IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v165y2017icp144-154.html
   My bibliography  Save this article

Mitigating electric power system vulnerability to worst-case spatially localized attacks

Author

Listed:
  • Ouyang, Min
  • Xu, Min
  • Zhang, Chi
  • Huang, Shitong

Abstract

This paper proposes an approach to mitigate power system vulnerability against worst-case spatially localized attacks (SLAs), which are defined as the failure of a set of system components, distributed in a spatially localized area, due to natural hazards or malicious attacks, while other components outside of the area do not directly fail. This problem is mathematically formulated as a tri-level defender-attacker-defender model, where the inner level optimizes the power dispatch to minimize system vulnerability (quantified as power demand drop), the middle level identifies the most disruptive spatially localized attack, and the outer level makes an optimal mitigation decision, including protecting vulnerable components and building new lines, to reduce the SLAs-induced vulnerability. This model is exactly solved by a proposed decomposition algorithm. Case studies on the IEEE 14 bus test system demonstrate the effectiveness and efficiency of the proposed approach.

Suggested Citation

  • Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
  • Handle: RePEc:eee:reensy:v:165:y:2017:i:c:p:144-154
    DOI: 10.1016/j.ress.2017.03.031
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832016309498
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2017.03.031?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
    2. Nicholson, Charles D. & Barker, Kash & Ramirez-Marquez, Jose E., 2016. "Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning," Reliability Engineering and System Safety, Elsevier, vol. 145(C), pages 62-73.
    3. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    4. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2013. "Individual vs. overarching protection for minimizing the expected damage caused by an attack," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 117-125.
    5. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    6. Levitin, Gregory & Hausken, Kjell, 2009. "Meeting a demand vs. enhancing protections in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(11), pages 1711-1717.
    7. Kjell Hausken, 2011. "Protecting complex infrastructures against multiple strategic attackers," International Journal of Systems Science, Taylor & Francis Journals, vol. 42(1), pages 11-29.
    8. Adachi, Takao & Ellingwood, Bruce R., 2008. "Serviceability of earthquake-damaged water systems: Effects of electrical power availability and power backup systems on system vulnerability," Reliability Engineering and System Safety, Elsevier, vol. 93(1), pages 78-88.
    9. Gregory Levitin & Kjell Husken & Hanoch Ben-Haim, 2011. "Active And Passive Defense Against Multiple Attack Facilities," Asia-Pacific Journal of Operational Research (APJOR), World Scientific Publishing Co. Pte. Ltd., vol. 28(04), pages 431-444.
    10. Hong, Liu & Ouyang, Min & Peeta, Srinivas & He, Xiaozheng & Yan, Yongze, 2015. "Vulnerability assessment and mitigation for the Chinese railway system under floods," Reliability Engineering and System Safety, Elsevier, vol. 137(C), pages 58-68.
    11. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    12. Ouyang, Min, 2016. "Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 154(C), pages 106-116.
    13. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    14. Ouyang, Min, 2014. "Review on modeling and simulation of interdependent critical infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 43-60.
    15. G Levitin & K Hausken, 2012. "Individual versus overarching protection against strategic attacks," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(7), pages 969-981, July.
    16. Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
    17. Bier, Vicki M. & Gratz, Eli R. & Haphuriwat, Naraphorn J. & Magua, Wairimu & Wierzbicki, Kevin R., 2007. "Methodology for identifying near-optimal interdiction strategies for a power transmission system," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1155-1161.
    18. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mohandes, Baraa & Hammadi, Reem Al & Sanusi, Wasiu & Mezher, Toufic & Khatib, Sameh El, 2018. "Advancing cyber–physical sustainability through integrated analysis of smart power systems: A case study on electric vehicles," International Journal of Critical Infrastructure Protection, Elsevier, vol. 23(C), pages 33-48.
    2. Li, Jian & Shi, Congling & Chen, Changkun & Dueñas-Osorio, Leonardo, 2018. "A cascading failure model based on AC optimal power flow: Case study," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 508(C), pages 313-323.
    3. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    4. Abedi, Amin & Gaudard, Ludovic & Romerio, Franco, 2019. "Review of major approaches to analyze vulnerability in power system," Reliability Engineering and System Safety, Elsevier, vol. 183(C), pages 153-172.
    5. Dong, Zhengcheng & Tian, Meng & Li, Xin & Lai, Jingang & Tang, Ruoli, 2022. "Mitigating cascading failures of spatially embedded cyber–physical power systems by adding additional information links," Reliability Engineering and System Safety, Elsevier, vol. 225(C).
