Resilience Analysis of Power Grids Under the Sequential Attack

The modern society increasingly relies on electrical service, which also brings risks of catastrophic consequences, e.g., large-scale blackouts. In the current literature, researchers reveal the vulnerability of power grids under the assumption that substations/transmission lines are removed or attacked synchronously. In reality, however, it is highly possible that such removals can be conducted sequentially. Motivated by this idea, we discover a new attack scenario, called the sequential attack, which assumes that substations/transmission lines can be removed sequentially, not synchronously. In particular, we find that the sequential attack can discover many combinations of substation whose failures can cause large blackout size. Previously, these combinations are ignored by the synchronous attack. In addition, we propose a new metric, called the sequential attack graph (SAG), and a practical attack strategy based on SAG. In simulations, we adopt three test benchmarks and five comparison schemes. Referring to simulation results and complexity analysis, we find that the proposed scheme has strong performance and low complexity.

[1]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[2]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[3]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[4]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  Vito Latora,et al.  Modeling cascading failures in the North American power grid , 2005 .

[6]  D. L. Pepyne,et al.  Topology and cascading line outages in power grids , 2007 .

[7]  I. Dobson,et al.  Initial review of methods for cascading failure analysis in electric power transmission systems IEEE PES CAMS task force on understanding, prediction, mitigation and restoration of cascading failures , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[8]  Mathieu Bastian,et al.  Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.

[9]  Fei Xue,et al.  Structural vulnerability of power systems: A topological approach , 2011 .

[10]  Jian-Wei Wang,et al.  Cascade-based attack vulnerability on the US power grid. , 2009 .

[11]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[12]  P. Hines,et al.  Do topological models provide good information about electricity infrastructure vulnerability? , 2010, Chaos.

[13]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.

[14]  Gil Zussman,et al.  Network vulnerability to single, multiple, and probabilistic physical attacks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[15]  Haibo He,et al.  Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[16]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[17]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[18]  Anna Filomena Carbone,et al.  Power Grid Complexity , 2011 .

[19]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[20]  Paul Hines,et al.  A “Random Chemistry” Algorithm for Identifying Collections of Multiple Contingencies That Initiate Cascading Failure , 2012, IEEE Transactions on Power Systems.

[21]  I. Dobson,et al.  Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.

[22]  J. Hale,et al.  Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid , 2012, 2012 5th International Symposium on Resilient Control Systems.

[23]  Haibo He,et al.  Load distribution vector based attack strategies against power grid systems , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[24]  Neng Fan,et al.  N-1-1 contingency-constrained optimal power flow by interdiction methods , 2012, 2012 IEEE Power and Energy Society General Meeting.

[25]  H. Ghasemi,et al.  Optimal Transmission Switching Considering Voltage Security and N-1 Contingency Analysis , 2013, IEEE Transactions on Power Systems.

[26]  Jun Yan,et al.  Risk-aware vulnerability analysis of electric grids from attacker's perspective , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[27]  Wolfgang Kröger,et al.  Performance of Electric Power Systems Under Physical Malicious Attacks , 2013, IEEE Systems Journal.

[28]  Jeff Tollefson,et al.  US electrical grid on the edge of failure , 2013, Nature.

[29]  Zuyi Li,et al.  Optimal budget deployment strategy against power grid interdiction , 2013, 2013 Proceedings IEEE INFOCOM.

[30]  Haibo He,et al.  Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map , 2013, IEEE Transactions on Information Forensics and Security.

[31]  Haibo He,et al.  Revealing temporal features of attacks against smart grid , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[32]  Jinyu Wen,et al.  Energy-Storage-Based Low-Frequency Oscillation Damping Control Using Particle Swarm Optimization and Heuristic Dynamic Programming , 2014, IEEE Transactions on Power Systems.

[33]  Athanasios V. Vasilakos,et al.  Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.

[34]  Haibo He,et al.  Integrated Security Analysis on Cascading Failure in Complex Networks , 2014, IEEE Transactions on Information Forensics and Security.

[35]  Haibo He,et al.  The sequential attack against power grid networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[36]  Haibo He,et al.  Supplementary File : Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph , 2013 .

[37]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[38]  Jun Yan,et al.  Cascading Failure Analysis With DC Power Flow Model and Transient Stability Analysis , 2015, IEEE Transactions on Power Systems.