Documente Academic
Documente Profesional
Documente Cultură
1. Introduction
Vulnerability analysis is necessary for electrical utility operators to identify the vulnerable components whose protection or back-up will result in a system that is more robust against natural or malicious threats. The conventional vulnerability analysis based on complete operation data and standard engineering models in power systems [1] [2] is challenged in large power systems since the topological and physical properties become more and more complicate in power systems with the increase of size and introduction of electricity market. It is noticed that there exits a close relation between topological structure and physical properties of power systems. So the vulnerability can be assessed from the topological perspective. Most social, biological and technological network have shown non-trivial topological features that have
978-0-7695-3974-4/10 $26.00 2010 IEEE DOI 10.1109/COMPENG.2010.10 52
more than once. A geodesic path (i.e. shortest path) is the path which has minimal number of edges between two vertices. The geodesic distance dij is the number of edges in geodesic path between vertices i to j. In a network, the importance of a vertex can be measured by the betweenness of vertex, which is defined as [12]: NB N B ij (v) ,i j vB (1) B(v) =
i j
ij
where ij(v) is the number of the geodesic paths between vertices i and j that pass through a vertex v (i ju). ij denotes the total number of the geodesic paths connecting vertex i and vertex j. NB is the number of vertex in network. Similarly, the edge betweenness can also be defined as: NB NB ij (l ) ,i jB ,l L (2) B(l ) =
i j
where hlg and hld are respectively the l-th row g-th column and l-th row d-th column of H. In order to maintain the stability and security operation of power grid, each transmission line l has its own transmission limit Flmax. The line flow limits play a major role in the power transmission between generation buses and load buses; to consider their impacts we define the power transmission capacity Cgd as the power which is injected at bus g and withdrawn at bus d when the first line, in all electrical paths connecting a generation g and a load d reaches its limit. In formulas: d Cg = min( Fl max hlgd ) (4)
ij
Where ij(l) is the number of the geodesic paths between vertices i and j that includes the edge l.
According to above-mentioned specific features of power grid, the betweenness of bus can be redefined as: 1 d T (v ) = C g hlgd , v g d B (5) 2 gG d D lLV where 1/2|hlgd| is the sum of the PTDF of all lines connecting a bus v when a power injecting at bus g and withdrawing at bus d; 1/2Cgd|hlgd| represents the actual transmission power taken by the bus v when the power is transmitted from generation bus g to load bus d; T(v)is the total transmission power taken by the bus v in the whole power grid; G and D respectively are the sets of generation buses and load buses; LV is the set of lines connecting a bus v. Similarly, edge betweenness of line can be redefined as: T (l ) = max[T p (l ), T n (l ) ] , l L (6)
where Tp(l) and |Tn(l)| represent respectively the positive betweenness and the negative betweenness of the line l: d gd T p (l ) = Cg hl ,if hlgd > 0
gG d D d gd T (l ) = C g hl ,if hlgd < 0 n g G d D
l L
where hlgd is the PTDF on line l when a power injecting at generation bus g and withdrawing at load bus d; Cgdhlgd represents the actual transmitting power on the line l when the power is transmitted from g to d; T(l)is the total transmitting power on line l.
4. Numerical analysis
In this section, the electrical betweenness is compared with the topological betweenness in IEEE 300-bus network [13] which consists of 409 lines and 300 buses including 69 generator buses and 199 load buses. The comparison is made by the un-served energy after the network is attacked by removing the components (buses or lines). The un-served energy is
53
computed by an engineering vulnerability assessment model (VSM) [1] through optimal dispatch and load shedding, using DC power flow. Because various network operation states may result in distinct results of VSM for the same attacks, the un-served energy evaluation for the same attacks are averaged in 100 various instances. In each instance, the load demand randomly changes in the interval [0, 2Pd] (Pd is the base load demand in the network, dD). Take betweenness of line for example. Firstly, the betweenness metric is used to rank lines in descending order criticality which suggests Strategy 1 to attack the network. In each evaluation, after successive removal of the lines according to the Strategy1, the change of un-served energy is computed by VSM. Fig. 1 shows the average change of un-served load for the Strategy1. Similarly, another Strategy2 relative to the removing order of lines is ranked by the topological betweenness metric. Also, Fig.1 reports the average change of unserved energy for the Strategy2. From Fig. 1, the amount of un-served load after each line attack according to strategy1 is more than that depending on strategy2. That implies that the criticality of lines ranked by electrical betweenness is more effective than the topological betweenness.
