CN106789190A - A kind of power telecom network vulnerability assessment and routing optimization method - Google Patents

A kind of power telecom network vulnerability assessment and routing optimization method Download PDF

Info

Publication number
CN106789190A
CN106789190A CN201611106431.1A CN201611106431A CN106789190A CN 106789190 A CN106789190 A CN 106789190A CN 201611106431 A CN201611106431 A CN 201611106431A CN 106789190 A CN106789190 A CN 106789190A
Authority
CN
China
Prior art keywords
fragility
node
business
network
power telecom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611106431.1A
Other languages
Chinese (zh)
Other versions
CN106789190B (en
Inventor
王文革
戚晓勇
王正
邵奇
郝洋
李路远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Henan Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Henan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Information and Telecommunication Branch of State Grid Henan Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201611106431.1A priority Critical patent/CN106789190B/en
Publication of CN106789190A publication Critical patent/CN106789190A/en
Application granted granted Critical
Publication of CN106789190B publication Critical patent/CN106789190B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/14Routing performance; Theoretical aspects

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of power telecom network vulnerability assessment and routing optimization method, belong to technical field of electric power communication.The present invention is modeled to the network topology of power telecom network, and power telecom network definition is turned into a Undirected networks of having the right;According to influence node and while the topology fragility sexual factor of fragility, business fragility sexual factor and equipment fragility sexual factor set up node and while vulnerability assessment model, and the fragility of power telecom network is estimated according to the vulnerability assessment model.The present invention will influence the factor of node and side fragility to be summarized as topological fragility, three kinds of factors of business fragility and equipment fragility, and comprehensive vulnerability inder is obtained according to triadic relation, the fragility size on node and side can be comprehensively showed, the accuracy to power telecom network vulnerability assessment is improved.

