Abstract. Relying on the National High Technology Research and Development Program, this paper introduced the key issues in Cyber Physical Distribution System (CPDS), mainly includes: composite modelling method and interaction mechanism, system planning method, security defence technology, distributed control theory. Then on this basis, the corresponding technical route is proposed, and a more detailed research framework along with main schemes to be adopted is also presented.
IntroductionCyber physical system integrates computation, networks and physical environments into a multidimensional complex system via 3C (Computation, Communication, Control) technology, and enables large-scale project to realize real-time perceiving, dynamic controlling and information services [1]- [2]. As the level of the utilization of information enhances unceasingly, Modern distribution system has developed to be a multi-dimensional cyber physical distribution system (CPDS) which highly relies on information, and follows traditional power system process [1][3]- [4].Although the traditional distribution system which has a complete "produce-supply-users" ternary coupling mode, has been mature enough, with varies of distributional sources, storages, protections and sensors plugging in, acute problems such as distribution system topology, information interaction, cyber-physical integration come into sight.Compared to traditional distribution system, CPDS has distinguishing features:(1) Multi-source isomerism, complex network. The distributional loads and the intermittent renewable sources changed the feature that power flows in single direction, and the exponential growth in the sensors along with communication devices, also causedthe physical topology to grow enormous and complex, and its dynamic behavior becomes non-linear, uncertain, time-varying, and isomeric.(2) Frequent interaction, andhence vulnerable Since smart meters, distributional storages and sources plug in, to realize massive information collecting, transferring, controlling and demand side response, power flow and information flow interacts frequently, thus information security becomes a serious problem. While the communication protocol, which is open and standardized, also bring new hidden dangers to traditional power system field, such as dispatching automation, relay protection and safety equipment automation, load control,