A Cyber-Secured Operation for Water-Energy Nexus

Pengfei Zhao, Chenghong Gu, Zhidong Cao, Da Xie, Fei Teng

Research output: Contribution to journalArticlepeer-review

7 Citations (SciVal)
121 Downloads (Pure)


The wide implementation of information and communication technologies (ICT) cause power system operations exposed to cyber-attacks. Meanwhile, the tendency of integrated multi energy vectors has worsened this issue with multiple energy coupled. This paper proposes a two-stage risk-averse mitigation strategy for water-energy systems (WESs), incorporating power, natural gas and water systems against false data injection attacks (FDIA) under water-energy nexus. The FDIA on individual sub-systems is modelled through hampering false data integrity to the systems. An innovative two-stage risk-averse distributionally robust optimization (RA-DRO) is proposed to mitigate uneconomic operation and provides a coordinated optimal load shedding scheme for the nexus system security. A coherent risk measure, Conditional Value-at-Risk is incorporated into the RA-DRO to model risk. A Benders decomposition method is used to solve the original NP-hard RA-DRO problem. Case studies are demonstrated on a WES under water-energy nexus and results show that the effectiveness of the method to mitigate risks from potential FDIA and renewable uncertainties. This research provides WES operators an economic system operation tool by optimally coordinating energy infrastructures and implementing reasonable load shedding to enhance cybersecurity.
Original languageEnglish
Article number9290107
Pages (from-to)3105 - 3117
Number of pages13
JournalIEEE Transactions on Power Systems
Issue number4
Early online date10 Dec 2020
Publication statusPublished - 31 Jul 2021


  • Distributionally robust optimization
  • False data injection attacks
  • Integrated energy system
  • Mitigation strategy
  • Risk aversion
  • Water-energy nexus

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering


Dive into the research topics of 'A Cyber-Secured Operation for Water-Energy Nexus'. Together they form a unique fingerprint.

Cite this