Correlated Failures of Power Systems : Analysis of the Nordic Grid

The emphasis of this master's thesis is modeling and simulation of failures in large-scale power grids. The linear DC-model governing the active power ows is derived and discussed, and the optimal load shedding problem is introduced. Using Monte Carlo simulations, we have analyzed the eects of correlations between failures of power lines on the total system load shed. Correlations are introduced by a Bernoulli failure model with its rst two ordinary moments given explicitly. The total system load shed is determined by solving the optimal load shedding problem in a MATLAB environment using YALMIP and the GLPK solver. We have introduced a Monte Carlo simulation framework for sampling the statistics of the system load shed as a function of stochastic network parameters, and provide explicit guarantees on the sampling accuracy. This framework has been applied to a 470 bus model of the Nordic power grid. It has been found that increased correlations between Bernoulli failures of power lines can dramatically increase the expected value as well as the variance of the system load shed.

[1]  B. Bereanu,et al.  The continuity of the optimum in parametric programming and applications to stochastic programming , 1976 .

[2]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[3]  Adam Stotz,et al.  Situational awareness of a coordinated cyber attack , 2005, SPIE Defense + Commercial Sensing.

[4]  Kishor S. Trivedi,et al.  Fighting bugs: remove, retry, replicate, and rejuvenate , 2007, Computer.

[5]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[6]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[7]  Caixa Postal OPTIMAL ACTIVE POWER DISPATCH BY NETWORK FLOW APPROACH , 1988 .

[8]  K. Uhlen,et al.  Monitoring amplitude, frequency and damping of power system oscillations with PMU measurements , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[9]  Adilson E. Motter,et al.  Stochastic Model for Power Grid Dynamics , 2006, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[10]  Bapi Chatterjee,et al.  An optimization formulation to compute Nash equilibrium in finite games , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).

[11]  Arun G. Phadke,et al.  Synchronized phasor measurements-a historical overview , 2002, IEEE/PES Transmission and Distribution Conference and Exhibition.

[12]  Janusz Bialek,et al.  Approximate model of European interconnected system as a benchmark system to study effects of cross-border trades , 2005 .

[13]  B Stott,et al.  Linear Programming for Power-System Network Security Applications , 1979, IEEE Transactions on Power Apparatus and Systems.

[14]  Geir Storvik,et al.  Simulation and Monte Carlo Methods , 2006 .

[15]  J. Mcneff The global positioning system , 2002 .

[16]  Ingrid Verbauwhede,et al.  Intrinsic PUFs from Flip-flops on Reconfigurable Devices , 2008 .

[17]  Roy Billinton,et al.  A security based approach to composite power system reliability evaluation , 1992 .

[18]  Claudia Eckert,et al.  Improving the quality of ring oscillator PUFs on FPGAs , 2010, WESS '10.

[19]  G. T. Heydt,et al.  Power flow control and power flow studies for systems with FACTS devices , 1998 .

[20]  Jizhong Zhu,et al.  Optimization of Power System Operation , 2009 .

[21]  H. Happ,et al.  Quadratically Convergent Optimal Power Flow , 1984, IEEE Transactions on Power Apparatus and Systems.

[22]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[23]  K. Uhlen,et al.  Deployment of a SCADA integrated wide area monitoring system , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition: Latin America.

[24]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[25]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[26]  John D. Fernandez,et al.  SCADA systems: vulnerabilities and remediation , 2005 .

[27]  Markus Jakobsson,et al.  Implicit authentication for mobile devices , 2009 .

[28]  A. Daneels,et al.  Современные SCADA-системы , 2017 .

[29]  Miodrag Potkonjak,et al.  Techniques for Design and Implementation of Secure Reconfigurable PUFs , 2009, TRETS.

[30]  Alexander S. Ecker,et al.  Generating Spike Trains with Specified Correlation Coefficients , 2009, Neural Computation.

[31]  R. Billinton,et al.  Probabilistic assessment of power systems , 2000, Proceedings of the IEEE.

[32]  Roy Billinton,et al.  Distribution system reliability cost/worth analysis using analytical and sequential simulation techniques , 1998 .

[33]  Johan Efberg,et al.  YALMIP : A toolbox for modeling and optimization in MATLAB , 2004 .

[34]  M. Amin,et al.  Security challenges for the electricity infrastructure , 2002 .

[35]  Hervé Debar,et al.  Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.

[36]  D. Reed Electric utility distribution analysis for extreme winds , 2008 .

[37]  Paris Kitsos,et al.  A reconfigurable linear feedback shift register (LFSR) for the Bluetooth system , 2001, ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.01EX483).

[38]  J. Lofberg,et al.  YALMIP : a toolbox for modeling and optimization in MATLAB , 2004, 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508).

[39]  Nitesh Saxena,et al.  Universal device pairing using an auxiliary device , 2008, SOUPS '08.

[40]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[41]  M. Hemmingsson,et al.  Wide area system monitoring and control - terminology, phenomena, and solution implementation strategies , 2004, IEEE Power and Energy Magazine.

