256 research outputs found

    Towards a Realistic Model for Failure Propagation in Interdependent Networks

    Full text link
    Modern networks are becoming increasingly interdependent. As a prominent example, the smart grid is an electrical grid controlled through a communications network, which in turn is powered by the electrical grid. Such interdependencies create new vulnerabilities and make these networks more susceptible to failures. In particular, failures can easily spread across these networks due to their interdependencies, possibly causing cascade effects with a devastating impact on their functionalities. In this paper we focus on the interdependence between the power grid and the communications network, and propose a novel realistic model, HINT (Heterogeneous Interdependent NeTworks), to study the evolution of cascading failures. Our model takes into account the heterogeneity of such networks as well as their complex interdependencies. We compare HINT with previously proposed models both on synthetic and real network topologies. Experimental results show that existing models oversimplify the failure evolution and network functionality requirements, resulting in severe underestimations of the cascading failures.Comment: 7 pages, 6 figures, to be published in conference proceedings of IEEE International Conference on Computing, Networking and Communications (ICNC 2016), Kauai, US

    Analysis of Resilience Situations for Complex Engineered Systems – the Resilience Holon

    Get PDF
    Improving the resilience of complex engineered and engineering systems (CES) includes planning for complex resilience situations, in which there may be multiple threats, interactions, and disruptions. One challenge in the modeling of CES is the identification of how interactions in a complex situation occur and their combined influence on CES resilience. This article presents a resilience holon that can be used to analyze complex resilience situations. It is made up of 24 elements (defining types of resilience, threats, interactions, and disruptions), which have varying importance to specific situations. Holons can be linked together hierarchically or in a network. An application of the resilience holon to a documented real-world resilience situation, widespread flooding in a city, illustrates its use. Pathways taken by threats and disruptions, as the flood effects cascaded through the city, are shown as connections between holons. The resilience holon could be used to decompose diverse resilience situations involving CES, to identify where critical vulnerability points are and how the whole resilience situation could be improved. The visual nature of the resilience holon could be used in an interactive way, allowing stakeholders to better understand the full resilience picture of CES that they use or operate

    Resilience of Interdependent Communication and Power Distribution Networks against Cascading Failures

    Get PDF
    The operations of many modern cyber-physical systems, such as smart grids, are based on increasingly interdependent networks. The impact of cascading failures on such networks has recently received significant attention due to the corresponding effect of these failures on the society. In this paper, we conduct an empirical study on the robustness of interdependent systems formed by the coupling of power grids and communication networks by putting real distribution power grids to the test. We focus on the assessment of the robustness of a large set of medium-voltage (MV) distribution grids, currently operating live in the Netherlands, against cascading failures initiated by different types of faults / attacks. We consider both unintentional random failures and malicious targeted attacks which gradually degrade the capability of the entire system and we evaluate their respective consequences. Our study shows that current MV grids are highly vulnerable to such cascades of failures. Furthermore, we discover that a small-world communication network structure lends itself to the robustness of the interdependent system. Also interestingly enough, we discover that the formation of hub hierarchies, which is known to enhance independent network robustness, actually has detrimental effects against cascading failures. Based on real MV grid topologies, our study yields realistic insights which can be employed as a set of practical guidelines for distribution system operators (DSOs) to design effective grid protection schemes

