4.6 Article

Smart Grid Vulnerability and Defense Analysis Under Cascading Failure Attacks

期刊

IEEE TRANSACTIONS ON POWER DELIVERY
卷 36, 期 4, 页码 2264-2273

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPWRD.2021.3061358

关键词

Smart grids; Power system protection; Power system faults; Partitioning algorithms; Mathematical model; Generators; Topology; Attack; cascading failure; defense; smart power grids

资金

  1. Purdue Research Foundation
  2. Ministry of Science and Technology, Taiwan [MOST 109-2221-E-992-067]
  3. Intelligent Manufacturing Research Center (iMRC) from the Featured Areas Research Center Program

向作者/读者索取更多资源

Today's smart grids are vulnerable to cascading failure attacks, and existing methods are ineffective in dealing with them. This study introduces the MICLLB problem and corresponding algorithms, demonstrating their effectiveness and feasibility through experiments.
Most of today's smart grids are highly vulnerable to cascading failure attacks in which the failure of one or more critical components may trigger the sequential failure of other components, resulting in the eventual breakdown of the whole system. Existing works design different ranking methods for critical node or link identifications that fail to identify potential cascading failure attacks. In this work, we first consider the system from the attacker's point of view with a limited attack budget to study the smart grid vulnerability, referred to as Maximum-Impact through Critical-Line with Limited Budget (MICLLB) problem. We propose an efficient algorithm by considering the interdependency property of the system, called Greedy Based Partition Algorithm (GBPA) to solve the MICLLB problem. In addition, we design an algorithm, namely Homogeneous-Equality Based Defense Algorithm (HEBDA) to help reduce damages in case the system is suffering from the cascading failure attacks. Through rigorous theoretical analysis and experimentation, we demonstrate that the investigated problem is NP-complete problem and our proposed methods perform well within reasonable bounds of computational complexity.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据