Vulnerability Assessment System of Complicated Power System Based on Four-Level Set Model
Yin Xianggen1, Chen Qingqiang1, Wang Bo2, You Dahai1
1. State Key Laboratory of Advanced Electromagnetic Engineering and Technology
Huazhong University of Science and Technology Wuhan 430074 China; 2. Economic & Technology Institute of HBEPC Wuhan 430077 China
Abstract:The key to the vulnerability assessment of complicated power system is finding the vulnerabilities which could cause the large-area power outages under attacks. In this paper the concept of vulnerability of complicated power system is defined, and based on the definition and the feature that the complicated power system has a lot of data sources, a four-level set model which describes the relationship between the attacking methods and the vulnerability of complicated power system is first proposed. According to the model, a new, objective, practical vulnerability assessment indices and method of power system by use of relational cluster are built. The assessment result of a province power system demonstrates vulnerability set of the complicated power system could be found by the new method.
尹项根, 陈庆前, 王博, 游大海. 基于四层集合模型的复杂电力系统脆弱性评估体系[J]. 电工技术学报, 2013, 28(1): 225-233.
Yin Xianggen, Chen Qingqiang, Wang Bo, You Dahai. Vulnerability Assessment System of Complicated Power System Based on Four-Level Set Model. Transactions of China Electrotechnical Society, 2013, 28(1): 225-233.
[1] US and Canada Power System Outage Task Force. August 14, 2003 blackout in the United States and Canada: causes and recommendations[R]. US: UCPSOTF, 2004. [2] 何大愚. 对于美国西部电力系统1996年7月2日大停电事故的初步认识[J]. 电网技术, 1996, 20(9): 35-39. He Dayu. A preliminary understanding of WSCC disturbance and separation on July 2, 1996 in the United States[J]. Power System Technology, 1996, 20(9): 35-39. [3] 侯慧, 尹项根, 陈庆前, 等. 中国南方地区500kV主网架2008年雪灾受损的分析与思考[J]. 电力系统自动化, 2008, 32(11): 12-15. Hou Hui, Yin Xianggen, Chen Qingqian, et al. Review of blackout accidents in China Southern area 500kV main power grid in 2008 snow disaster[J]. Automation of Electric Power Systems, 2008, 32(11): 12-15. [4] 陈亦平, 洪军. 巴西“11.10”大停电原因分析及对我国南方电网的启示[J]. 电网技术, 2010, 34(5): 77-82. Chen Yiping, Hong Jun. Analysis on causes of blackout occurred in Brazilian power grid on Nov. 11, 2009 and lessons drawn from it to China Southern power grid[J]. Power System Technology, 2010, 34(5): 77-82. [5] Gomes P. New strategies to improve bulk power system security: lessons learned from large blackouts[C]. Power Engineering Society General Meeting, IEEE, 2004: 1703-1708. [6] 魏震波, 刘俊勇, 朱国俊. 基于电网状态与结构的综合脆弱评估模型[J]. 电力系统自动化, 2009, 33(8): 11-14. Wei Zhenbo, Liu Junyong , Zhu Guojun, et al. A new integrative vulnerability evaluation model to power grid based on running state and structure[J]. Automation of Electric Power Systems, 2009, 33(8): 11-14. [7] 倪向萍, 梅生伟, 张雪敏. 基于复杂网络理论的输电线路脆弱度评估方法[J]. 电力系统自动化, 2008, 32(4): 1-5. Ni Xiangping, Mei Shengwei, Zhang Xuemin. Transmission lines’ vulnerability assessment based on complex network theory[J]. Automation of Electric Power Systems, 2008, 32(4): 1-5. [8] 丁剑, 白晓民, 赵伟, 等. 基于二维平面拟合的电网脆弱性分析[J]. 电力系统自动化, 2008, 32(8): 1-4. Ding Jian, Bai Xiaomin, Zhao Wei, et al. Grid vulnerability analysis based on two-dimensional accumulation means[J]. Automation of Electric Power Systems, 2008, 32(8): 1-4. [9] 丁明, 韩平平. 加权拓扑模型下的小世界电网脆弱性评估[J]. 中国电机工程学报, 2008, 28(10): 20-25. Ding Ming, Han Pingping. Vulnerability assessment to small-world power grid based on weighted topological model[J]. Proceedings of the CSEE, 2008, 28(10): 20-25. [10] 陈晓刚, 孙可, 曹一家. 基于复杂网络理论的大电网结构脆弱性分析[J]. 电工技术学报, 2007, 22(10): 138-144. Chen Xiaogang, Sun Ke, Cao Yijia. Structural Vulnerability analysis of large power grid based on complex network theory[J]. Transactions of China Electrotechnical Society, 2007, 22(10): 138-144. [11] 魏震波, 刘俊勇, 朱国俊, 等. 基于可靠性加权拓扑模型下的电网脆弱性评估模型[J]. 电工技术学报, 2010, 25(8): 131-137. Wei Zhenbo, Liu Junyong, Zhu Guojun, et al. Vulnerability evaluation model to power grid based on reliability-parameter-weighted topological model[J]. Transactions of China Electrotechnical Society, 2010, 25(8): 131-137. [12] Wang JW, Rong LL. Cascade-based attack vulnerability on the US power grid[J]. Safety Science, 2009, 47(10): 1332-1336. [13] Fouad AA, Qin Z, Vittal V. System vulnerability as a concept to assess power system dynamic security[J]. IEEE Transactions on Power Systems, 1994, 9(2): 1009-1015. [14] 卢锦玲, 朱永利. 基于暂态能量裕度的电力系统脆弱性评估[J]. 电工技术学报, 2010: 25(6): 96-103. Lu Jinling, Zhu Yongli. Power system vulnerability assessment based on transient energy margin[J]. Transactions of China Electrotechnical Society, 2010: 25(6): 96-103. [15] Arroyo JM. Bilevel programming applied to power system vulnerability analysis under multiple contingencies[J]. IET Generation Transmission & Distribution, 2010, 4(2) : 178-190. [16] Song H, Kezunovic M. A new analysis method for early detection and prevention of cascading events[J]. Electric Power Systems Research, 2007, 77(8): 1132-1142. [17] 邵莹, 于继来. 采用源流路径电气剖分信息的电网脆弱性评[J]. 中国电机工程学报, 2009, 29(31): 34-39. Shao Ying, Yu Jilai. Power grid vulnerability assessment based on electrical dissection information of the electric power network[J]. Proceedings of the CSEE, 2009, 29(31): 34-39. [18] Kang L, Holbert KE. PRA for vulnerability assessment of power system infrastructure security[C]. Proceedings of the Power Symposium of the 37th Annual North American, IEEE, 2005: 43-51. [19] Baiardi F, Telmon C, Sgandurra D. Hierarchical, model-based risk management of critical infrastructures[J]. Reliability Engineering & System Safety, 2009, 94(9): 1403-1415. [20] 卢强. 数字电力系统(DPS)[J]. 电力系统自动化, 2000, 24(9): 1-4. Lu Qiang. Digital power systems[J]. Automation of Electric Power Systems, 2000, 24(9): 1-4. [21] 王宇, 卢昱. 基于访问路径的网络安全脆弱性分析[J]. 计算机应用研究, 2008, 25(6) : 1796-1798. Wang Yu, Lu Yu. Analysis of net work security vulnerability based on access path [J]. Application Research of Computers, 2008, 25(6) : 1796-1798. [22] Chen-Ching L, Juhwan J, Heydt GT, et al. The strategic power infrastructure defense (SPID) system: a conceptual design [J]. IEEE Control Systems Magazine, 2000, 20(4) : 40-52. [23] Brooke P J, Paige R F. Fault trees for security system design and analysis[J]. Computers and Security, 2003, 22(3): 256 -264. [24] Bo Wang, Dahai You, Xianggen Yin, et al. A method for assessing power system security risk[C]. Asia-Pacific Power and Energy Engineering Conference, Chengdu, 2010: 1-5. [25] Dahai You, QingQian Chen, Xianggen Yin, et al. A study of electrical security risk assessment system based on electricity regulation[J]. Energy Policy, 2011, 39: 2062-2074. [26] Shui Yu, Wanlei Zhou, Entropy-based collaborative detection of DDOS attacks on community networks[C]. Proceedings of the 7th IEEE international Conference on Pervasive Computing and Communications, 2008: 566-571.