16,143 research outputs found
Evaluating Resilience of Electricity Distribution Networks via A Modification of Generalized Benders Decomposition Method
This paper presents a computational approach to evaluate the resilience of
electricity Distribution Networks (DNs) to cyber-physical failures. In our
model, we consider an attacker who targets multiple DN components to maximize
the loss of the DN operator. We consider two types of operator response: (i)
Coordinated emergency response; (ii) Uncoordinated autonomous disconnects,
which may lead to cascading failures. To evaluate resilience under response
(i), we solve a Bilevel Mixed-Integer Second-Order Cone Program which is
computationally challenging due to mixed-integer variables in the inner problem
and non-convex constraints. Our solution approach is based on the Generalized
Benders Decomposition method, which achieves a reasonable tradeoff between
computational time and solution accuracy. Our approach involves modifying the
Benders cut based on structural insights on power flow over radial DNs. We
evaluate DN resilience under response (ii) by sequentially computing autonomous
component disconnects due to operating bound violations resulting from the
initial attack and the potential cascading failures. Our approach helps
estimate the gain in resilience under response (i), relative to (ii)
Evaluating Connection Resilience for the Overlay Network Kademlia
Kademlia is a decentralized overlay network, up to now mainly used for highly
scalable file sharing applications. Due to its distributed nature, it is free
from single points of failure. Communication can happen over redundant network
paths, which makes information distribution with Kademlia resilient against
failing nodes and attacks. This makes it applicable to more scenarios than
Internet file sharing. In this paper, we simulate Kademlia networks with
varying parameters and analyze the number of node-disjoint paths in the
network, and thereby the network connectivity. A high network connectivity is
required for communication and system-wide adaptation even when some nodes or
communication channels fail or get compromised by an attacker. With our
results, we show the influence of these parameters on the connectivity and,
therefore, the resilience against failing nodes and communication channels.Comment: 12 pages, 14 figures, accepted to ICDCS2017. arXiv admin note:
substantial text overlap with arXiv:1605.0800
- …