100
[1] J. Salmeron, K. Wood, and R. Baldick, Analysis of electric grid security under terrorist threat, IEEE Transactions On Power Systems., vol. 19, no.: 2, May, 2004, pp. 905912, doi: 10.1109/TPWRS.2004.825888. [2] Cai, G. W., Chan, K. W., Yuan, W. P. and Mu, G., Identification of the vulnerable transmission segment and cluster of critical machines using line transient potential energy, International Journal of Electrical Power & Energy Systems, vol. 29, no.: 3, Mar. 2007, pp.199-207, doi: 10.1016/j.ijepes.2006.06.007.
80
60
40
20
-20 0
50
100
150
200
250
300
350
400
Figure 1. The average change of un-served load after line attacks for strategy1 &2
5. Conclusion
In this paper we propose an electric betweenness metric by introducing specificity of power grid. The proposed metric is compared with topological betweenness in IEEE-300 bus network. The results show the network is more vulnerable when the network is attacked by removing critical components identified by electrical betweenness metric.
[3] D. J. Watts and S. H. Strogatz, Collective dynamics of small world networks, Nature, vol. 393, Jun. 1998, pp. 440-442, doi: 10.1038/30918. [4] A. L. Barabsi and R. Albert, Emergence of scaling in random networks, Science, 286, no.: 5439, Oct. 1999, pp. 509-512, doi: 10.1126/science.286.5439.509. [5] Holmgren, A., Using Graph Models to Analyze the Vulnerability of Electric Power Networks, Risk Analysis, vol. 26, no.: 4, Aug. 2006, pp. 955 969, doi: 10.1111/j.1539-6924.2006.00791.x. [6] R. Albert, I. Albert and G. L. Nakarado, Structure vulnerability of the North American power grid, Physical Review E, vol. 69, no.: 2, Feb. 2004, 025103, doi: 10.1103/PhysRevE.69.025103. [7] V. Rosato, S. Bologna and F. Tiriticco, Topological properties of high-voltage electrical transmission networks, Electric Power Systems Research, vol. 77, no.: 2, Feb. 2007, pp. 99-105, doi: 10.1016/j.epsr.2005.05.013. [8] Marti Rosas-Casals, Sergi Valverde and Ricard V. Sole, Topological vulnerability of the European power grid under Errors and Attacks, International Journal of Bifurcation and Chaos, vol. 17, no.: 7, Jul. 2007, pp. 2465-2475. [9] Hines P., Blumsack S, A centrality measure for electrical networks, Proc. of HICSS08. the 41st Hawaii International Conference on System Sciences, 2008, doi: 10.1109/HICSS.2008.5. [10] P. Holme, B. J. Kim, C. N. Yoon and S. K. Han, Attack vulnerability of complex networks, Physical Review E, vol. 65, no.: 5, May. 2002, 056109, doi: 10.1103/PhysRevE.65.056109. [11] Luca Dall'Asta, Alain Barrat, Marc Barthlemy and Alessandro Vespignani, Vulnerability of weighted networks, Journal of Statistical MechanicsTheory And Experiment, Apr. 2006, 04006, doi: 10.1088/1742-5468/2006/P04006. [12] L. C. Freeman, Set of measures of centrality based on betweenness, Sociometry, vol. 40, no.: 1, 1977, pp. 35-41. [13] https://www.ee.washington.edu/research/pstca
6. References
54