Description

A kind of power telecom network vulnerability assessment and routing optimization method
Technical field
The present invention relates to a kind of power telecom network vulnerability assessment and routing optimization method, belong to power system telecommunications technology neck Domain.
Background technology
Power telecom network is the indispensable important component of power system, is power network schedule automation, network operation The marketization and the basis of management modernization, are the important infrastructures of intelligent grid development.The net loaded relay of power communication is protected The business energy communication service such as shield, stability contorting, power distribution automation, it is closely related with power generation, once break down will be right The stable operation of power network threatens, therefore development power telecom network fragility correlative study has great importance.
Definition angle from the index such as reliability is different, and fragility refers to the weakness or defect being present in a system, System is specific to one to threaten the sensitiveness of attack or hazard event, or the possibility that the threat attacked is acted on.And In power telecom network, fragility is commonly defined as after removal node or side, the decline degree of network performance.The index can refer to Weak link in bright network, while being that network management and optimization provide distinguishing rule.By setting up rational power telecom network Vulnerability assessment index system, realizes the vulnerability assessment to nodes and side, and the network after assessment obtains its tender spots: Fragility some nodes higher and side, the traffic failure risk carried on the node and side are big, therefore enter according to assessment result Row further business route adjustment has practical significance with optimization.
Vulnerability assessment to power telecom network at present is based primarily upon Complex Networks Theory to carry out, further, main flow Research method be divided into three kinds.The first is the power telecom network architectural vulnerability assessment side based on classical Complex Networks Theory Method.The method breaches the limitation of network size, but can only provide network topology architectural vulnerability in itself, also not yet considers electricity Influence of the different grades of business of power communication network to network;Second is that Complex Networks Theory is combined with convectional reliability calculating Method, but still without distinguish carrying business grade;The third is the fragility that service impact is combined with Complex Networks Theory Property appraisal procedure, rational optimization method is not given.In terms of fragility optimization, there are highly several sections of point protection strategies at present Network vulnerability is reduced with low powered posterior chamber node edged strategy, but both strategies need to rise the structure of existing network Level, can bring extra artificial and capital input;The business routing optimization method of comentropy is also based on, but algorithm is relatively simple It is single, do not consider the dynamic updating process of fragility.Method for configuring route mainly has following four in existing power telecom network.
Technical scheme 1:Patent publication No. is CN105306364A's《Energy communication service route based on business importance degree Distribution method》Patent, discloses a kind of energy communication service route distribution method based on business importance degree.First, to electric power Communication route network carries out network reduction, sets source node and destination node, and K bars road is found according to different electrical circuit transmission paths Every paths are set corresponding importance degree, wherein K >=1 by footpath;Then according to power communication route network reliability analysis model Logical mappings matrix G, and threshold value TH are obtained, and according to logical mappings matrix G and threshold value TH, finds complete set CS and searching Contact set TS;Finally, node reliability is replaced using service node risk, while replacing side using service path risk Reliability, finally calculates reliability values, so as to obtain power communication route network optimal path.It is important that the program is based on business Business route of making rational planning for is spent, system centralized risk is changed into diversifying risks, had to risk prevention system caused by business concentrations It is significant, but the method does not account for the weight of node device and link.
Technical scheme 2:Patent publication No. is CN104468355A's《A kind of power train based on power communication reciprocal effect The detection method of fragility of uniting》Patent, discloses a kind of detection of the power system vulnerability based on power communication reciprocal effect Method, the detection method is comprised the following steps:Step 10):Set up electric power-communication hybrid system incidence matrix;Step 20):Survey Power system vulnerability is calculated, electric power networks node vulnerability inder and electric power networks branch vulnerability index is obtained;Step 30): Measuring and calculating communication service fragility, including communication network node vulnerability inder and communication network branch vulnerability index;Step 40):Calculate power communication information interaction passage fragility;Step 50):By step 20), step 30) and step 40) obtain it is crisp Weak property index substitutes into electric power-communication hybrid system incidence matrix, obtains electric power-communication hybrid system fragility matrix, and be directed to Hybrid system fragility numerical value carries out sequence from big to small.The detection method can combine shadow of the communication system to power system The factor of sound, more accurately detects the fragility of power system, but the method is not very in the vulnerability assessment of communication network Comprehensively.
Technical scheme 3:Patent publication No. is CN101667972's《Power communication network service routing method and equipment》Specially Profit, discloses a kind of power communication network service routing method and device, and methods described includes:A. given birth to according to network optimization target Into objective optimization function;B. the start node of business is determined, and as present node;C. calculate and work as using ant group algorithm The transition probability of the connected each bar link of front nodal point, the transition probability is calculated according to the pheromones on current each bar link Arrive;D. next-hop node is selected according to the transition probability;Whether the next-hop node for E. judging selection is the business Destination node;If it is, the next-hop node that will be selected is used as present node, and determined to work as according to the objective optimization function Pheromones on preceding each bar link, then repeat step C to step E;Otherwise, according to business start node, Yi Jixuan The route of all next-hop nodes generation correspondence business selected, the program can ensure multi-service road in powerline network By best performance, but do not consider the delay characteristics of power communication network service, the consideration for business risk is also not complete enough.
