preferably minimized for
Optimization aim is optimized to route.
7. power telecom network routing optimization method according to claim 6, it is characterised in that the step 3) including following
Process:
A. according to according to step 2) in the assessment models set up set up fragility weight matrix VM={ mij, wherein mij=EV
(eij)+NV(vj), and set up maximum side fragility value array Vmax={ vmx, wherein vm1For the initial maximum before optimization is fragile
Property value;
B. the corresponding side e of maximum EV are selectedab, make mab=mba=∞, and by eabDeleted in topology on corresponding side;
C. by service path by side eabBusiness be stored in collection of services B={ B to be plannedy, an industry is randomly selected from B
Business B1, extract business B1Starting point start and terminal end;
D. with the minimum optimization aim of accumulative fragility, to business B1Route adjustment is carried out, is obtained according to fragility weight matrix VM
B1New route;
E. the fragility NV ' and EV ' on the whole network node and side are recalculated, and the maximum of EV ' is deposited into vmx;
F. vm is comparedxChange, if vmx≤vmx-1, then this business routing optimality success is illustrated, under the fragility of the whole network maximum side
Drop, and repeat step A to step F changes fragility weight matrix VM, selection fragility it is maximum while and this while on one
Business completes gravity treatment road;If vmx> vmx-1, this business routing optimality failure is illustrated, the path optimizing is not adopted, routing optimality
Terminate.
8. power telecom network routing optimization method according to claim 7, it is characterised in that the business of the node is fragile
Property NP (vi) and side business fragility EP (eij) be respectively:
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service is k
Number of services;nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service for the business of k is important
Degree.
9. power telecom network routing optimization method according to claim 7, it is characterised in that using being based on when network is initial
The Floyd shortest paths route selecting method of time delay weight completes routing configuration.
10. the power telecom network routing optimization method according to claim 6 or 7, it is characterised in that described node is opened up
Flutter fragility B (vi) it is by the shortest path of node ratio shared in all shortest paths in a network;The topology on side
Fragility B (eij) it is by the shortest path of link ratio shared in all shortest paths in a network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611106431.1A CN106789190B (en) | 2016-12-05 | 2016-12-05 | Vulnerability assessment and route optimization method for power communication network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611106431.1A CN106789190B (en) | 2016-12-05 | 2016-12-05 | Vulnerability assessment and route optimization method for power communication network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106789190A true CN106789190A (en) | 2017-05-31 |
CN106789190B CN106789190B (en) | 2020-03-06 |
Family
ID=58874324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611106431.1A Active CN106789190B (en) | 2016-12-05 | 2016-12-05 | Vulnerability assessment and route optimization method for power communication network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789190B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107807812A (en) * | 2017-11-10 | 2018-03-16 | 电子科技大学 | A kind of hardware vulnerability assessment method based on HDL code |
CN110210229A (en) * | 2019-04-29 | 2019-09-06 | 国网宁夏电力有限公司电力科学研究院 | Appraisal procedure, system and the storage medium of the fragility of electric network information physical system |
CN110414094A (en) * | 2019-07-11 | 2019-11-05 | 南京理工大学 | A kind of business different degree configuration method between power communication network node |
CN110474806A (en) * | 2019-08-19 | 2019-11-19 | 国网甘肃省电力公司经济技术研究院 | A kind of power telecom network key node recognition methods |
CN110740097A (en) * | 2019-10-31 | 2020-01-31 | 广东电网有限责任公司 | electric power communication network routing scheme evaluation method and device |
CN110971525A (en) * | 2019-11-26 | 2020-04-07 | 武汉大学 | Service routing and addressing method for service operation of power communication network |
CN111147288A (en) * | 2019-12-14 | 2020-05-12 | 贵州电网有限责任公司 | Power dispatching communication network node importance identification and evaluation method |
CN111865660A (en) * | 2020-06-12 | 2020-10-30 | 广东电网有限责任公司 | Operation risk evaluation method and system for network equipment |
CN112003734A (en) * | 2020-07-28 | 2020-11-27 | 长沙理工大学 | Improved structure entropy based key node identification method for information physical system |
