{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T16:39:49Z","timestamp":1769186389063,"version":"3.49.0"},"reference-count":57,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":30,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p>This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. Firstly, a hierarchical topology is proposed to allocate the security resources of the port power system. Secondly, by reconstructing the topological structure of the port information system, the robustness of the information system is improved, and the impact of false data injection attacks on the port power system is reduced, which realizes secure distributed energy management of the port power system. Finally, the simulation results show the effectiveness of the proposed strategy, and the defense capability of the port power system is improved.<\/jats:p>","DOI":"10.1155\/2022\/5995281","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T16:50:07Z","timestamp":1643647807000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Distributed Energy Management for Port Power System under False Data Injection Attacks"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5215-4744","authenticated-orcid":false,"given":"Qihe","family":"Shan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6196-0326","authenticated-orcid":false,"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8379-1474","authenticated-orcid":false,"given":"Qiongyue","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8801-0884","authenticated-orcid":false,"given":"Qiuye","family":"Sun","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcst.2017.2699167"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.3390\/jmse7040083"},{"key":"e_1_2_10_3_2","article-title":"Evolutionary game of inland shipping pollution control under government co-supervision","volume":"7","author":"Lang X.","year":"2021","journal-title":"Marine Pollution Bulletin"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ocecoaman.2020.105508"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2020.3005179"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2020.2970174"},{"key":"e_1_2_10_7_2","unstructured":"IonutL. Port of Barcelona Suffers Cyberattack 2018 https:\/\/www.bleepingcomputer.com\/news\/security\/port-of-barcelona-suffers-cyberattack\/."},{"key":"e_1_2_10_8_2","unstructured":"SamC. Middle East Ports and Logistics Tech 2020 https:\/\/m.sohu.com\/a\/396758697_433360."},{"key":"e_1_2_10_9_2","unstructured":"ColbieM. R. Cyber Attack on Asia-Pacific Ports Could Cost $110B Hitting Global Supply Chains 2019 https:\/\/www.insurancejournal.com\/news\/international\/2019\/10\/30\/546983.htm."},{"key":"e_1_2_10_10_2","first-page":"1809","article-title":"Intelligent ship integrated energy system and its distributed optimal scheduling algorithm","volume":"46","author":"Fei T.","year":"2020","journal-title":"ACTA AUTOMATICA SINICA"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2018.2862436"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.05.040"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3090739"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2871100"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2013.2259506"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2080292"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2590431"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2017.2749264"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/tia.2019.2902110"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2016.2524411"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.3040241"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3056559"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3035587"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2018.04.258"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/tia.2016.2645514"},{"key":"e_1_2_10_26_2","unstructured":"IhleN. RungeS. andGrundmeierN. An IT-architecture to support energy efficiency and the usage of flexible loads at a container terminal Proceedings of the 28th EnviroInfo 2014 Conference September 2014 Oldenburg Germany."},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2018.2850970"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2017.2762001"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2019.2893285"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.109276"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2979750"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.7500\/AEPS20160113101"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3029974"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3077509"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2011.2165269"},{"key":"e_1_2_10_36_2","doi-asserted-by":"crossref","unstructured":"TeixeiraA. AminS. SandbergH. JohanssonK. H. andSastryS. S. Cyber Security Analysis of State Estimators in Electric Power Systems Proceedings of the IEEE 49th Conf. Decis. Control (CDC) December 2010 Atlanta GA USA 5991\u20135998 https:\/\/doi.org\/10.1109\/CDC.2010.5717318 2-s2.0-79953131246.","DOI":"10.1109\/CDC.2010.5717318"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2011.2163807"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2728622"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.7500\/AEPS20160315001"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsii.2020.3011324"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2021.107024"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2019.2938497"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2014.2380432"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2013.2251017"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2016.2542111"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2018.2872252"},{"key":"e_1_2_10_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2017.2721382"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2013.130413"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2014.6900100"},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2019.2954363"},{"key":"e_1_2_10_51_2","doi-asserted-by":"publisher","DOI":"10.1080\/03088839.2014.932926"},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2010.10.012"},{"key":"e_1_2_10_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2019.2931316"},{"key":"e_1_2_10_54_2","doi-asserted-by":"publisher","DOI":"10.1360\/N112018-00055"},{"key":"e_1_2_10_55_2","unstructured":"MeiS. XueA. andWengX. Summary on Risk of Blackouts in Complex Interconnected Power Grids and Prospects of its Preventive control Proceedings of the the 24th Chinese Control Conference August 2006 Guangzhou China China Automation Society in Chinese."},{"key":"e_1_2_10_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_2_10_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2921431"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/5995281","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/2022\/5995281","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/5995281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:17:56Z","timestamp":1769116676000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2022\/5995281"}},"subtitle":[],"editor":[{"given":"Ning","family":"Cai","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1155\/2022\/5995281"],"URL":"https:\/\/doi.org\/10.1155\/2022\/5995281","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"2021-04-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5995281"}}