    Application of Complex Network Theory in Power System Security Assessment

    Get PDF
    The power demand increases every year around the world with the growth of population and the expansion of cities. Meanwhile, the structure of a power system becomes increasing complex. Moreover, increasing renewable energy sources (RES) has linked to the power network at different voltage levels. These new features are expected to have a negative impact on the security of the power system. In recent years, complex network (CN) theory has been studied intensively in solving practical problems of large-scale complex systems. A new direction for power system security assessment has been provided with the developments in the CN field. In this thesis, we carry out investigations on models and approaches that aim to make the security assessment from an overview system level with CN theory. Initially, we study the impact of the renewable energy (RE) penetration level on the vulnerability in the future grid (FG). Data shows that the capacity of RE has been increasing over by 10% annually all over the world. To demonstrate the impact of unpredictable fluctuating characteristics of RES on the power system stability, a CN model given renewable energy integration for the vulnerability analysis is introduced. The numerical simulations are investigated based on the simplified 14-generator model of the South Eastern Australia power system. Based on the simulation results, the impact of different penetrations of RES and demand side management on the Australian FG is discussed. Secondly, the distributed optimization performance of the communication network topology in the photovoltaic (PV) and energy storage (ES) combined system is studied with CN theory. A Distributed Alternating Direction Method of Multipliers (D-ADMM) is proposed to accelerate the convergence speed in a large dimensional communication system. It is shown that the dynamic performance of this approach is highly-sensitive to the communication network topology. We study the variation of convergence speed under different communication network topology. Based on this research, guidance on how to design a relatively more optimal communication network is given as well. Then, we focus on a new model of vulnerability analysis. The existing CN models usually neglect the detailed electrical characteristics of a power grid. In order to address the issue, an innovative model which considers power flow (PF), one of the most important characteristics in a power system, is proposed for the analysis of power grid vulnerability. Moreover, based on the CN theory and the Max-Flow theorem, a new vulnerability index is presented to identify the vulnerable lines in a power system. The comparative simulations between the power flow model and existing models are investigated on the IEEE 118-bus system. Based on the PF model, we improve a power system cascading risk assessment model. In this research the risk is defined by the consequence and probabilities of the failures in the system, which is affected by both power factors and the network structure. Furthermore, a cascading event simulation module is designed to identify the cascading chain in the system during a failure. This innovation can form a better module for the cascading risk assessment of a power system. Finally, we argue that the current cyber-physical network model have their limitations and drawbacks. The existing “point-wise” failure model is not appropriate to present the interdependency of power grid and communication network. The interactions between those two interdependent networks are much more complicated than they were described in some the prior literatures. Therefore, we propose a new interdependency model which is based on earlier research in this thesis. The simulation results confirm the effectiveness of the new model in explaining the cascading mechanism in this kind of networks

    Governing Cascade Failures in Complex Social-Ecological-Technological Systems: Framing Context, Strategies, and Challenges

    Get PDF
    Cascade failures are events in networked systems with interconnected components in which failure of one or a few parts triggers the failure of other parts, which triggers the failure of more parts, and so on. Cascade failures occur in a wide variety of familiar systems, such as electric power distribution grids, transportation systems, financial systems, and ecosystems. Cascade failures have plagued society for centuries. However, modern social-ecological-technological systems (SETS) have become vast, fast moving, and highly interconnected, exposing these systems to cascade failures of potentially global proportions, spreading at breathtaking speed, and imposing catastrophic harms. The increasing potential for cascade failures of the magnitude of the 2008 financial system collapse, which had a truly global reach and affected systems well beyond finance, screams out for clear thinking about governing vulnerability to cascade failures in SETS. Yet, legal scholarship on the theme is essentially nil, and a more comprehensive, generalizable governance theory leveraging knowledge from scientific research on cascade failures has not emerged. Research initiatives are needed to forge ground on three fronts: (1) system modeling and monitoring; (2) event prediction; and (3) event prevention, response, and recovery. This Article is a first step in that direction. Part I outlines the cascade failures problem. Part II summarizes the scientific research on cascade failures. Part III identifies strategies for controlling cascade failures. Part IV explores the governance challenges of deploying those various strategies in large-scale SETS. Part Vextends the analysis to the special case of cascade failures within ecological systems and the difficulties of managing them through the strategies coming out of cascade failures science. Lastly, Part VI suggests directions of future research on governance of cascade failures

    Wide-Area Situation Awareness based on a Secure Interconnection between Cyber-Physical Control Systems