    6. Peng Jiang & Shengjun Huang & Tao Zhang, 2019. "Optimal Deception Strategies in Power System Fortification against Deliberate Attacks," Energies, MDPI, vol. 12(3), pages 1-20, January.
    7. Peng, Rui & Wu, Di & Xiao, Hui & Xing, Liudong & Gao, Kaiye, 2019. "Redundancy versus protection for a non-reparable phased-mission system subject to external impacts," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    8. Zhu, Huaxing & Zhang, Chi, 2019. "Expanding a complex networked system for enhancing its reliability evaluated by a new efficient approach," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 205-220.
    9. Wu, Yipeng & Chen, Zhilong & Gong, Huadong & Feng, Qilin & Chen, Yicun & Tang, Haizhou, 2021. "Defender–attacker–operator: Tri-level game-theoretic interdiction analysis of urban water distribution networks," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    10. Zou, Qiling & Chen, Suren, 2019. "Enhancing resilience of interdependent traffic-electric power system," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    11. Li, Tao & Rong, Lili & Yan, Kesheng, 2019. "Vulnerability analysis and critical area identification of public transport system: A case of high-speed rail and air transport coupling system in China," Transportation Research Part A: Policy and Practice, Elsevier, vol. 127(C), pages 55-70.
    12. Su, Huai & Zio, Enrico & Zhang, Jinjun & Li, Xueyi, 2018. "A systematic framework of vulnerability analysis of a natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 79-91.
    13. Li, Yulong & Zhang, Chi & Jia, Chuanzhou & Li, Xiaodong & Zhu, Yimin, 2019. "Joint optimization of workforce scheduling and routing for restoring a disrupted critical infrastructure," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    14. Wang, Shuliang & Guo, Zhaoyang & Huang, Xiaodi & Zhang, Jianhua, 2024. "A three-stage model of quantifying and analyzing power network resilience based on network theory," Reliability Engineering and System Safety, Elsevier, vol. 241(C).
    15. Hasanzad, Fardin & Rastegar, Hasan, 2022. "Application of optimal hardening for improving resilience of integrated power and natural gas system in case of earthquake," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    16. Yu, Jin-Zhu & Whitman, Mackenzie & Kermanshah, Amirhassan & Baroud, Hiba, 2021. "A hierarchical Bayesian approach for assessing infrastructure networks serviceability under uncertainty: A case study of water distribution systems," Reliability Engineering and System Safety, Elsevier, vol. 215(C).
    17. Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
    18. Wang, Shuliang & Lv, Wenzhuo & Zhang, Jianhua & Luan, Shengyang & Chen, Chen & Gu, Xifeng, 2021. "Method of power network critical nodes identification and robustness enhancement based on a cooperative framework," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    2. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    5. Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
    6. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    7. Min Ouyang & Hui Tian & Zhenghua Wang & Liu Hong & Zijun Mao, 2019. "Critical Infrastructure Vulnerability to Spatially Localized Failures with Applications to Chinese Railway System," Risk Analysis, John Wiley & Sons, vol. 39(1), pages 180-194, January.
    8. McCarter, Matthew & Barker, Kash & Johansson, Jonas & Ramirez-Marquez, Jose E., 2018. "A bi-objective formulation for robust defense strategies in multi-commodity networks," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 154-161.
    9. Almoghathawi, Yasser & Selim, Shokri & Barker, Kash, 2023. "Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    10. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    11. Yi‐Ping Fang & Giovanni Sansavini & Enrico Zio, 2019. "An Optimization‐Based Framework for the Identification of Vulnerabilities in Electric Power Grids Exposed to Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1949-1969, September.
    12. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    13. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    14. Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
    15. Fang, Yi-Ping & Zio, Enrico, 2019. "An adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazards," European Journal of Operational Research, Elsevier, vol. 276(3), pages 1119-1136.
    16. Ouyang, Min, 2016. "Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 154(C), pages 106-116.
    17. Ouyang, Min & Liu, Chuang & Wu, Shengyu, 2020. "Worst-case vulnerability assessment and mitigation model of urban utility tunnels," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    18. Zhao, Chen & Li, Nan & Fang, Dongping, 2018. "Criticality assessment of urban interdependent lifeline systems using a biased PageRank algorithm and a multilayer weighted directed network model," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 100-112.
    19. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    20. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:165:y:2017:i:c:p:144-154. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.