Technical scheme 4:Patent publication No. is CN103873363A's《A kind of double route of power optical fiber communication network service is matched somebody with somebody Put method》, disclose a kind of double route collocation method of power optical fiber communication network service.The method includes:According to Practical Project, Set up rationally effective power optical fiber communication network service mode;Business is ranked up according to importance degree, and by improving Bhandari algorithms, configure two complete disjoint routes.New algorithm processes two aside network figure according to actual conditions, and allows Every maximum bearer traffic of optical cable of setting.The program disclosure satisfy that and all should configure two electric power for being kept completely separate path The demand of business, it is ensured that business is still safe and reliable in the case of the failures such as disconnected cable;But have ignored energy communication service when Prolong feature, the consideration for business risk is also not complete enough.
The content of the invention
It is crisp to power communication at present to solve it is an object of the invention to provide a kind of power telecom network vulnerability assessment method Weak property assesses not accurate enough problem;Meanwhile, present invention also offers a kind of power telecom network routing optimization method, solve current The unbalanced problem of power telecom network fragility.
The present invention provides a kind of power telecom network vulnerability assessment method to solve above-mentioned technical problem, the appraisal procedure Comprise the following steps:
1) network topology to power telecom network is modeled, and power telecom network definition is turned into a Undirected networks of having the right G=(V, E), wherein V={ v1,v2,…,vNRepresent network set of node, E={ eijRepresent network side collection;
2) according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility Factor sets up the vulnerability assessment model on node and side, and according to the vulnerability assessment model to the fragility of power telecom network It is estimated,
NV(vi)=(B (vi)+NI(vi))×NP(vi)
EV(eij)=(B (eij)+EI(eij))×EP(eij)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) opening up for node Flutter fragility, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side Property;NI(vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side.
Further, the topological fragility B (v of described nodei) it is by the shortest path institute in a network of the node There is shared ratio in shortest path;The topological fragility B (e on sideij) it is own in a network by the shortest path of the link Shared ratio in shortest path.
Further, the business fragility NP (v of the nodei) and side business fragility EP (eij) be respectively:
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service It is the number of services of k;nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service is the business weight of k Spend.
Further, the equipment fragility NI (v of the nodei) represented using pitch point importance, the equipment on the side Fragility EI (eij) represented using link importance degree.
Further, the step 1) in set up Undirected networks of having the right in each edge weight by the biography on this link Defeated time delay determines that time delay includes equipment delay and propagation delay time.
Present invention also offers a kind of power telecom network routing optimization method, the optimization method is comprised the following steps:
1) network topology to power telecom network is modeled, and power telecom network definition is turned into a Undirected networks of having the right G=(V, E), wherein V={ v1,v2,…,vNRepresent network set of node, E={ eijRepresent network side collection;
2) according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility Factor sets up the vulnerability assessment model on node and side,
NV(vi)=(B (vi)+NI(vi))×NP(vi)
EV(eij)=(B (eij)+EI(eij))×EP(eij)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) opening up for node Flutter fragility, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side Property;NI(vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side;
3) according to step 2) in the assessment models set up, the fragility value on the maximum side of the whole network fragility is dropped to most It is low for optimization aim to route optimize.
Further, the step 3) including procedure below:
A. according to according to step 2) in the assessment models set up set up fragility weight matrix VM={ mij, wherein mij =EV (eij)+NV(vj), and set up maximum side fragility value array Vmax={ vmx, wherein vm1It is the initial maximum before optimization Fragility value;
B. the corresponding side e of maximum EV are selectedab, make mab=mba=∞, and by eabDeleted in topology on corresponding side;
C. by service path by side eabBusiness be stored in collection of services B={ B to be plannedy, one is randomly selected from B Individual business B1, extract business B1Starting point start and terminal end;
D. with the minimum optimization aim of accumulative fragility, to business B1Route adjustment is carried out, according to fragility weight matrix VM obtains B1New route;
E. the fragility NV ' and EV ' on the whole network node and side are recalculated, and the maximum of EV ' is deposited into vmx
F. vm is comparedxChange, if vmx≤vmx-1, then this business routing optimality success is illustrated, the whole network maximum side is fragile Property decline, and repeat step A to step F changes fragility weight matrix VM, selection fragility it is maximum while and this while on One business completes gravity treatment road;If vmx> vmx-1, this business routing optimality failure is illustrated, the path optimizing is not adopted, is route Optimization terminates.
Further, the business fragility NP (v of the nodei) and side business fragility EP (eij) be respectively:
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service It is the number of services of k;nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service is the business weight of k Spend.
Further, when network is initial using based on the Floyd shortest paths route selecting method of time delay weight come complete route Configuration.
Further, the topological fragility B (v of described nodei) it is by the shortest path institute in a network of the node There is shared ratio in shortest path;The topological fragility B (e on sideij) it is own in a network by the shortest path of the link Shared ratio in shortest path.
The beneficial effects of the invention are as follows:The present invention is modeled to the network topology of power telecom network, by power telecom network Definition turns into a Undirected networks of having the right;According to influence node and side fragility topology fragility sexual factor, business fragility because Element and equipment fragility sexual factor set up the vulnerability assessment model on node and side, and according to the vulnerability assessment model to electricity The fragility of power communication network is estimated.The present invention will influence the factor of node and side fragility to be summarized as topological fragility, industry Business three kinds of factors of fragility and equipment fragility, and comprehensive vulnerability inder is obtained according to triadic relation, can show comprehensively Node and the fragility size on side, improve the accuracy to power telecom network vulnerability assessment.
