Empirical framework for identification of the most harmful malicious attacks on a smart grid

被引:0
作者
Aiman J. Albarakati
Marwan Bikdash
机构
[1] Majmaah University,College of Computer and Information Science
[2] North Carolina A&T state University,Computational Data Science and Engineering
来源
Applied Network Science | / 7卷
关键词
Vulnerability assessment; Graph theory; Powergrid; Centrality measures; Matpower;
D O I
暂无
中图分类号
学科分类号
摘要
The aim of this paper is the identification of the most harmful malicious attacks in a smart grid with basis on the removal of buses in a particular sequence. For that, we define the Electrical Most Damaging Element (EMDE) and the Iterated Centrality Measure (ICM). The EMDE is the element that leads to the largest unsatisfied load increase after removed, in the current state of the smart grid. The ICM is a meaningful scaled centrality for iterated attacks. Attack strategies such as the IEMDE (Iterated Electrical Most Damaging Element) and the Iterated Most Central Element (IMCE) are proposed as references for evaluating the impact of failure sequences by comparison. For each fault strategy approach, the vulnerability curves as well as a scalability analysis are presented. It is demonstrated that the IEMDE approximated the N-k-ε\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$N-k-\varepsilon$$\end{document} algorithm, but with reduced computational expense. Furthermore, the IMCE approach provided an efficient fault profile close to the performance of the IEMDE. Although this framework is applied in this paper to failures in buses, it can similarly be applied to other elements. Future research will be focused in applying these concepts to transmission lines.
引用
收藏
相关论文
共 109 条
  • [1] Abedi A(2019)Review of major approaches to analyze vulnerability in power system Reliab Eng Syst Saf 183 153-172
  • [2] Gaudard L(2018)Techniques for the identification of critical nodes leading to voltage collapse in a power system Int J Emerg Electr Power Syst 19 1-14
  • [3] Romerio F(2004)Structural vulnerability of the North American power grid Phys Rev E 69 4-797
  • [4] Adebayo I(2009)Power grids vulnerability: a complex network approach Chaos 19 013119-1766
  • [5] Jimoh A(2005)On the solution of the bilevel programming formulation of the terrorist threat problem IEEE Trans Power Syst 20 789-865
  • [6] Yusuff A(2010)A risk-based approach for transmission network expansion planning under deliberate outages IEEE Trans Power Syst 25 1759-865
  • [7] Albert R(2013)Performance of electric power systems under physical malicious attacks IEEE Syst J 7 854-1085
  • [8] Albert I(2013)Performance of electric power systems under physical malicious attacks IEEE Syst J 7 854-834
  • [9] Nakarado GL(2009)Risk assessment of malicious attacks against power systems IEEE Trans Syst Man Cybern A Syst Hum 39 1074-84
  • [10] Arianos S(2008)Vulnerability of interconnected power systems to malicious attacks under limited information Eur Trans Electr Power 18 820-E689