Does topological information matter for power grid vulnerability?

被引:5
|
作者
Ouyang, Min [1 ,2 ]
Yang, Kun [1 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Syst Sci & Engn, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Minist Educ, Key Lab Image Informat Proc & Intelligent Control, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
CASCADING FAILURES; SYSTEMS; NETWORK;
D O I
10.1063/1.4897268
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p <= 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value. (C) 2014 AIP Publishing LLC.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Power Grid Fault Diagnosis Model Based on Information Fusion of Topological Graph Element
    Xu B.
    Yin X.
    Zhang Z.
    Chen G.
    Yang W.
    [J]. Yang, Wen (409708265@qq.com), 2018, China Machine Press (33): : 512 - 522
  • [22] Structural vulnerability of power systems: A topological approach
    Bompard, Ettore
    Wu, Di
    Xue, Fei
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2011, 81 (07) : 1334 - 1340
  • [23] Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability
    Ouyang, Min
    [J]. CHAOS, 2013, 23 (02)
  • [24] Analysis of the structural vulnerability of the interconnected power grid of continental Europe with the Integrated Power System and Unified Power System based on extended topological approach
    Bompard, Ettore
    Pons, Enrico
    Wu, Di
    [J]. INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2013, 23 (05): : 620 - 637
  • [25] Small-world topological model based vulnerability assessment algorithm for large-scale power grid
    Hefei University of Technology, Hefei 230009, China
    [J]. Dianli Xitong Zidonghue, 2006, 8 (7-10+40):
  • [26] The Concept of Betweenness in the Analysis of Power Grid Vulnerability
    Bompard, Ettore
    Wu, Di
    Xue, Fei
    [J]. 2010 COMPLEXITY IN ENGINEERING: COMPENG 2010, PROCEEDINGS, 2010, : 52 - 54
  • [27] Structural vulnerability of the North American power grid
    Albert, R
    Albert, I
    Nakarado, GL
    [J]. PHYSICAL REVIEW E, 2004, 69 (02) : 025103 - 1
  • [28] Vulnerability Finding and Firmware Association in Power Grid
    Sun, Yuyan
    Sun, Limin
    Shi, Zhiqiang
    Yu, Wenhao
    Ying, Huan
    [J]. PROCEEDINGS OF THE 2019 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2019,
  • [29] Electric power grid structural vulnerability assessment
    Mao Anjia
    Yu jiaxi
    Guo Zhizhong
    [J]. 2006 POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-9, 2006, : 1474 - +
  • [30] Vulnerability Analysis of Bus Failure in Power Grid
    Huang, Xuncheng
    Qi, Huan
    Zhang, Xiaopan
    Lu, Lifang
    Hu, Yangyu
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING (CASE-13), 2013, 45 : 112 - 114