In addition the characteristics of being weighed present invention is alternatively directed to fragility skewness, it is proposed that based on the dynamic of Min-Max principles Business routing optimization method, the method using above-mentioned node and while vulnerability assessment model obtain node and while fragility Value, and node and the fragility value on side to obtain are used as the foundation of business routing optimality, by the whole network maximum side fragility value drop To minimum, network vulnerability is also reached equilibrium, enhance the robustness of network.
Brief description of the drawings
Fig. 1 is the network topological diagram of power telecom network in the embodiment of the present invention.
Specific embodiment
Specific embodiment of the invention is described further below in conjunction with the accompanying drawings.
The embodiment of power telecom network vulnerability assessment method of the present invention
The present invention analyzes topology, business, three kinds of influence factors of Chemical Apparatus Importance Classification, and combine in terms of vulnerability assessment These factors propose a comprehensive vulnerability inder to evaluate the fragility of nodes and side, and different attacking is selected afterwards Model is hit to be estimated the reasonability of index.The method is comprised the following steps that.
1. the network topology of pair power telecom network is modeled, and power telecom network definition is turned into an indirected net of having the right Network.
The present invention is modeled using Complex Networks Theory to the network topology of power telecom network, and power telecom network is defined As a Undirected networks of having the right, the node device in the network does not consider the inactive components such as distributing frame.The weight of each edge by Propagation delay time on this link determines that time delay includes equipment delay and propagation delay time.Therefore, power telecom network can be with containing N number of node, undirected network G of having the right=(V, the E) expressions on M bars side, wherein V={ v1,v2,…,vNRepresent network set of node, E ={ eijRepresent network side collection.It is the adjacency matrix of power telecom network, if being deposited between node i and node j Connected in optical cable, then aij=1, otherwise aij=0.Weight matrixElement wijRepresent side eijTime delay power Weight.
2. according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility Factor sets up the vulnerability assessment model on node and side, and according to the vulnerability assessment model to the fragility of power telecom network It is estimated.
Modeling from power network is different, the class of business that power telecom network is carried by it, quantity, and the difference of importance degree causes It is as follows to business model when assessing the fragility of network, it is necessary to consider the influence of the business to network of the network carrying:Definition business Collection is combined into S={ sk, single service class skThere are four attribute (start, end, route, Ck), they represent starting point respectively, eventually Point, the transmission path of business, business importance degree.
1) topology fragility sexual factor
Complex Networks Theory defines many parameters for describing network topology characteristic, some of them parameter and networks vulnerable Sexual intercourse is close.Node viBetweenness B (vi) be defined as by the shortest path institute in all shortest paths in a network of the node The ratio for accounting for, side eijBetweenness B (eij) it is by the shortest path of link ratio shared in all shortest paths in a network Example.Betweenness index can weigh node and side significance level in a network, therefore reflect node and side using betweenness herein Topological fragility.
2) business fragility sexual factor
When carrying out vulnerability analysis to actual power telecom network, it is necessary to the influence that consideration business is brought.Use node pressure (Node Pressure, NP) and channel pressure (Edge Pressure, EP) represent the business fragility of node and side.Its In, node pressure refers to the comprehensive embodiment of the number of services that a certain node is carried in power telecom network and importance degree.Pressure refers to The bigger node of number, its failure is bigger to the potential impact of operation of power networks and threat, and its business fragility is higher.Use node pressure Index NP (vi) represent node viPressure size.Wherein NP (vi) be expressed as:
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service It is the number of services of k;CkFor type of service is the business importance degree of k.
Channel pressure refers to the business that a certain passage section (such as multiplex section or optical cable segment) is carried in power telecom network The comprehensive embodiment of quantity and importance degree.A certain channel pressure index is bigger, shows potential shadow of the channel failure to operation of power networks Ring and threaten bigger, its business fragility is higher.EP(eij) it is side eijChannel pressure index, its expression formula is as follows:
Wherein, nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service is the business weight of k Spend.
3) equipment fragility sexual factor
Its importance degree of the node of different stage and link is different, and such as the importance degree of transformer station's class node is with website voltage level Change, control centre's class node and data, disaster recovery center class node its importance degree increase etc. with the increase of rank.Attack The importance degree of node or link is bigger, and the influence degree to network performance is bigger, therefore uses pitch point importance (Node Importance, NI) and link importance degree (Link Importance, LI) come represent equipment fragility sexual factor.
4) comprehensive vulnerability inder
In summary three kinds of fragile sexual factors, obtain the comprehensive vulnerability inder on node and side, i.e. node and side fragility Assessment models.Definition node fragility (Node Vulnerability, NV) and side fragility (Edge Vulnerability, EV), institute's established model is as follows
NV(vi)=(B (vi)+NI(vi))×NP(vi) (3)
EV(eij)=(B (eij)+EI(eij))×EP(eij) (4)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) opening up for node Flutter fragility, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side Property;NI(vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side.
