← 返回
通过用户侧数据篡改对耦合电-交通网络的网络攻击
Cyberattack on Coupled Power-Transportation Networks via User-side Data Falsifications
| 作者 | Si Lv · Sheng Chen · Qiuwei Wu · Zhinong Wei · Tengfei Zhang · Junjun Xu |
| 期刊 | IEEE Transactions on Power Systems |
| 出版日期 | 2025年9月 |
| 技术分类 | 电动汽车驱动 |
| 技术标签 | 充电桩 模型预测控制MPC 用户侧储能 |
| 相关度评分 | ★★★★ 4.0 / 5.0 |
| 关键词 | 电力与交通网络 用户侧网络漏洞 数据篡改 互补条件数学规划 迭代松弛算法 |
语言:
中文摘要
先进信息通信技术的应用使电力与交通系统面临网络攻击风险。现有研究多关注网络设备层面的脆弱性,而忽视了用户侧的潜在威胁。本文揭示了一种通过篡改用户侧数据来破坏电-交通耦合系统运行的攻击策略。攻击者可入侵导航应用,伪造路径与充电站推荐,诱导交通与充电流分布,引发系统不安全运行。本文将攻击决策建模为二元变量,并通过互补约束松弛为连续变量,将原混合整数问题转化为带互补约束的数学规划(MPCC),进而设计带有反馈机制的增强迭代松弛算法,有效识别并修正非光滑松弛,提升收敛质量。数值实验验证了用户侧网络漏洞对系统运行的威胁及所提方法的优越性。
English Abstract
The incorporation of advanced information and communication technologies has exposed the power and transportation sectors to cyberattacks. Despite the great efforts in analyzing cyber vulnerabilities of network-level devices, little attention has been paid to the threats from user-side cyber vulnerability. This paper uncovers the strategic behavior of an attacker who aims to devastate the operation of the interdependent power and transportation networks through user-side data falsifications. Specifically, as most travelers rely on navigation Apps that guide their daily trips, an attacker could intrude into end-user devices and falsify the route and charging station recommendations, so as to manipulate the distribution of traffic and charging flows towards insecure network operations. We model the attack decisions as a set of binary variables, which are then relaxed into continuous variables by introducing complementarity constraints. In doing so, the original mixed-integer formulation is recast into a mathematical program with complementarity conditions (MPCC). We then design an enhanced iterative relaxation algorithm that solves the MPCC as a sequence of parameterized nonlinear programming. The enhanced version is equipped with a feedback module that identifies and corrects non-smooth relaxations, which contributes to a smooth convergence towards high-quality solutions. Numerical results corroborate the threat of user-side cyber vulnerability on network operations, and validate the superiority of proposed solution methods.
S
SunView 深度解读
该研究揭示的用户侧数据篡改攻击对阳光电源充电桩业务具有重要安全警示价值。攻击者可通过伪造导航推荐诱导充电流分布失衡,直接威胁充电站运营安全。建议在充电桩产品中集成多维度异常检测机制:1)在充电桩控制器中部署实时负荷预测模型,识别异常充电请求聚集;2)结合iSolarCloud云平台构建区域充电流监控系统,通过历史数据对比发现诱导性攻击;3)在储能系统ST系列中增强网络安全防护,防止用户侧数据篡改影响储能调度决策。该研究的MPCC建模方法可用于优化充电站与储能系统的协同调度算法,提升系统韧性与抗攻击能力。