A Maximum-Flow-Based Complex Network Approach for Power System Vulnerability Analysis

This paper proposes a maximum-flow-based complex network approach for the analysis of the vulnerability of power systems. A new centrality index is proposed, taking into consideration the maximum flow from the source (generator) nodes to the sink (load) nodes, for assessing the network. The Max-Flow Min-Cut Theorem, also known as Ford-Fulkerson Theorem, is used for evaluating the capacity of links. The proposed methodology is then used to identify vulnerable lines of the IEEE 118 bus system and its effectiveness is demonstrated through simulation studies.

[1]  Xinghuo Yu,et al.  Identifying vulnerable lines in a power network using complex network theory , 2009, 2009 IEEE International Symposium on Industrial Electronics.

[2]  Yang Jingyan,et al.  Vulnerability assessment of bulk power grid based on complex network theory , 2008, 2008 Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies.

[3]  Guanrong Chen,et al.  Complex networks: small-world, scale-free and beyond , 2003 .

[4]  R. Mark Nelms,et al.  Diagnostic technique for power systems utilizing infrared thermal imaging , 1995, IEEE Trans. Ind. Electron..

[5]  V. K. Balakrishnan Schaum's outline of theory and problems of graph theory , 1997 .

[6]  Adriano Valenzano,et al.  Detecting Chains of Vulnerabilities in Industrial Networks , 2009, IEEE Transactions on Industrial Informatics.

[7]  A.R.A. El-Keib,et al.  Power system analysis: short-circuit load flow and harmonics , 2002 .

[8]  Ke Sun,et al.  Complex Networks Theory: A New Method of Research in Power Grid , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.

[9]  H E Stanley,et al.  Classes of small-world networks. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[10]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[11]  Andrew V. Goldberg,et al.  A new approach to the maximum flow problem , 1986, STOC '86.

[12]  Martí Rosas-Casals,et al.  Robustness of the European power grids under intentional attack. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[13]  Alfredo Vaccaro,et al.  A distributed architecture for online power systems security analysis , 2004, IEEE Transactions on Industrial Electronics.

[14]  Zhao Yang Dong,et al.  An improved model for structural vulnerability analysis of power networks , 2009 .

[15]  Alfredo Vaccaro,et al.  Pervasive grid for large-scale power systems contingency analysis , 2006, IEEE Transactions on Industrial Informatics.

[16]  Christian Posse,et al.  Evaluating North American Electric Grid Reliability Using the Barabasi-Albert Network Model , 2004, nlin/0408052.

[17]  Yan Mi,et al.  A Novel Power Supply of Online Monitoring Systems for Power Transmission Lines , 2010, IEEE Transactions on Industrial Electronics.

[18]  Xinghuo Yu,et al.  Analyzing power network vulnerability with maximum flow based centrality approach , 2010, 2010 8th IEEE International Conference on Industrial Informatics.

[19]  Xinghuo Yu,et al.  The New Frontier of Smart Grids , 2011, IEEE Industrial Electronics Magazine.

[20]  Richard M. Karp,et al.  Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems , 1972, Combinatorial Optimization.

[21]  Adilson E Motter,et al.  Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[22]  Seth Blumsack,et al.  A Centrality Measure for Electrical Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[23]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[24]  L. Freeman,et al.  Centrality in valued graphs: A measure of betweenness based on network flow , 1991 .

[25]  Lu Zongxiang,et al.  Cascading failure analysis of bulk power system using small-world network model , 2005, 2004 International Conference on Probabilistic Methods Applied to Power Systems.

[26]  Liangzhong Yao,et al.  Vulnerability assessment for cascading failures in electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[27]  Igor Nai Fovino,et al.  A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems , 2011, IEEE Transactions on Industrial Informatics.

[28]  Alfredo Pironti,et al.  Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access , 2011, IEEE Transactions on Industrial Informatics.

[29]  Massimo Marchiori,et al.  A topological analysis of the Italian electric power grid , 2004 .

[30]  D. R. Fulkerson,et al.  Maximal Flow Through a Network , 1956 .

[31]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[32]  Mohammad Shahidehpour,et al.  Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing , 2003 .

[33]  Massimo Marchiori,et al.  Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[34]  Ming Ding,et al.  Reliability assessment to large-scale power grid based on small-world topological model , 2006, 2006 International Conference on Power System Technology.

[35]  Ricard V. Solé,et al.  Topological Vulnerability of the European Power Grid under Errors and Attacks , 2007, Int. J. Bifurc. Chaos.

[36]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.