The definition of above expression formula combine the probability attacked in node or side and attacked after influence.Attacked in selection When hitting target, often select that there is key position in topology and the big node of importance degree and side are attacked, and attacked The influence that the service disconnection being mainly on the node or side into the rear influence caused to network is brought.Therefore, by taking node as an example, by Knowable to formula (3), when the betweenness of node is larger with importance degree sum, while when node pressure is smaller, NV values are smaller, the node is illustrated The probability attacked is big, but the business interrupted after attacking is seldom or the business importance degree very little interrupted, i.e. preemption penalty is smaller, crisp Weak property is smaller;When node betweenness is smaller with importance degree sum, while when NP is larger, the NV values of the node are smaller, illustrate the node Although losing larger after being attacked, attack probability is relatively low, and fragility is not high;As B (vi) and NV (vi) sum and NP be simultaneously larger When, NV values are larger, and now node is not only big by attack probability, loses also larger after attack, and fragility is high;As B (vi) and NV (vi) When sum is simultaneously smaller with NP, NV values are smaller, and now node is small by attack probability, lose also smaller after attack, and fragility is low.
The embodiment of power telecom network routing optimization method of the present invention
The characteristics of being weighed for fragility skewness, the present invention proposes the dynamic business road based on Min-Max principles By optimization method, the method is based on the power telecom network vulnerability assessment model set up in above-described embodiment, and the whole network is crisp The fragility value on the maximum side of weak property is preferably minimized as optimization aim is optimized to route.Concrete implementation step is as follows:
Step 1:Set up fragility weight matrix VM={ mij, wherein mij=EV (eij)+NV(vj), as side eijWith section Point vjFragility value sum;Set up maximum side fragility value array Vmax={ vmx, for storing each routing optimality back The change of maximum fragility value, wherein vm1It is the initial maximum fragility value before optimization;
Step 2:Often complete a business routing optimality and after updating network vulnerability, the corresponding side e of selection maximum EVab, Make mab=mba=∞, will eabCorresponding side is deleted in topology, to carry out new route planning;
Step 3:By service path by side eabBusiness be stored in collection of services B={ B to be plannedy, from B in order Choose a business B1, extract business B1Starting point start and terminal end;
Step 4:With the minimum optimization aim of accumulative fragility, to business B1Route adjustment is carried out, using Floyd algorithms, It is routed according to fragility weight matrix VM, obtains B1New route;
Step 5:The fragility NV ' and EV ' on the whole network node and side are recalculated, and the maximum of EV ' is deposited into vmx
Step 6:Compare vmxChange, if vmx≤vmx-1, then this business routing optimality success, the whole network maximum side are illustrated Fragility declines, and repeat step one is to step 6, changes fragility weight matrix VM, selects the maximum side of fragility and is somebody's turn to do A business on side completes gravity treatment road;If vmx> vmx-1, this business routing optimality failure is illustrated, the path optimizing is not adopted Receive, algorithm terminates.
In order to verify effectiveness of the invention, emulated under the topology close to reality network.Simulation example is used A part for certain provincial company power communication backbone transport networks.Shown in topological diagram G Fig. 1, net nodes N=17, side number M=25. From emulation topological diagram 1, node and side in network have different ranks, and the importance degree of different stage is different, according to current The importance degree on the actual conditions of electric power networks, 500KV nodes and side be respectively 2.22 and 1.25,220KV node and side it is important Degree is respectively 1.86 and 0.8.
Collection of services S={ the s used in emulationkIn include 10 business, it is known that the terminal and business of business are important Degree, by terminal and the propagation delay time on each side, initial road is obtained by Floyd algorithms by optimization aim of minimal service propagation delay time By service conditions is as shown in table 1.
Table 1
Business sequence number Terminal Business importance degree Initial route
s1 1—4 9.793 1—3—4
s2 1—6 5.515 1—7—6
s3 3—7 7.970 3—6—7
s4 2—6 9.793 2—7—6
s5 2—5 7.970 2—7—6—5
s6 3—5 5.515 3—4—5
s7 3—1 9.793 3—1
s8 4—6 5.515 4—5—6
s9 4—7 7.970 4—5—6—7
s10 5—7 9.793 5—6—7
By the vulnerability assessment model in embodiment, the betweenness on calculate node and side, the index such as pressure obtains node and side Fragility as shown in table 2 and table 3.
Table 2
Node ID 1 2 3 4 5 6 7
NV 55.7242 39.4338 76.5672 65.2915 71.8804 114.4007 102.8297
Table 3
Side sequence number 1-2 1-3 1-7 2-3 2-7
EV 0 26.3478 5.4624 0 17.5938
Side sequence number 3-4 3-6 4-5 5-6 6-7
EV 22.0508 7.1350 18.8190 33.9264 57.8796
Therefrom it can be seen that while 1-2 and while 2-3 fragility value be 0 because artificial network is undersized, business point Cloth is not uniform enough, causes the initial route of 10 business not have by this two sides, and channel pressure is zero, ultimately results in fragility Property be zero, but in real network do not exist such case.After obtaining the fragility value on node and side, the excellent of route is proceeded by Change.From the EV values on side in table 3, the side fragility between node 6 and node 7 is maximum, therefore first to carrying on the side Business carries out route planning, and step is as follows:
1) optimization front maximum fragility is side 6-7, and max (EV) is 57.8796;
2) it is { s by the collection of services of side 6-72, s3, s4, s5, s9, s10, selection business 2 is carried out with accumulative fragility most The small route weight-normality for optimization aim is drawn, and it is 1-3-6 to obtain new route, updates the whole network fragility value, is obtained after the completion of renewal crisp Maximum 6-7, the max (EV)=51.3667 when being still of weak property, than being reduced before this suboptimization, algorithm continues;
3) to business s3Carry out route weight-normality to draw, it is 3-2-7 to obtain new route, updates the whole network fragility value, updates and completes After obtain fragility it is maximum while still for while 6-7, max (EV)=36.81, than being reduced before this suboptimization, algorithm continues;
4) to business s4Carry out route weight-normality to draw, it is 2-3-6 to obtain new route, updates the whole network fragility value, updates and completes After obtain fragility maximum when being changed into 1-3, max (EV)=33.7668, than before this suboptimization reduce, algorithm continue;
5) it is { s by the collection of services of side 1-31, s2, s7, selection business s1Carry out route weight-normality to draw, newly route It is 1-2-3-4, updates the whole network fragility value, fragility maximum side is obtained after the completion of renewal and is changed between node 2 and node 3 Side, max (EV)=37.0694, than being raised before this suboptimization, algorithm terminates;
So far, complete based on fragility routing optimality in a balanced way, the whole network fragility reaches equalization target.
The present invention uses the fragility value on node and side as the foundation of business routing optimality, and the result of routing optimality can be with Make the maximum fragility value on side minimum, while network vulnerability is more balanced, enhance the robustness of network.

