10,452 research outputs found
Vulnerability Analysis of Modern Electric Grids: A Mathematical Optimization Approach
Electrical power must be transmitted through a vast and complicated network of interconnected grids to arrive at one’s fingertips. The US electric grid network and its components are rapidly advancing and adapting to the advent of smart technologies. Production of electricity is transitioning to sustainable processes derived from renewable energy sources like wind and solar power to decrease dependence on nonrenewable fossil fuels. These newly pervasive natures of smart technology and the variable power supply of renewable energy introduce previously unexamined vulnerabilities into the modern electric grid. Disruption of grid operations is not uncommon, and the effects can be economically and societally severe. Thus, a vulnerability analysis can provide decision makers with the ability to characterize points of improvement in the networks they supervise.
This thesis performs a vulnerability analysis of electric grid operations including storage. This vulnerability analysis is achieved through a set of numerical experiments on a multi-period optimal power flow model including storage and variable demand. This model resulted in an analysis indicating storage is helpful in increasing resilience in networks with excess generation, no matter how severe the disruption. Networks with constrained generation benefit little, if at all, from storage. This analysis allows us to conclude careful implementation is the best way to improve electric grid security in the face of widespread use of renewable energy and smart technology
Stochastic Model for Power Grid Dynamics
We introduce a stochastic model that describes the quasi-static dynamics of
an electric transmission network under perturbations introduced by random load
fluctuations, random removing of system components from service, random repair
times for the failed components, and random response times to implement optimal
system corrections for removing line overloads in a damaged or stressed
transmission network. We use a linear approximation to the network flow
equations and apply linear programming techniques that optimize the dispatching
of generators and loads in order to eliminate the network overloads associated
with a damaged system. We also provide a simple model for the operator's
response to various contingency events that is not always optimal due to either
failure of the state estimation system or due to the incorrect subjective
assessment of the severity associated with these events. This further allows us
to use a game theoretic framework for casting the optimization of the
operator's response into the choice of the optimal strategy which minimizes the
operating cost. We use a simple strategy space which is the degree of tolerance
to line overloads and which is an automatic control (optimization) parameter
that can be adjusted to trade off automatic load shed without propagating
cascades versus reduced load shed and an increased risk of propagating
cascades. The tolerance parameter is chosen to describes a smooth transition
from a risk averse to a risk taken strategy...Comment: framework for a system-level analysis of the power grid from the
viewpoint of complex network
A model of assessment of collateral damage on power grids based on complex network theory
As power grids are gradually adjusted to fit into a smart grid paradigm, a common problem is to identify locations where it is most beneficial to introduce distributed generation. In order to assist in such a decision, we work on a graph model of a regional power grid, and propose a method to assess collateral damage to the network resulting from a localized failure. We perform complex network analysis on multiple instances of the network, looking for correlations between estimated damages and betweenness centrality indices, attempting to determine which model is best suited to predict features of our network
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependency
Increased coupling between critical infrastructure networks, such as power
and communication systems, will have important implications for the reliability
and security of these systems. To understand the effects of power-communication
coupling, several have studied interdependent network models and reported that
increased coupling can increase system vulnerability. However, these results
come from models that have substantially different mechanisms of cascading,
relative to those found in actual power and communication networks. This paper
reports on two sets of experiments that compare the network vulnerability
implications resulting from simple topological models and models that more
accurately capture the dynamics of cascading in power systems. First, we
compare a simple model of topological contagion to a model of cascading in
power systems and find that the power grid shows a much higher level of
vulnerability, relative to the contagion model. Second, we compare a model of
topological cascades in coupled networks to three different physics-based
models of power grids coupled to communication networks. Again, the more
accurate models suggest very different conclusions. In all but the most extreme
case, the physics-based power grid models indicate that increased
power-communication coupling decreases vulnerability. This is opposite from
what one would conclude from the coupled topological model, in which zero
coupling is optimal. Finally, an extreme case in which communication failures
immediately cause grid failures, suggests that if systems are poorly designed,
increased coupling can be harmful. Together these results suggest design
strategies for reducing the risk of cascades in interdependent infrastructure
systems
Smart Grid for the Smart City
Modern cities are embracing cutting-edge technologies to improve the services they offer to the citizens from traffic control to the reduction of greenhouse gases and energy provisioning. In this chapter, we look at the energy sector advocating how Information and Communication Technologies (ICT) and signal processing techniques can be integrated into next generation power grids for an increased effectiveness in terms of: electrical stability, distribution, improved communication security, energy production, and utilization. In particular, we deliberate about the use of these techniques within new demand response paradigms, where communities of prosumers (e.g., households, generating part of their electricity consumption) contribute to the satisfaction of the energy demand through load balancing and peak shaving. Our discussion also covers the use of big data analytics for demand response and serious games as a tool to promote energy-efficient behaviors from end users
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
The false data injection (FDI) attack cannot be detected by the traditional
anomaly detection techniques used in the energy system state estimators. In
this paper, we demonstrate how FDI attacks can be constructed blindly, i.e.,
without system knowledge, including topological connectivity and line reactance
information. Our analysis reveals that existing FDI attacks become detectable
(consequently unsuccessful) by the state estimator if the data contains grossly
corrupted measurements such as device malfunction and communication errors. The
proposed sparse optimization based stealthy attacks construction strategy
overcomes this limitation by separating the gross errors from the measurement
matrix. Extensive theoretical modeling and experimental evaluation show that
the proposed technique performs more stealthily (has less relative error) and
efficiently (fast enough to maintain time requirement) compared to other
methods on IEEE benchmark test systems.Comment: Keywords: Smart grid, False data injection, Blind attack, Principal
component analysis (PCA), Journal of Computer and System Sciences, Elsevier,
201
- …