    Get PDF
    Posteriormente, examinamos e identificamos los requisitos especiales que limitan el diseño y la operación de una arquitectura de interoperabilidad segura para los SSC (particularmente los SCCF) del smart grid. Nos enfocamos en modelar requisitos no funcionales que dan forma a esta infraestructura, siguiendo la metodología NFR para extraer requisitos esenciales, técnicas para la satisfacción de los requisitos y métricas para nuestro modelo arquitectural. Estudiamos los servicios necesarios para la interoperabilidad segura de los SSC del SG revisando en profundidad los mecanismos de seguridad, desde los servicios básicos hasta los procedimientos avanzados capaces de hacer frente a las amenazas sofisticadas contra los sistemas de control, como son los sistemas de detección, protección y respuesta ante intrusiones. Nuestro análisis se divide en diferentes áreas: prevención, consciencia y reacción, y restauración; las cuales general un modelo de seguridad robusto para la protección de los sistemas críticos. Proporcionamos el diseño para un modelo arquitectural para la interoperabilidad segura y la interconexión de los SCCF del smart grid. Este escenario contempla la interconectividad de una federación de proveedores de energía del SG, que interactúan a través de la plataforma de interoperabilidad segura para gestionar y controlar sus infraestructuras de forma cooperativa. La plataforma tiene en cuenta las características inherentes y los nuevos servicios y tecnologías que acompañan al movimiento de la Industria 4.0. Por último, presentamos una prueba de concepto de nuestro modelo arquitectural, el cual ayuda a validar el diseño propuesto a través de experimentaciones. Creamos un conjunto de casos de validación que prueban algunas de las funcionalidades principales ofrecidas por la arquitectura diseñada para la interoperabilidad segura, proporcionando información sobre su rendimiento y capacidades.Las infraestructuras críticas (IICC) modernas son vastos sistemas altamente complejos, que precisan del uso de las tecnologías de la información para gestionar, controlar y monitorizar el funcionamiento de estas infraestructuras. Debido a sus funciones esenciales, la protección y seguridad de las infraestructuras críticas y, por tanto, de sus sistemas de control, se ha convertido en una tarea prioritaria para las diversas instituciones gubernamentales y académicas a nivel mundial. La interoperabilidad de las IICC, en especial de sus sistemas de control (SSC), se convierte en una característica clave para que estos sistemas sean capaces de coordinarse y realizar tareas de control y seguridad de forma cooperativa. El objetivo de esta tesis se centra, por tanto, en proporcionar herramientas para la interoperabilidad segura de los diferentes SSC, especialmente los sistemas de control ciber-físicos (SCCF), de forma que se potencie la intercomunicación y coordinación entre ellos para crear un entorno en el que las diversas infraestructuras puedan realizar tareas de control y seguridad cooperativas, creando una plataforma de interoperabilidad segura capaz de dar servicio a diversas IICC, en un entorno de consciencia situacional (del inglés situational awareness) de alto espectro o área (wide-area). Para ello, en primer lugar, revisamos las amenazas de carácter más sofisticado que amenazan la operación de los sistemas críticos, particularmente enfocándonos en los ciberataques camuflados (del inglés stealth) que amenazan los sistemas de control de infraestructuras críticas como el smart grid. Enfocamos nuestra investigación al análisis y comprensión de este nuevo tipo de ataques que aparece contra los sistemas críticos, y a las posibles contramedidas y herramientas para mitigar los efectos de estos ataques

    Towards a Smarter Power Grid: Vulnerability Assessment and Security Metric Deployment

    Get PDF
    Smart Grid is considered as one of the most critical cyber-physical infrastructure; leveraging the advanced coupled communication infrastructure, it is designed to address the limitations and drawbacks of the current power grid and offer a more available, reliable, and efficient power delivery system. Despite its promised advantages, coupling a cyber system with the power grid would increase the grid attack surface by adding known cyber vulnerabilities and threats. Furthermore, security solutions proposed for the traditional power system may not be applicable for the smart grid since they do not consider all smart grid added characteristics (e.g., synchronization). Therefore, it is crucial to lay out a study for the smart grid vulnerabilities and propose corresponding security evaluation and mitigation techniques. In this thesis, our objective is to model the smart grid as a cyber-physical network considering all the characteristics of power and communication networks as well as the interdependencies among their component. We first propose a contingency analysis security evaluation framework for the smart grid considering concurrent failures resulting from malicious compromises. The proposed framework enables the utility to quantify and monitor the criticality level of the system under study from the security perspective, and decide on proper mitigation/protection actions to avoid catastrophic power outages. Then, we investigated the critical link (power or communication) identification problem in the smart grid. We highlight the importance of considering the interdependencies among the power and communication network components by showing how a single failure in one side of the grid (cyber or physical) could cascade through both sides and disrupt the power delivery service for a large area immediately. We study the minimum number of links whose removal would have the largest impact on the system in terms of unserved load. The result of this study is beneficial for efficient and optimal resource allocation while designing protection mechanisms for the grid. Finally, we address the power service restoration problem through network reconfiguration in the presence of distributed energy storage systems. Service restoration is a mandatory procedure which should be performed after any failure occurrence in order to increase the consumer satisfaction and decrease the penalty paid by utility. In this chapter, an optimal restoration approach is devised which is a combination of minimizing the restoration time, unserved load, and energy storage usage cost
    corecore