CN112149967A (en) * | 2020-09-04 | 2020-12-29 | 华中科技大学 | Power communication network vulnerability assessment method and system based on complex system theory |
CN112306776A (en) * | 2020-11-20 | 2021-02-02 | 浙江大学 | Safety analysis method for out-of-limit vulnerability of terminal equipment |
CN112615365A (en) * | 2020-12-08 | 2021-04-06 | 国网四川省电力公司经济技术研究院 | Smart power grid vulnerability key point identification method and device |
CN113242213A (en) * | 2021-04-15 | 2021-08-10 | 内蒙古电力(集团)有限责任公司内蒙古电力经济技术研究院分公司 | Power communication backbone network node vulnerability diagnosis method |
CN113759728A (en) * | 2021-09-30 | 2021-12-07 | 中国船舶重工集团公司第七一九研究所 | Modeling method for digital network control system |
CN115333829A (en) * | 2022-08-10 | 2022-11-11 | 国网智能电网研究院有限公司 | Attack behavior track discovery method, device, equipment and storage medium |
CN115473817A (en) * | 2022-08-10 | 2022-12-13 | 武汉大学 | Method and system for constructing power information network considering spatial characteristics |
CN116016325A (en) * | 2022-11-17 | 2023-04-25 | 徐州华电电力勘察设计有限公司 | Power service dual-route planning method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080163373A1 (en) * | 2006-12-29 | 2008-07-03 | William Maynard | Embedded mechanism for platform vulnerability assessment |
CN101964730A (en) * | 2010-01-28 | 2011-02-02 | 北京邮电大学 | Network vulnerability evaluation method |
CN102098306A (en) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | Network attack path analysis method based on incidence matrixes |
CN102447695A (en) * | 2011-11-14 | 2012-05-09 | 中国科学院软件研究所 | Method for identifying key attack path in service system |
CN104579868A (en) * | 2014-11-28 | 2015-04-29 | 广东电网有限责任公司电力调度控制中心 | Construction method of electric powder communication network based on node importance |
CN105721207A (en) * | 2016-01-29 | 2016-06-29 | 国家电网公司 | Method and device for determining importance of communication nodes in power communication network |
-
2016
- 2016-12-05 CN CN201611106431.1A patent/CN106789190B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080163373A1 (en) * | 2006-12-29 | 2008-07-03 | William Maynard | Embedded mechanism for platform vulnerability assessment |
CN101964730A (en) * | 2010-01-28 | 2011-02-02 | 北京邮电大学 | Network vulnerability evaluation method |
CN102098306A (en) * | 2011-01-27 | 2011-06-15 | 北京信安天元科技有限公司 | Network attack path analysis method based on incidence matrixes |
CN102447695A (en) * | 2011-11-14 | 2012-05-09 | 中国科学院软件研究所 | Method for identifying key attack path in service system |
CN104579868A (en) * | 2014-11-28 | 2015-04-29 | 广东电网有限责任公司电力调度控制中心 | Construction method of electric powder communication network based on node importance |
CN105721207A (en) * | 2016-01-29 | 2016-06-29 | 国家电网公司 | Method and device for determining importance of communication nodes in power communication network |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107807812A (en) * | 2017-11-10 | 2018-03-16 | 电子科技大学 | A kind of hardware vulnerability assessment method based on HDL code |
CN110210229A (en) * | 2019-04-29 | 2019-09-06 | 国网宁夏电力有限公司电力科学研究院 | Appraisal procedure, system and the storage medium of the fragility of electric network information physical system |
CN110210229B (en) * | 2019-04-29 | 2021-08-13 | 国网宁夏电力有限公司电力科学研究院 | Method and system for evaluating vulnerability of power grid information physical system and storage medium |
CN110414094A (en) * | 2019-07-11 | 2019-11-05 | 南京理工大学 | A kind of business different degree configuration method between power communication network node |
CN110414094B (en) * | 2019-07-11 | 2022-09-13 | 南京理工大学 | Method for configuring service importance between nodes of power communication network |
CN110474806A (en) * | 2019-08-19 | 2019-11-19 | 国网甘肃省电力公司经济技术研究院 | A kind of power telecom network key node recognition methods |
CN110474806B (en) * | 2019-08-19 | 2022-04-01 | 国网甘肃省电力公司经济技术研究院 | Power communication network key node identification method |
CN110740097A (en) * | 2019-10-31 | 2020-01-31 | 广东电网有限责任公司 | electric power communication network routing scheme evaluation method and device |
CN110740097B (en) * | 2019-10-31 | 2021-09-03 | 广东电网有限责任公司 | Method and device for evaluating routing scheme of power communication network |
CN110971525B (en) * | 2019-11-26 | 2021-02-19 | 武汉大学 | Service routing and addressing method for service operation of power communication network |
CN110971525A (en) * | 2019-11-26 | 2020-04-07 | 武汉大学 | Service routing and addressing method for service operation of power communication network |
CN111147288B (en) * | 2019-12-14 | 2023-02-03 | 贵州电网有限责任公司 | Power dispatching communication network node importance identification and evaluation method |
CN111147288A (en) * | 2019-12-14 | 2020-05-12 | 贵州电网有限责任公司 | Power dispatching communication network node importance identification and evaluation method |
CN111865660A (en) * | 2020-06-12 | 2020-10-30 | 广东电网有限责任公司 | Operation risk evaluation method and system for network equipment |