Claims (10)

1. a kind of power telecom network vulnerability assessment method, it is characterised in that the appraisal procedure is comprised the following steps:
1) network topology to power telecom network is modeled, by power telecom network definition as the Undirected networks G=that has the right (V, E), wherein V={ v1,v2,…,vNRepresent network set of node, E={ eijRepresent network side collection;
2) according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility sexual factor The vulnerability assessment model on node and side is set up, and the fragility of power telecom network is carried out according to the vulnerability assessment model Assessment,
NV(vi)=(B (vi)+NI(vi))×NP(vi)
EV(eij)=(B (eij)+EI(eij))×EP(eij)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) it is the topology fragility of node Property, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side;NI (vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side.
2. power telecom network vulnerability assessment method according to claim 1, it is characterised in that the topology of described node Fragility B (vi) it is by the shortest path of node ratio shared in all shortest paths in a network;Side it is topological crisp Weak property B (eij) it is by the shortest path of link ratio shared in all shortest paths in a network.
3. power telecom network vulnerability assessment method according to claim 1, it is characterised in that the business of the node is crisp Weak property NP (vi) and side business fragility EP (eij) be respectively:
N P ( v i ) = Σ k = 1 Q n k ( v i ) × C k
E P ( e i j ) = Σ k = 1 Q n k ( e i j ) × C k
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service is k Number of services;nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service for the business of k is important Degree.
4. power telecom network vulnerability assessment method according to claim 1, it is characterised in that the equipment of the node is crisp Weak property NI (vi) represented using pitch point importance, the equipment fragility EI (e on the sideij) represented using link importance degree.
5. power telecom network vulnerability assessment method according to claim 1, it is characterised in that the step 1) in set up Undirected networks of having the right in the weight of each edge determine that time delay includes equipment delay and transmission by the propagation delay time on this link Time delay.
6. a kind of power telecom network routing optimization method, it is characterised in that the optimization method is comprised the following steps:
1) network topology to power telecom network is modeled, by power telecom network definition as the Undirected networks G=that has the right (V, E), wherein V={ v1,v2,…,vNRepresent network set of node, E={ eijRepresent network side collection;
2) according to influence node and the topology fragility sexual factor of side fragility, business fragility sexual factor and equipment fragility sexual factor The vulnerability assessment model on node and side is set up,
NV(vi)=(B (vi)+NI(vi))×NP(vi)
EV(eij)=(B (eij)+EI(eij))×EP(eij)
Wherein, NV (vi) it is the comprehensive fragility of node, EV (eij) it is the comprehensive fragility on side;B(vi) it is the topology fragility of node Property, B (eij) it is the topological fragility on side;NP(vi) it is the business fragility of node, EP (eij) it is the business fragility on side;NI (vi) it is the equipment fragility of node, EI (eij) it is the equipment fragility on side;
3) according to step 2) in the assessment models set up, by the fragility value on the maximum side of the whole network fragility be preferably minimized for Optimization aim is optimized to route.
7. power telecom network routing optimization method according to claim 6, it is characterised in that the step 3) including following Process:
A. according to according to step 2) in the assessment models set up set up fragility weight matrix VM={ mij, wherein mij=EV (eij)+NV(vj), and set up maximum side fragility value array Vmax={ vmx, wherein vm1For the initial maximum before optimization is fragile Property value;
B. the corresponding side e of maximum EV are selectedab, make mab=mba=∞, and by eabDeleted in topology on corresponding side;
C. by service path by side eabBusiness be stored in collection of services B={ B to be plannedy, an industry is randomly selected from B Business B1, extract business B1Starting point start and terminal end;
D. with the minimum optimization aim of accumulative fragility, to business B1Route adjustment is carried out, is obtained according to fragility weight matrix VM B1New route;
E. the fragility NV ' and EV ' on the whole network node and side are recalculated, and the maximum of EV ' is deposited into vmx
F. vm is comparedxChange, if vmx≤vmx-1, then this business routing optimality success is illustrated, under the fragility of the whole network maximum side Drop, and repeat step A to step F changes fragility weight matrix VM, selection fragility it is maximum while and this while on one Business completes gravity treatment road;If vmx> vmx-1, this business routing optimality failure is illustrated, the path optimizing is not adopted, routing optimality Terminate.
8. power telecom network routing optimization method according to claim 7, it is characterised in that the business of the node is fragile Property NP (vi) and side business fragility EP (eij) be respectively:
N P ( v i ) = Σ k = 1 Q n k ( v i ) × C k
E P ( e i j ) = Σ k = 1 Q n k ( e i j ) × C k
Wherein k is type of service, and Q is the species of business, and the value of k is from 1 to Q;nk(vi) it is node viUpper type of service is k Number of services;nk(eij) it is side eijThe type of service of carrying is the number of services of k;CkFor type of service for the business of k is important Degree.
9. power telecom network routing optimization method according to claim 7, it is characterised in that using being based on when network is initial The Floyd shortest paths route selecting method of time delay weight completes routing configuration.
10. the power telecom network routing optimization method according to claim 6 or 7, it is characterised in that described node is opened up Flutter fragility B (vi) it is by the shortest path of node ratio shared in all shortest paths in a network;The topology on side Fragility B (eij) it is by the shortest path of link ratio shared in all shortest paths in a network.
CN201611106431.1A 2016-12-05 2016-12-05 Vulnerability assessment and route optimization method for power communication network Active CN106789190B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611106431.1A CN106789190B (en) 2016-12-05 2016-12-05 Vulnerability assessment and route optimization method for power communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611106431.1A CN106789190B (en) 2016-12-05 2016-12-05 Vulnerability assessment and route optimization method for power communication network

Publications (2)

Publication Number Publication Date
CN106789190A true CN106789190A (en) 2017-05-31
CN106789190B CN106789190B (en) 2020-03-06

Family

ID=58874324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611106431.1A Active CN106789190B (en) 2016-12-05 2016-12-05 Vulnerability assessment and route optimization method for power communication network

Country Status (1)

Country Link
CN (1) CN106789190B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107807812A (en) * 2017-11-10 2018-03-16 电子科技大学 A kind of hardware vulnerability assessment method based on HDL code
CN110210229A (en) * 2019-04-29 2019-09-06 国网宁夏电力有限公司电力科学研究院 Appraisal procedure, system and the storage medium of the fragility of electric network information physical system
CN110414094A (en) * 2019-07-11 2019-11-05 南京理工大学 A kind of business different degree configuration method between power communication network node
CN110474806A (en) * 2019-08-19 2019-11-19 国网甘肃省电力公司经济技术研究院 A kind of power telecom network key node recognition methods
CN110740097A (en) * 2019-10-31 2020-01-31 广东电网有限责任公司 electric power communication network routing scheme evaluation method and device
CN110971525A (en) * 2019-11-26 2020-04-07 武汉大学 Service routing and addressing method for service operation of power communication network
CN111147288A (en) * 2019-12-14 2020-05-12 贵州电网有限责任公司 Power dispatching communication network node importance identification and evaluation method
CN111865660A (en) * 2020-06-12 2020-10-30 广东电网有限责任公司 Operation risk evaluation method and system for network equipment
CN112003734A (en) * 2020-07-28 2020-11-27 长沙理工大学 Improved structure entropy based key node identification method for information physical system
CN112149967A (en) * 2020-09-04 2020-12-29 华中科技大学 Power communication network vulnerability assessment method and system based on complex system theory
CN112306776A (en) * 2020-11-20 2021-02-02 浙江大学 Safety analysis method for out-of-limit vulnerability of terminal equipment
CN112615365A (en) * 2020-12-08 2021-04-06 国网四川省电力公司经济技术研究院 Smart power grid vulnerability key point identification method and device
CN113242213A (en) * 2021-04-15 2021-08-10 内蒙古电力(集团)有限责任公司内蒙古电力经济技术研究院分公司 Power communication backbone network node vulnerability diagnosis method
CN113759728A (en) * 2021-09-30 2021-12-07 中国船舶重工集团公司第七一九研究所 Modeling method for digital network control system
CN115333829A (en) * 2022-08-10 2022-11-11 国网智能电网研究院有限公司 Attack behavior track discovery method, device, equipment and storage medium
CN115473817A (en) * 2022-08-10 2022-12-13 武汉大学 Method and system for constructing power information network considering spatial characteristics
CN116016325A (en) * 2022-11-17 2023-04-25 徐州华电电力勘察设计有限公司 Power service dual-route planning method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080163373A1 (en) * 2006-12-29 2008-07-03 William Maynard Embedded mechanism for platform vulnerability assessment
CN101964730A (en) * 2010-01-28 2011-02-02 北京邮电大学 Network vulnerability evaluation method
CN102098306A (en) * 2011-01-27 2011-06-15 北京信安天元科技有限公司 Network attack path analysis method based on incidence matrixes
CN102447695A (en) * 2011-11-14 2012-05-09 中国科学院软件研究所 Method for identifying key attack path in service system
CN104579868A (en) * 2014-11-28 2015-04-29 广东电网有限责任公司电力调度控制中心 Construction method of electric powder communication network based on node importance
CN105721207A (en) * 2016-01-29 2016-06-29 国家电网公司 Method and device for determining importance of communication nodes in power communication network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080163373A1 (en) * 2006-12-29 2008-07-03 William Maynard Embedded mechanism for platform vulnerability assessment
CN101964730A (en) * 2010-01-28 2011-02-02 北京邮电大学 Network vulnerability evaluation method
CN102098306A (en) * 2011-01-27 2011-06-15 北京信安天元科技有限公司 Network attack path analysis method based on incidence matrixes
CN102447695A (en) * 2011-11-14 2012-05-09 中国科学院软件研究所 Method for identifying key attack path in service system
CN104579868A (en) * 2014-11-28 2015-04-29 广东电网有限责任公司电力调度控制中心 Construction method of electric powder communication network based on node importance
CN105721207A (en) * 2016-01-29 2016-06-29 国家电网公司 Method and device for determining importance of communication nodes in power communication network