[42]  Takaaki Ohishi,et al.  Optimal active power dispatch by network flow approach , 1988 .

[43]  Francisco D. Galiana,et al.  A survey of the optimal power flow literature , 1991 .

[44]  D. Duffie,et al.  An Overview of Value at Risk , 1997 .

[45]  M. Ferris,et al.  Optimal Transmission Switching , 2008, IEEE Transactions on Power Systems.

[46]  Reuven Y. Rubinstein,et al.  Simulation and the Monte Carlo method , 1981, Wiley series in probability and mathematical statistics.

[47]  Srinivas Devadas,et al.  Modeling attacks on physical unclonable functions , 2010, CCS '10.

[48]  Alfonso Valdes,et al.  Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.

[49]  N.G. Hingorani,et al.  Flexible AC transmission , 1993, IEEE Spectrum.

[50]  Rached Tourki,et al.  A Reconfigurable Implementation of the New Secure Hash Algorithm , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[51]  Karsten Neuhoff,et al.  Working Papers in Economics CWPE 0463 Electricity Transmission : An Overview of the Current Debate , 2004 .

[52]  Zhao Xu,et al.  Evaluating frequency quality of Nordic system using PMU data , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[53]  D. Fudenberg,et al.  The Theory of Learning in Games , 1998 .

[54]  Hua Wei,et al.  An interior point nonlinear programming for optimal power flow problems with a novel data structure , 1997 .

[55]  James S. Thorp,et al.  Expose hidden failures to prevent cascading outages [in power systems] , 1996 .

[56]  Daniel Karlsson,et al.  Wide-Area Protection and Power System Utilization , 2005, Proceedings of the IEEE.

[57]  Peng Wang,et al.  Teaching distribution system reliability evaluation using Monte Carlo simulation , 1999 .

[58]  Xiao-Ping Zhang,et al.  Advanced implementation of UPFC in a nonlinear interior-point OPF , 2001 .

[59]  Y. Z. Sun,et al.  Power Flow Control Approach to Power Systems with Embedded Facts Devices , 2002, IEEE Power Engineering Review.

[60]  Liam Murphy,et al.  An open design approach for distributed energy management systems , 1993 .

[61]  R. Adapa,et al.  A review of selected optimal power flow literature to 1993. II. Newton, linear programming and interior point methods , 1999 .

[62]  Laurent Alaus,et al.  A reconfigurable linear feedback shift register operator for software defined radio terminal , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.

[63]  Rachel A. Davidson,et al.  Electric Power Distribution System Performance in Carolina Hurricanes , 2003 .

[64]  W. Tinney,et al.  Optimal Power Flow By Newton Approach , 1984, IEEE Transactions on Power Apparatus and Systems.

[65]  A.G. Phadke,et al.  Synchronized phasor measurements in power systems , 1993, IEEE Computer Applications in Power.

[66]  X. Wang,et al.  Modern power system planning , 1994 .

[67]  G. Edward Suh,et al.  Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[68]  S. Nassif Delay variability: sources, impacts and trends , 2000, 2000 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.00CH37056).

[69]  O. S. Grande,et al.  Experience with the Nord Pool design and implementation , 2003 .

[70]  Mohammed H. Albadi,et al.  Demand Response in Electricity Markets: An Overview , 2007, 2007 IEEE Power Engineering Society General Meeting.

[71]  J.W. Bialek,et al.  Approximate model of European interconnected system as a benchmark system to study effects of cross-border trades , 2005, IEEE Transactions on Power Systems.

[72]  M.T.O. Amanullah,et al.  Network Security Vulnerabilities in SCADA and EMS , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.

[73]  B.F. Wollenberg,et al.  Toward a smart grid: power delivery for the 21st century , 2005, IEEE Power and Energy Magazine.

[74]  Jason Cong,et al.  Challenges and Opportunities for Design Innovations in Nanometer Technologies , 1998 .

[75]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[76]  Michael Chertkov,et al.  Predicting Failures in Power Grids , 2010 .

[77]  A.M.L. da Silva,et al.  Well-being analysis for composite generation and transmission systems , 2004, IEEE Transactions on Power Systems.

[78]  Thiagalingam Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation , 2001 .

[79]  Wenyuan Li,et al.  Reliability Assessment of Electric Power Systems Using Monte Carlo Methods , 1994 .

[80]  Vito Latora,et al.  Modeling cascading failures in the North American power grid , 2005 .

[81]  Juan C. Meza,et al.  Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid , 2010, SIAM J. Optim..

[82]  J. Arroyo,et al.  On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.

[83]  David Watts Security & Vulnerability in Electric Power Systems , 2003 .

[84]  S. C. Srivastava,et al.  Optimal reactive power dispatch considering FACTS devices , 1997 .

[85]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[86]  Ali Abur,et al.  Static security enhancement via optimal utilization of thyristor-controlled series capacitors , 2002 .

[87]  Michael G. Pollitt,et al.  The arguments for and against ownership unbundling of energy transmission networks , 2008 .

[88]  R. Pappu,et al.  Physical One-Way Functions , 2002, Science.