CN112003734A (en) * | 2020-07-28 | 2020-11-27 | 长沙理工大学 | Improved structure entropy based key node identification method for information physical system |
CN112149967B (en) * | 2020-09-04 | 2024-02-06 | 华中科技大学 | Power communication network vulnerability assessment method and system based on complex system theory |
CN112149967A (en) * | 2020-09-04 | 2020-12-29 | 华中科技大学 | Power communication network vulnerability assessment method and system based on complex system theory |
CN112306776B (en) * | 2020-11-20 | 2022-05-10 | 浙江大学 | Safety analysis method for out-of-limit vulnerability of terminal equipment |
CN112306776A (en) * | 2020-11-20 | 2021-02-02 | 浙江大学 | Safety analysis method for out-of-limit vulnerability of terminal equipment |
CN112615365A (en) * | 2020-12-08 | 2021-04-06 | 国网四川省电力公司经济技术研究院 | Smart power grid vulnerability key point identification method and device |
CN113242213A (en) * | 2021-04-15 | 2021-08-10 | 内蒙古电力(集团)有限责任公司内蒙古电力经济技术研究院分公司 | Power communication backbone network node vulnerability diagnosis method |
CN113759728A (en) * | 2021-09-30 | 2021-12-07 | 中国船舶重工集团公司第七一九研究所 | Modeling method for digital network control system |
CN113759728B (en) * | 2021-09-30 | 2023-08-25 | 中国船舶重工集团公司第七一九研究所 | Modeling method for digital network control system |
CN115333829A (en) * | 2022-08-10 | 2022-11-11 | 国网智能电网研究院有限公司 | Attack behavior track discovery method, device, equipment and storage medium |
CN115473817A (en) * | 2022-08-10 | 2022-12-13 | 武汉大学 | Method and system for constructing power information network considering spatial characteristics |
CN115473817B (en) * | 2022-08-10 | 2023-08-15 | 武汉大学 | Construction method and system of power information network considering spatial characteristics |
CN116016325A (en) * | 2022-11-17 | 2023-04-25 | 徐州华电电力勘察设计有限公司 | Power service dual-route planning method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106789190B (en) | 2020-03-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789190A (en) | A kind of power telecom network vulnerability assessment and routing optimization method | |
CN105553869B (en) | A kind of risk balance method and system of power telecom network | |
CN106253270B (en) | Electric system vulnerable line identifying method and system | |
CN107682195B (en) | Communication network robustness evaluation method based on combination of complex network and big data | |
CN104466959B (en) | Power system critical circuits discrimination method and system | |
CN112633649A (en) | Power grid multi-attribute important node evaluation and planning method | |
CN104901886B (en) | Consider that time delay communicates circuitous channel restructing algorithm with the wide area protection of flow equalization | |
CN105976048A (en) | Power transmission network extension planning method based on improved artificial bee colony algorithm | |
CN107769962A (en) | A kind of communication network failure cascade venture influence analysis method of attack resistance | |
CN110414094A (en) | A kind of business different degree configuration method between power communication network node | |
CN103607320A (en) | An electric power communication network survivability evaluating method | |
CN110096764A (en) | A kind of identification of electric-gas coupled system vulnerable line and optimization method | |
CN112149967A (en) | Power communication network vulnerability assessment method and system based on complex system theory | |
CN114282855A (en) | Comprehensive protection method of electric-gas coupling system under heavy load distribution attack | |
CN106067074A (en) | A kind of by optimizing the method that the on off state of link promotes network system robustness | |
CN115879806A (en) | Power system and traffic network vulnerability assessment method based on complex network | |
CN106951615B (en) | Electric power transportation network Topology Structure Design method based on close female algorithm | |
CN112865085A (en) | Attack simulation method and system for electric power information physical system | |
US20240305519A1 (en) | Detecting and mitigating cascading errors in a network to improve network resilience | |
CN116015707A (en) | Network topology optimization method, device and terminal for power distribution network information physical system | |
CN110048884B (en) | Intelligent power distribution network communication network planning method for resisting random attack and intentional network attack | |
Dong et al. | Mitigating cascading failures of spatially embedded cyber–physical power systems by adding additional information links | |
He et al. | Topological approach to measure network recoverability | |
CN107294851B (en) | A kind of router level network topology estimating method | |
Ji et al. | Comprehensive vulnerability assessment and optimisation method of power communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |