Using graph models to analyze the vulnerability of electric power networks

被引:239
|
作者
Holmgren, Ake J. [1 ]
机构
[1] Royal Inst Technol, Div Safety Res, SE-10044 Stockholm, Sweden
关键词
electric power system; graph theory; intentional attack; network analysis; random failure; vulnerability;
D O I
10.1111/j.1539-6924.2006.00791.x
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
In this article, we model electric power delivery networks as graphs, and conduct studies of two power transmission grids, i.e., the Nordic and the western states (U.S.) transmission grid. We calculate values of topological (structural) characteristics of the networks and compare their error and attack tolerance (structural vulnerability), i.e., their performance when vertices are removed, with two frequently used theoretical reference networks (the Erdos-Renyi random graph and the Barabasi-Albert scale-free network). Further, we perform a structural vulnerability analysis of a fictitious electric power network with simple structure. In this analysis, different strategies to decrease the vulnerability of the system are evaluated. Finally, we present a discussion on the practical applicability of graph modeling.
引用
收藏
页码:955 / 969
页数:15
相关论文
共 50 条
  • [1] Using graph theory to analyze biological networks
    Georgios A Pavlopoulos
    Maria Secrier
    Charalampos N Moschopoulos
    Theodoros G Soldatos
    Sophia Kossida
    Jan Aerts
    Reinhard Schneider
    Pantelis G Bagos
    BioData Mining, 4
  • [2] Using graph theory to analyze biological networks
    Pavlopoulos, Georgios A.
    Secrier, Maria
    Moschopoulos, Charalampos N.
    Soldatos, Theodoros G.
    Kossida, Sophia
    Aerts, Jan
    Schneider, Reinhard
    Bagos, Pantelis G.
    BIODATA MINING, 2011, 4
  • [3] Vulnerability Assessment of Power Grid Using Graph Topological Indices
    Kim, Charles J.
    Obah, Obinna B.
    INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS, 2007, 8 (06):
  • [4] Interpreting the vulnerability of power systems in cascading failures using multi-graph convolutional networks
    Lonapalawong, Supaporn
    Chen, Changsheng
    Wang, Can
    Chen, Wei
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (12) : 1848 - 1861
  • [5] Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks
    Ouyang, Min
    Zhao, Lijing
    Pan, Zhezhe
    Hong, Liu
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2014, 403 : 45 - 53
  • [6] Fault Location in Power Networks Using Graph Theory
    Dwivedi, Ajendra
    Yu, Xinghuo
    Sokolowski, Peter
    Wong, Peter
    Buratto, Fulvio
    IECON 2010 - 36TH ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2010,
  • [7] Graph Theory Approach to the Vulnerability of Transportation Networks
    Guze, Sambor
    ALGORITHMS, 2019, 12 (12)
  • [8] Assessing the vulnerability of supply chains using graph theory
    Wagner, Stephan M.
    Neshat, Nikrouz
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2010, 126 (01) : 121 - 129
  • [9] Graph Models and Networks in Psychology
    Ruiz-Ruano Garcia, Ana Maria
    Lopez Puga, Jorge
    REVISTA DE HISTORIA DE LA PSICOLOGIA, 2020, 41 (04): : 24 - 33
  • [10] Introducing exponential random graph models for visibility networks
    Brughmans, Tom
    Keay, Simon
    Earl, Graeme
    JOURNAL OF ARCHAEOLOGICAL SCIENCE, 2014, 49 : 442 - 454