Identification of Key Nodes of Targeted Attack in Urban Power Grid Based on Asymmetric Grid Structure Information

被引:0
|
作者
Li C. [1 ]
Liu W. [1 ]
Zhang Y. [1 ]
Liu G. [1 ]
Yang Y. [1 ]
Xu Y. [1 ]
机构
[1] State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Changping District, Beijing
关键词
asymmetric grid information; grey system theory; identification of critical nodes; topology completion model; urban electricity system;
D O I
10.13334/j.0258-8013.pcsee.221663
中图分类号
学科分类号
摘要
Accuracy of key node identification results is affected by the asymmetry of power grid structure information between attackers and defenders. Therefore, this paper proposes a key node identification method based on asymmetric network frame information for targeted attack of urban power grid. First, based on the perspective of attackers, a dual-objective optimization model of urban power grid topological completion is established considering the observable signal information of urban power transmission cables and the rationality of completion grid structure. Furthermore, considering the asymmetry of the information of the attack and defense network, a two-layer optimization model is established to identify the key nodes of the system. Giving that the real existence of the restored cable will lead to the uncertainty of node failure, and the attacker has the preference to pursue the deterministic impact consequences, the grey system theory is used to convert the damage consequences of the nodes connected with the restored lines, so as to reduce the damage probability of such nodes. In the last part, the KKT (Karush-Kuhn-Tucker) condition is used to transform the two-layer problem into a single-layer single-layer mixed integer linear programming(S-MILP) model. Simulation results verify the effectiveness of the proposed method, and the proposed method can obtain a high accuracy completion grid. At the same time, compared with the scenario with symmetric grid information, the identification results of the key nodes in the asymmetric scenario take into account the severity and certainty of the consequences of node failure, which reflects the actual psychology of the attacker to maximize the certainty revenue and makes the results more reasonable. ©2023 Chin.Soc.for Elec.Eng.
引用
收藏
页码:8230 / 8243
页数:13
相关论文
共 29 条
  • [1] FU Jian, HU Bo, XIE Kaigui, Stochastic planning of generation and transmission expansion for power system against coordinated attacks[J], Automation of Electric Power Systems, 45, 2, pp. 21-29, (2021)
  • [2] LIU Nian, YU Xinghuo, ZHANG Jianhua, Coordinated cyber-attack : inference and thinking of incident on Ukrainian power grid[J], Automation of Electric Power Systems, 40, 6, pp. 144-147, (2016)
  • [3] SHI Libao, JIAN Zhou, Vulnerability assessment of cyber physical power system based on dynamic attack-defense game model[J], Automation of Electric Power Systems, 40, 17, pp. 99-105, (2016)
  • [4] LUO Xiaoru, Analysis of power system robustness and vulnerability based on complex network theory, (2012)
  • [5] DING Ming, HAN Pingping, Small-world topological model based vulnerability assessment algorithm for large-scale power grid[J], Automation of Electric Power Systems, 30, 8, pp. 7-10, (2006)
  • [6] JU Wenyun, LI Yinhong, Identification of critical lines and nodes in power grid based on maximum flow transmission contribution degree[J], Automation of Electric Power Systems, 36, 9, pp. 6-12, (2012)
  • [7] ZHANG Yiwei, LIU Gengming, Modeling and vulnerability analysis of electric cyber physical system considering topological correlation and double coupling[J], Proceedings of the CSEE, 41, 16, pp. 5486-5499, (2021)
  • [8] MOTTO A L, ARROYO J M, GALIANA F D., A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat[J], IEEE Transactions on Power Systems, 20, 3, pp. 1357-1365, (2005)
  • [9] SALMERON J, WOOD K, BALDICK R., Analysis of electric grid security under terrorist threat[J], IEEE Transactions on Power Systems, 19, 2, pp. 905-912, (2004)
  • [10] RANJBAR M H,, KHERADMANDI M, PIRAYESH A., Assigning operating reserves in power systems under imminent intelligent attack threat[J], IEEE Transactions on Power Systems, 34, 4, pp. 2768-2777, (2019)