10,452 research outputs found

    Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    Full text link

    Vulnerability Analysis of Modern Electric Grids: A Mathematical Optimization Approach

    Get PDF
    Electrical power must be transmitted through a vast and complicated network of interconnected grids to arrive at one’s fingertips. The US electric grid network and its components are rapidly advancing and adapting to the advent of smart technologies. Production of electricity is transitioning to sustainable processes derived from renewable energy sources like wind and solar power to decrease dependence on nonrenewable fossil fuels. These newly pervasive natures of smart technology and the variable power supply of renewable energy introduce previously unexamined vulnerabilities into the modern electric grid. Disruption of grid operations is not uncommon, and the effects can be economically and societally severe. Thus, a vulnerability analysis can provide decision makers with the ability to characterize points of improvement in the networks they supervise. This thesis performs a vulnerability analysis of electric grid operations including storage. This vulnerability analysis is achieved through a set of numerical experiments on a multi-period optimal power flow model including storage and variable demand. This model resulted in an analysis indicating storage is helpful in increasing resilience in networks with excess generation, no matter how severe the disruption. Networks with constrained generation benefit little, if at all, from storage. This analysis allows us to conclude careful implementation is the best way to improve electric grid security in the face of widespread use of renewable energy and smart technology

    Stochastic Model for Power Grid Dynamics

    Get PDF
    We introduce a stochastic model that describes the quasi-static dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random removing of system components from service, random repair times for the failed components, and random response times to implement optimal system corrections for removing line overloads in a damaged or stressed transmission network. We use a linear approximation to the network flow equations and apply linear programming techniques that optimize the dispatching of generators and loads in order to eliminate the network overloads associated with a damaged system. We also provide a simple model for the operator's response to various contingency events that is not always optimal due to either failure of the state estimation system or due to the incorrect subjective assessment of the severity associated with these events. This further allows us to use a game theoretic framework for casting the optimization of the operator's response into the choice of the optimal strategy which minimizes the operating cost. We use a simple strategy space which is the degree of tolerance to line overloads and which is an automatic control (optimization) parameter that can be adjusted to trade off automatic load shed without propagating cascades versus reduced load shed and an increased risk of propagating cascades. The tolerance parameter is chosen to describes a smooth transition from a risk averse to a risk taken strategy...Comment: framework for a system-level analysis of the power grid from the viewpoint of complex network

    A model of assessment of collateral damage on power grids based on complex network theory

    Get PDF
    As power grids are gradually adjusted to fit into a smart grid paradigm, a common problem is to identify locations where it is most beneficial to introduce distributed generation. In order to assist in such a decision, we work on a graph model of a regional power grid, and propose a method to assess collateral damage to the network resulting from a localized failure. We perform complex network analysis on multiple instances of the network, looking for correlations between estimated damages and betweenness centrality indices, attempting to determine which model is best suited to predict features of our network

    Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependency

    Full text link
    Increased coupling between critical infrastructure networks, such as power and communication systems, will have important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several have studied interdependent network models and reported that increased coupling can increase system vulnerability. However, these results come from models that have substantially different mechanisms of cascading, relative to those found in actual power and communication networks. This paper reports on two sets of experiments that compare the network vulnerability implications resulting from simple topological models and models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid shows a much higher level of vulnerability, relative to the contagion model. Second, we compare a model of topological cascades in coupled networks to three different physics-based models of power grids coupled to communication networks. Again, the more accurate models suggest very different conclusions. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the coupled topological model, in which zero coupling is optimal. Finally, an extreme case in which communication failures immediately cause grid failures, suggests that if systems are poorly designed, increased coupling can be harmful. Together these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems

    Smart Grid for the Smart City

    Get PDF
    Modern cities are embracing cutting-edge technologies to improve the services they offer to the citizens from traffic control to the reduction of greenhouse gases and energy provisioning. In this chapter, we look at the energy sector advocating how Information and Communication Technologies (ICT) and signal processing techniques can be integrated into next generation power grids for an increased effectiveness in terms of: electrical stability, distribution, improved communication security, energy production, and utilization. In particular, we deliberate about the use of these techniques within new demand response paradigms, where communities of prosumers (e.g., households, generating part of their electricity consumption) contribute to the satisfaction of the energy demand through load balancing and peak shaving. Our discussion also covers the use of big data analytics for demand response and serious games as a tool to promote energy-efficient behaviors from end users

    Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements

    Full text link
    The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge, including topological connectivity and line reactance information. Our analysis reveals that existing FDI attacks become detectable (consequently unsuccessful) by the state estimator if the data contains grossly corrupted measurements such as device malfunction and communication errors. The proposed sparse optimization based stealthy attacks construction strategy overcomes this limitation by separating the gross errors from the measurement matrix. Extensive theoretical modeling and experimental evaluation show that the proposed technique performs more stealthily (has less relative error) and efficiently (fast enough to maintain time requirement) compared to other methods on IEEE benchmark test systems.Comment: Keywords: Smart grid, False data injection, Blind attack, Principal component analysis (PCA), Journal of Computer and System Sciences, Elsevier, 201
    • …
    corecore