OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

被引:94
作者
Pinar, Ali [1 ]
Meza, Juan [2 ]
Donde, Vaibhav [3 ]
Lesieutre, Bernard [4 ,5 ]
机构
[1] Sandia Natl Labs, Dept Informat & Decis Sci, Livermore, CA 94550 USA
[2] Univ Calif Berkeley, Lawrence Berkeley Lab, High Performance Comp Res Dept, Berkeley, CA 94720 USA
[3] ABB Inc, Corp Res Ctr, Raleigh, NC 27606 USA
[4] Univ Calif Berkeley, Lawrence Berkeley Lab, Environm Energy Technol Div, Berkeley, CA 94720 USA
[5] Univ Wisconsin, Dept Elect & Comp Engn, Madison, WI 53706 USA
关键词
mixed integer nonlinear programming; network inhibition; network flow; mixed integer linear programming; electric power flow; network vulnerability; graph theory;
D O I
10.1137/070708275
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 16,520 power lines.
引用
收藏
页码:1786 / 1810
页数:25
相关论文
共 29 条
  • [21] LESIEUTRE B, 2006, P 38 N AM POW S CARB
  • [22] LESIEUTRE B, 2008, P 41 HAW INT C SYST
  • [23] Oliviera G., 2004, OPTIMIZATION ONLINE
  • [24] Phillips C. A., 1993, Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, P776, DOI 10.1145/167088.167286
  • [25] Computing criticality of lines in power systems
    Pinar, Ali
    Reichert, Adam
    Lesieutre, Bernard
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, : 65 - +
  • [26] Solving the bi-objective maximum-flow network-interdiction problem
    Royset, Johannes O.
    Wood, R. Kevin
    [J]. INFORMS JOURNAL ON COMPUTING, 2007, 19 (02) : 175 - 184
  • [27] Analysis of electric grid security under terrorist threat
    Salmeron, J
    Wood, K
    Baldick, R
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2004, 19 (02) : 905 - 912
  • [28] Scholtz E., 2004, Ph.D. dissertation
  • [29] TARJAN RE, 1998, DATA STRUCTURES NETW