Smart Grid Vulnerability under Cascade-Based Sequential Line-Switching Attacks

Recently, the sequential attack, where multiple malignant contingencies are launched by attackers sequentially, has revealed power grid vulnerability under cascading failures. This paper systematically analyzes properties and features of N-k cascaded- based sequential line-switching attacks using a DC power flow based cascading failure simulator (DC- CFS). This paper first explains the key factors behind cascade-based attacks, then compares three adopted metrics with an original line-margin metric to compute vulnerability indexes and design sequential attacks. Two target search schemes, i.e., offline and online target search in sequential attacks, are also presented. Simulation results of N-2 to N-4 line-switching attacks have suggested that the proposed line margin metric produces stronger sequential attacks, and online target search is more effective than offline search. Reasons behind counter-intuitive load loss resulting from different metrics are also analyzed to facilitate future study on the risk of sequential attacks.

[1]  Haibo He,et al.  The sequential attack against power grid networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[2]  Quan Chen,et al.  Composite Power System Vulnerability Evaluation to Cascading Failures Using Importance Sampling and Antithetic Variates , 2013, IEEE Transactions on Power Systems.

[3]  Jun Yan,et al.  Risk-aware vulnerability analysis of electric grids from attacker's perspective , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[4]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[5]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[6]  Haibo He,et al.  Supplementary File : Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph , 2013 .

[7]  Jun Yan,et al.  Cascading Failure Analysis With DC Power Flow Model and Transient Stability Analysis , 2015, IEEE Transactions on Power Systems.

[8]  My T. Thai,et al.  Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment , 2013, IEEE Transactions on Smart Grid.

[9]  Haibo He,et al.  Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[11]  Bo Zeng,et al.  Vulnerability Analysis of Power Grids With Line Switching , 2013, IEEE Transactions on Power Systems.

[12]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[13]  Paul Hines,et al.  A “Random Chemistry” Algorithm for Identifying Collections of Multiple Contingencies That Initiate Cascading Failure , 2012, IEEE Transactions on Power Systems.

[14]  Haibo He,et al.  Resilience Analysis of Power Grids Under the Sequential Attack , 2014, IEEE Transactions on Information Forensics and Security.

[15]  C.W. Taylor,et al.  The anatomy of a power grid blackout - Root causes and dynamics of recent major blackouts , 2006, IEEE Power and Energy Magazine.

[16]  Harry Eugene Stanley,et al.  Catastrophic cascade of failures in interdependent networks , 2009, Nature.

[17]  James S. Thorp,et al.  Anatomy of power system blackouts: preventive relaying strategies , 1996 .

[18]  Natalia Alguacil,et al.  Analysis of Electric Grid Interdiction With Line Switching , 2010, IEEE Transactions on Power Systems.

[19]  Haibo He,et al.  Load distribution vector based attack strategies against power grid systems , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[20]  Kwang-Cheng Chen,et al.  Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.

[21]  Jian-Wei Wang,et al.  Cascade-based attack vulnerability on the US power grid. , 2009 .

[22]  Margaret J. Eppstein,et al.  Rapid Assessment, Visualization, and Mitigation of Cascading Failure Risk in Power Systems , 2015, 2015 48th Hawaii International Conference on System Sciences.