• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于网络物理电力电子转换器网络安全监测的人工智能:DC/DC电源转换器案例研究。

Artificial intelligence for cybersecurity monitoring of cyber-physical power electronic converters: a DC/DC power converter case study.

作者信息

Habibi Mohammad Reza, Guerrero Josep M, Vasquez Juan C

机构信息

AAU Energy, Aalborg University, Aalborg, Denmark.

Department of Electronic Engineering, Center for Research on Microgrids (CROM), Technical University of Catalonia, Barcelona, Spain.

出版信息

Sci Rep. 2024 Sep 27;14(1):22072. doi: 10.1038/s41598-024-72286-2.

DOI:10.1038/s41598-024-72286-2
PMID:39333625
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11436877/
Abstract

Power electronic converters are widely implemented in many types of power applications such as microgrids. Power converters can make a physical connection between the power resources and the power application. To control a power converter, required data such as the voltage and the current of that should be measured to be used in a control application. Therefore, a communication-based structure including sensors and communication links can be used to measure the desired data and transmit that to the controllers. So, a power converter-based system can be considered as a type of cyber-physical system, and it can be vulnerable to cyber-attacks. Then, it can strongly be recommended to use a strategy for a power converter-based system to monitor the system and identify the existence of cyber-attack in the system. In this study, artificial intelligence (AI) is deployed to calculate the value of the false data (i.e., constant false data, and time-varying false data) and detect false data injection cyber-attacks on power converters. Besides, to have a precise technical evaluation of the proposed methodology, that is evaluated under other issues, i.e., noise, and communication link delay. In the case of noise, the proposed strategy is examined under noises with different signal-to-noise ratios . Further, for the case of the communication delay, the system is examined under both symmetrical (i.e., same communication delay on all inputs) and unsymmetrical communication delays (i.e., different communication delay/delays on the inputs). In this work, artificial neural networks are implemented as the AI-based application, and two types of the networks, i.e., feedforward (as a basic type) and long short-term memory (LSTM)-based network as a more complex network are tested. Finally, three important AI-based techniques (regression, classification, and clustering) are examined. Based on the obtained results, this work can properly identify and calculate the false data in the system.

摘要

电力电子变换器广泛应用于多种电力应用中,如微电网。电力变换器可在电源与电力应用之间建立物理连接。为了控制电力变换器,需要测量诸如其电压和电流等所需数据,以便用于控制应用。因此,可使用包括传感器和通信链路的基于通信的结构来测量所需数据并将其传输给控制器。所以,基于电力变换器的系统可被视为一种信息物理系统,并且它可能容易受到网络攻击。那么,强烈建议对基于电力变换器的系统使用一种策略来监测系统并识别系统中是否存在网络攻击。在本研究中,部署人工智能(AI)来计算虚假数据的值(即恒定虚假数据和时变虚假数据)并检测对电力变换器的虚假数据注入网络攻击。此外,为了对所提出的方法进行精确的技术评估,在其他问题(即噪声和通信链路延迟)下对其进行评估。在噪声情况下,在所提出的策略在具有不同信噪比的噪声下进行检验。此外,对于通信延迟情况,在对称(即所有输入上的通信延迟相同)和非对称通信延迟(即输入上的通信延迟不同)两种情况下对系统进行检验。在这项工作中,实现了人工神经网络作为基于AI的应用,并测试了两种类型的网络,即前馈网络(作为基本类型)和基于长短期记忆(LSTM)的网络(作为更复杂的网络)。最后,检验了三种重要的基于AI的技术(回归、分类和聚类)。基于所得结果,这项工作能够正确识别和计算系统中的虚假数据。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/40a1f187d272/41598_2024_72286_Fig31_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/461c69a0c5bd/41598_2024_72286_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/93f3d3d12861/41598_2024_72286_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/46be66532552/41598_2024_72286_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/bb50b9745f23/41598_2024_72286_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/13ee437643b4/41598_2024_72286_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/7f478de4f675/41598_2024_72286_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/eb011eafc8a5/41598_2024_72286_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/9dd5cb7dd6f6/41598_2024_72286_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/223f2e24c1ed/41598_2024_72286_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/39be33c03b2b/41598_2024_72286_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/3c7235f5336a/41598_2024_72286_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/5bf79ef0fcf8/41598_2024_72286_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/5471237aff10/41598_2024_72286_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/995b6826d19a/41598_2024_72286_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/3d70a342b0c3/41598_2024_72286_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/4df0191c64da/41598_2024_72286_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/164df89330c8/41598_2024_72286_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/3888646306ad/41598_2024_72286_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/2f4e2743ba01/41598_2024_72286_Fig19_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/1d42972e1ff9/41598_2024_72286_Fig20_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/762e650108b8/41598_2024_72286_Fig21_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/05432e32a0ba/41598_2024_72286_Fig23_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/ea907bd4e848/41598_2024_72286_Fig25_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/5c29ca6d711c/41598_2024_72286_Fig27_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/c4b9062d1f16/41598_2024_72286_Fig29_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/40a1f187d272/41598_2024_72286_Fig31_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/461c69a0c5bd/41598_2024_72286_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/93f3d3d12861/41598_2024_72286_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/46be66532552/41598_2024_72286_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/bb50b9745f23/41598_2024_72286_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/13ee437643b4/41598_2024_72286_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/7f478de4f675/41598_2024_72286_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/eb011eafc8a5/41598_2024_72286_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/9dd5cb7dd6f6/41598_2024_72286_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/223f2e24c1ed/41598_2024_72286_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/39be33c03b2b/41598_2024_72286_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/3c7235f5336a/41598_2024_72286_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/5bf79ef0fcf8/41598_2024_72286_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/5471237aff10/41598_2024_72286_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/995b6826d19a/41598_2024_72286_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/3d70a342b0c3/41598_2024_72286_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/4df0191c64da/41598_2024_72286_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/164df89330c8/41598_2024_72286_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/3888646306ad/41598_2024_72286_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/2f4e2743ba01/41598_2024_72286_Fig19_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/1d42972e1ff9/41598_2024_72286_Fig20_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/762e650108b8/41598_2024_72286_Fig21_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/05432e32a0ba/41598_2024_72286_Fig23_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/ea907bd4e848/41598_2024_72286_Fig25_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/5c29ca6d711c/41598_2024_72286_Fig27_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/c4b9062d1f16/41598_2024_72286_Fig29_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2e86/11436877/40a1f187d272/41598_2024_72286_Fig31_HTML.jpg