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107807812A (en) * 2017-11-10 2018-03-16 电子科技大学 A kind of hardware vulnerability assessment method based on HDL code
CN110210229A (en) * 2019-04-29 2019-09-06 国网宁夏电力有限公司电力科学研究院 Appraisal procedure, system and the storage medium of the fragility of electric network information physical system
CN110210229B (en) * 2019-04-29 2021-08-13 国网宁夏电力有限公司电力科学研究院 Method and system for evaluating vulnerability of power grid information physical system and storage medium
CN110414094A (en) * 2019-07-11 2019-11-05 南京理工大学 A kind of business different degree configuration method between power communication network node
CN110414094B (en) * 2019-07-11 2022-09-13 南京理工大学 Method for configuring service importance between nodes of power communication network
CN110474806A (en) * 2019-08-19 2019-11-19 国网甘肃省电力公司经济技术研究院 A kind of power telecom network key node recognition methods
CN110474806B (en) * 2019-08-19 2022-04-01 国网甘肃省电力公司经济技术研究院 Power communication network key node identification method
CN110740097A (en) * 2019-10-31 2020-01-31 广东电网有限责任公司 electric power communication network routing scheme evaluation method and device
CN110740097B (en) * 2019-10-31 2021-09-03 广东电网有限责任公司 Method and device for evaluating routing scheme of power communication network
CN110971525B (en) * 2019-11-26 2021-02-19 武汉大学 Service routing and addressing method for service operation of power communication network
CN110971525A (en) * 2019-11-26 2020-04-07 武汉大学 Service routing and addressing method for service operation of power communication network
CN111147288B (en) * 2019-12-14 2023-02-03 贵州电网有限责任公司 Power dispatching communication network node importance identification and evaluation method
CN111147288A (en) * 2019-12-14 2020-05-12 贵州电网有限责任公司 Power dispatching communication network node importance identification and evaluation method
CN111865660A (en) * 2020-06-12 2020-10-30 广东电网有限责任公司 Operation risk evaluation method and system for network equipment
CN112003734A (en) * 2020-07-28 2020-11-27 长沙理工大学 Improved structure entropy based key node identification method for information physical system
CN112149967B (en) * 2020-09-04 2024-02-06 华中科技大学 Power communication network vulnerability assessment method and system based on complex system theory
CN112149967A (en) * 2020-09-04 2020-12-29 华中科技大学 Power communication network vulnerability assessment method and system based on complex system theory
CN112306776B (en) * 2020-11-20 2022-05-10 浙江大学 Safety analysis method for out-of-limit vulnerability of terminal equipment
CN112306776A (en) * 2020-11-20 2021-02-02 浙江大学 Safety analysis method for out-of-limit vulnerability of terminal equipment
CN112615365A (en) * 2020-12-08 2021-04-06 国网四川省电力公司经济技术研究院 Smart power grid vulnerability key point identification method and device
CN113242213A (en) * 2021-04-15 2021-08-10 内蒙古电力(集团)有限责任公司内蒙古电力经济技术研究院分公司 Power communication backbone network node vulnerability diagnosis method
CN113759728A (en) * 2021-09-30 2021-12-07 中国船舶重工集团公司第七一九研究所 Modeling method for digital network control system
CN113759728B (en) * 2021-09-30 2023-08-25 中国船舶重工集团公司第七一九研究所 Modeling method for digital network control system
CN115333829A (en) * 2022-08-10 2022-11-11 国网智能电网研究院有限公司 Attack behavior track discovery method, device, equipment and storage medium
CN115473817A (en) * 2022-08-10 2022-12-13 武汉大学 Method and system for constructing power information network considering spatial characteristics
CN115473817B (en) * 2022-08-10 2023-08-15 武汉大学 Construction method and system of power information network considering spatial characteristics
CN116016325A (en) * 2022-11-17 2023-04-25 徐州华电电力勘察设计有限公司 Power service dual-route planning method and device

Also Published As

Publication number Publication date
CN106789190B (en) 2020-03-06

Similar Documents

Publication Publication Date Title
CN106789190A (en) A kind of power telecom network vulnerability assessment and routing optimization method
CN105553869B (en) A kind of risk balance method and system of power telecom network
CN106253270B (en) Electric system vulnerable line identifying method and system
CN107682195B (en) Communication network robustness evaluation method based on combination of complex network and big data
CN104466959B (en) Power system critical circuits discrimination method and system
CN112633649A (en) Power grid multi-attribute important node evaluation and planning method
CN104901886B (en) Consider that time delay communicates circuitous channel restructing algorithm with the wide area protection of flow equalization
CN105976048A (en) Power transmission network extension planning method based on improved artificial bee colony algorithm
CN107769962A (en) A kind of communication network failure cascade venture influence analysis method of attack resistance
CN110414094A (en) A kind of business different degree configuration method between power communication network node
CN103607320A (en) An electric power communication network survivability evaluating method
CN110096764A (en) A kind of identification of electric-gas coupled system vulnerable line and optimization method
CN112149967A (en) Power communication network vulnerability assessment method and system based on complex system theory
CN114282855A (en) Comprehensive protection method of electric-gas coupling system under heavy load distribution attack
CN106067074A (en) A kind of by optimizing the method that the on off state of link promotes network system robustness
CN115879806A (en) Power system and traffic network vulnerability assessment method based on complex network
CN106951615B (en) Electric power transportation network Topology Structure Design method based on close female algorithm
CN112865085A (en) Attack simulation method and system for electric power information physical system
US20240305519A1 (en) Detecting and mitigating cascading errors in a network to improve network resilience
CN116015707A (en) Network topology optimization method, device and terminal for power distribution network information physical system
CN110048884B (en) Intelligent power distribution network communication network planning method for resisting random attack and intentional network attack
Dong et al. Mitigating cascading failures of spatially embedded cyber–physical power systems by adding additional information links
He et al. Topological approach to measure network recoverability
CN107294851B (en) A kind of router level network topology estimating method
Ji et al. Comprehensive vulnerability assessment and optimisation method of power communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant