A graph-theoretical characterization of power network vulnerabilities

This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph with the power plant. We provide a necessary and sufficient graph theoretic condition for the existence of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic perspective, we generalize a known result on the structural rank of the transfer matrix of a state space system to take into account a set of algebraic constraints.

[1]  J. Pearson Linear multivariable control, a geometric approach , 1977 .

[2]  Kurt Johannes Reinschke,et al.  Multivariable Control a Graph-theoretic Approach , 1988 .

[3]  Jacob van der Woude,et al.  A graph-theoretic characterization for the rank of the transfer matrix of a structured system , 1991, Math. Control. Signals Syst..

[4]  Frank L. Lewis,et al.  A tutorial on the geometric analysis of linear time-invariant implicit systems , 1992, Autom..

[5]  K. Reinschke Graph-theoretic approach to symbolic analysis of linear descriptor systems , 1994 .

[6]  Harry L. Trentelman,et al.  Control theory for linear systems , 2002 .

[7]  Christian Commault,et al.  Generic properties and control of linear structured systems: a survey , 2003, Autom..

[8]  Ernst Scholtz,et al.  Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems , 2004 .

[9]  Didier Georges,et al.  Robust fault-tolerant control for descriptor systems , 2004, IEEE Transactions on Automatic Control.

[10]  Dominique Sauter,et al.  Observability of structured linear systems in descriptor form: A graph-theoretic approach , 2006, Autom..

[11]  J. Tokarzewski Finite Zeros in Discrete Time Control Systems , 2006 .

[12]  Volker Mehrmann,et al.  Differential-Algebraic Equations: Analysis and Numerical Solution , 2006 .

[13]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[14]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[15]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[16]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[17]  W. Marsden I and J , 2012 .