相似文献

1
Artificial intelligence for cybersecurity monitoring of cyber-physical power electronic converters: a DC/DC power converter case study.用于网络物理电力电子转换器网络安全监测的人工智能:DC/DC电源转换器案例研究。
Sci Rep. 2024 Sep 27;14(1):22072. doi: 10.1038/s41598-024-72286-2.
2
Resilient Consensus Control Design for DC Microgrids against False Data Injection Attacks Using a Distributed Bank of Sliding Mode Observers.采用分布式滑模观测器的直流微电网弹性一致控制设计,抵御虚假数据注入攻击。
Sensors (Basel). 2022 Mar 30;22(7):2644. doi: 10.3390/s22072644.
3
Vulnerability analysis and modeling false data injection attack against voltage source converter in renewable generation power system.可再生能源发电系统中电压源换流器的脆弱性分析与虚假数据注入攻击建模
ISA Trans. 2023 Dec;143:492-502. doi: 10.1016/j.isatra.2023.09.030. Epub 2023 Sep 28.
4
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).捍卫防御者:基于对抗学习的防御策略,用于网络物理系统 (CPS) 中的基于学习的安全方法。
Sensors (Basel). 2023 Jun 9;23(12):5459. doi: 10.3390/s23125459.
5
DC Voltage Sensorless Predictive Control of a High-Efficiency PFC Single-Phase Rectifier Based on the Versatile Buck-Boost Converter.基于通用型升降压变换器的高效功率因数校正单相整流器的直流电压无传感器预测控制
Sensors (Basel). 2021 Jul 28;21(15):5107. doi: 10.3390/s21155107.
6
Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.具有未知虚假数据注入和重放网络攻击的信息物理多智能体网络控制系统的协同控制
ISA Trans. 2021 Apr;110:1-14. doi: 10.1016/j.isatra.2020.10.002. Epub 2020 Oct 6.
7
A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.复杂网络安全控制的最新进展与方法综述。
Sensors (Basel). 2023 Apr 15;23(8):4013. doi: 10.3390/s23084013.
8
Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.基于机器学习的改进型无线医疗信息物理系统(IWMCPS)
Healthcare (Basel). 2023 Jan 29;11(3):384. doi: 10.3390/healthcare11030384.
9
Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.下一代汽车中的网络攻击、缓解技术、预期就绪情况和未来方向。
Accid Anal Prev. 2020 Dec;148:105837. doi: 10.1016/j.aap.2020.105837. Epub 2020 Oct 26.
10
Nonfragile power and frequency control in islanded microgrids under abnormal asynchronous stochastic cyber attacks.
ISA Trans. 2023 Dec;143:409-419. doi: 10.1016/j.isatra.2023.09.012. Epub 2023 Sep 20.

引用本文的文献

1
Electrical load forecasting in power systems based on quantum computing using time series-based quantum artificial intelligence.
Sci Rep. 2025 Mar 3;15(1):7429. doi: 10.1038/s41598-025-89933-x.

本文引用的文献

1
Combination of Manifold Learning and Deep Learning Algorithms for Mid-Term Electrical Load Forecasting.用于中期电力负荷预测的流形学习与深度学习算法相结合
IEEE Trans Neural Netw Learn Syst. 2023 May;34(5):2584-2593. doi: 10.1109/TNNLS.2021.3106968. Epub 2023 May 2.