The Value of Recovery Transformers in Protecting an Electric Transmission Grid Against Attack

This paper incorporates, as part of an attacker-defender (AD) model for an electric power transmission grid, an inventory of “recovery spares” for high-voltage transformers (HVTs). In this sequential-game model, an attacker first uses limited resources to disable grid components, seeking to maximize second-stage “total cost.” This value corresponds to a defender who operates the damaged grid to minimize generating and economic load-shedding costs. The defender's problem includes 1) optimal power-flow solutions to represent post-attack operations, 2) optimized replacement of disabled HVTs with quickly installable recovery spares, and 3) longer-term replacements using new procurements. Global Benders decomposition, with a mixed-integer subproblem, solves the AD model; new enumerative techniques help solve the decomposition's master problem and subproblems. Computational tests demonstrate tradeoffs between the number of recovery spares and worst-case total cost, and show how the model could help guide an inventory strategy for recovery spares in an adversarial setting.

[1]  F.D. Galiana,et al.  A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.

[2]  Christian Posse,et al.  Evaluating North American Electric Grid Reliability Using the Barabasi-Albert Network Model , 2004, nlin/0408052.

[3]  Rogelio E. Alvarez Interdicting Electrical Power Grids , 2004 .

[4]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[5]  Gerald G. Brown,et al.  Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses , 2005 .

[6]  R. Kevin Wood,et al.  Shortest‐path network interdiction , 2002, Networks.

[7]  Natalia Alguacil,et al.  Analysis of Electric Grid Interdiction With Line Switching , 2010, IEEE Transactions on Power Systems.

[8]  Paul W. Parfomak Physical Security of the U.S. Power Grid: High-Voltage Transformer Substations [June 17, 2014] , 2014 .

[9]  Kuang-An Chang,et al.  Probabilistic hurricane surge forecasting using parameterized surge response functions , 2011 .

[10]  Chee Chien Ang,et al.  Optimized recovery of damaged electrical power grids , 2006 .

[11]  Philip G. Hill,et al.  Power generation , 1927, Journal of the A.I.E.E..

[12]  Bo Zeng,et al.  Vulnerability Analysis of Power Grids With Line Switching , 2013, IEEE Transactions on Power Systems.

[13]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[14]  Paul W. Parfomak,et al.  Electric Utility Infrastructure Vulnerabilities: Transformers, Towers, and Terrorism [April 9, 2004] , 2004 .

[15]  Devika Subramanian,et al.  Performance assessment of topologically diverse power systems subjected to hurricane events , 2010, Reliab. Eng. Syst. Saf..

[16]  Ross Baldick,et al.  Optimizing Electric Grid Design under Asymmetric Threat , 2003 .

[17]  Vicki M. Bier,et al.  Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..

[18]  I. Dobson,et al.  Investment Planning for Electric Power Systems Under Terrorist Threat , 2010, IEEE Transactions on Power Systems.

[19]  Jose F. Espiritu,et al.  Component criticality importance measures for the power industry , 2007 .

[20]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[21]  R. W. Rose,et al.  Defending Electrical Power Grids , 2007 .

[22]  J. Salmeron,et al.  Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.

[23]  Gerald G. Brown,et al.  Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..