Optimal power grid protection through a defender-attacker-defender model

Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender–attacker–defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attacker–defender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defender–attacker–defender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems.

[1]  Harry W. Richardson,et al.  The Economic Costs and Consequences of Terrorism , 2008 .

[2]  Enrico Zio,et al.  Reliability engineering: Old problems and new challenges , 2009, Reliab. Eng. Syst. Saf..

[3]  G. Sheblé,et al.  Power generation operation and control — 2nd edition , 1996 .

[4]  J. Salmeron,et al.  Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.

[5]  Enrico Zio,et al.  Optimizing protections against cascades in network systems: A modified binary differential evolution algorithm , 2012, Reliab. Eng. Syst. Saf..

[6]  Bo Zeng,et al.  Vulnerability Analysis of Power Grids With Line Switching , 2013, IEEE Transactions on Power Systems.

[7]  Rae Zimmerman,et al.  Risk and Economic Costs of a Terrorist Attack on the Electric System , 2007 .

[8]  Vicki M. Bier,et al.  Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..

[9]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[10]  Gregory Levitin,et al.  Importance of protections against intentional attacks , 2008, Reliab. Eng. Syst. Saf..

[11]  Panos M. Pardalos,et al.  A mixed integer programming approach for optimal power grid intentional islanding , 2012, Energy Systems.

[12]  Kjell Hausken Strategic defense and attack for reliability systems , 2008, Reliab. Eng. Syst. Saf..

[13]  Long Zhao,et al.  Solving two-stage robust optimization problems using a column-and-constraint generation method , 2013, Oper. Res. Lett..

[14]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[15]  Eitan Israeli System Interdiction and Defense. , 1999 .

[16]  Gerald G. Brown,et al.  Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses , 2005 .

[17]  Dick Duffey,et al.  Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.

[18]  Philip G. Hill,et al.  Power generation , 1927, Journal of the A.I.E.E..

[19]  George E. Apostolakis,et al.  Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..

[20]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[21]  Mulukutla S. Sarma,et al.  Power System Analysis and Design , 1993 .

[22]  R. Alvarez,et al.  Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[23]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[24]  John C. McDonald,et al.  Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..

[25]  Gregory Levitin,et al.  Minmax defense strategy for complex multi-state systems , 2009, Reliab. Eng. Syst. Saf..

[26]  F.D. Galiana,et al.  A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.

[27]  Long Zhao,et al.  An Exact Algorithm for Power Grid Interdiction Problem with Line Switching , 2012 .

[28]  George E Apostolakis,et al.  A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[29]  Bo Zeng Solving Two-stage Robust Optimization Problems by A Constraint-and-Column Generation Method , 2011 .

[30]  Natalia Alguacil,et al.  Analysis of Electric Grid Interdiction With Line Switching , 2010, IEEE Transactions on Power Systems.