{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:37:32Z","timestamp":1777984652915,"version":"3.51.4"},"reference-count":16,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,2]]},"abstract":"<jats:p> Since the communication network of the cyber-physical power system is responsible for communicating information, which guarantees the operation of the cyber-physical power system, researchers focus on the stability of the communication system. This article analyzes the risk of the communication transmission link interruption based on the network structure and characteristics of service transmission and proposes a path optimization method. First, we analyze the impact of link disruption on network structure and service, respectively, and quantify the impact as link interruption risk. According to the risk analysis, we propose an optimization method utilizing the Dijkstra\u2019s algorithm and the genetic algorithm to reconfigure service paths, which aims to minimize time delay and realize the equilibrium of service distribution. Through a particular situation, we calculate the link interruption risk and use the optimization method to configure service path for affected service. The results show that the time delays of the optimized service paths are in the acceptable level as well as the balance index of the service distribution is decreased obviously. The simulation experiment reveals the operability of the risk analysis method and the effectiveness of the path optimization method, which provides a technical reference for risk analysis and service path configuration. <\/jats:p>","DOI":"10.1177\/1550147718756035","type":"journal-article","created":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T07:15:52Z","timestamp":1517987752000},"page":"155014771875603","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":12,"title":["Risk analysis and optimization for communication transmission link interruption in Smart Grid cyber-physical system"],"prefix":"10.1177","volume":"14","author":[{"given":"Xingyu","family":"Chen","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, People\u2019s Republic of China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5369-1034","authenticated-orcid":false,"given":"Puyuan","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, People\u2019s Republic of China"}]},{"given":"Peng","family":"Yu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, People\u2019s Republic of China"}]},{"given":"Baoju","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, People\u2019s Republic of China"}]},{"given":"Wenjing","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, People\u2019s Republic of China"}]},{"given":"Yingjun","family":"Xie","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Beijing, People\u2019s Republic of China"}]},{"given":"Xiangzhou","family":"Chen","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Beijing, People\u2019s Republic of China"}]},{"given":"Mengying","family":"Yuan","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Beijing, People\u2019s Republic of China"}]}],"member":"179","published-online":{"date-parts":[[2018,2,6]]},"reference":[{"key":"bibr1-1550147718756035","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2194520"},{"issue":"10","key":"bibr2-1550147718756035","first-page":"2411","volume":"37","author":"Qiu X","year":"2015","journal-title":"J Electron Inform Technol"},{"key":"bibr3-1550147718756035","doi-asserted-by":"crossref","unstructured":"Jiang K, Tang LR, Zeng Y. Electric power communication network analysis. Beijing, China: China Electric Power Press, 2014, pp.6\u20139.","DOI":"10.1109\/ICNC.2013.6818236"},{"key":"bibr4-1550147718756035","first-page":"16","volume":"11","author":"Liu J","year":"2015","journal-title":"Electr Power Inform Commun Technol"},{"key":"bibr5-1550147718756035","first-page":"597","volume":"6","author":"Deng W","year":"2015","journal-title":"Ind Technol Innov"},{"issue":"4","key":"bibr6-1550147718756035","first-page":"84","volume":"30","author":"Peng J","year":"2010","journal-title":"Proc CSEE"},{"key":"bibr7-1550147718756035","volume-title":"Research on risk analysis and control for power communication networks","author":"Fan B.","year":"2015"},{"issue":"12","key":"bibr8-1550147718756035","first-page":"3541","volume":"37","author":"Cai W","year":"2013","journal-title":"Power Syst Technol"},{"key":"bibr9-1550147718756035","doi-asserted-by":"publisher","DOI":"10.11648\/j.ajnc.20160505.15"},{"key":"bibr10-1550147718756035","first-page":"101","volume":"24","author":"Jiang K","year":"2013","journal-title":"Power Syst Protect Contr"},{"key":"bibr11-1550147718756035","first-page":"2495","volume-title":"Proceedings of the 2015 5th international conference on electric utility deregulation and restructuring and power technologies (DRPT)","author":"Guo Y"},{"key":"bibr12-1550147718756035","first-page":"40","volume-title":"Proceedings of the 2016 IEEE international conference on network infrastructure and digital content (IC-NIDC)","author":"Shao Z"},{"key":"bibr13-1550147718756035","unstructured":"Fan H, Feng D, Wu Y. The method and application of information security risk assessment. Beijing, China: Tsinghua University Press, 2006, pp.19\u201343 (in Chinese)."},{"key":"bibr14-1550147718756035","first-page":"377","volume-title":"Proceedings of the 2016 12th international conference on network and service management (CNSM)","author":"Zhao P"},{"key":"bibr15-1550147718756035","volume-title":"Modeling and investigation of communication service availability in WAMS","author":"Luo H.","year":"2012"},{"issue":"4","key":"bibr16-1550147718756035","first-page":"492","volume":"34","author":"Bai Y","year":"2009","journal-title":"Geom Inform Sci Wuhan Univ"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718756035","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718756035","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718756035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T01:19:47Z","timestamp":1607303987000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718756035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["10.1177\/1550147718756035"],"URL":"https:\/\/doi.org\/10.1177\/1550147718756035","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}