{"title":"电力系统脆弱性分析——面向中心措施的验证","authors":"Timothy Ernster, A. Srivastava","doi":"10.1109/TDC.2012.6281483","DOIUrl":null,"url":null,"abstract":"Threat assessments play a key role in determining appropriate mitigation strategies to counter credible threats to the power system. In order to further understand the capability of a malicious agent to coordinate an attack on the power grid given limited system information, graph theory based centrality measures are utilized for power systems vulnerability analysis. Results are compared to vulnerability analysis indices utilizing DC power flow based linear sensitivity factors with complete power system information. Correlations of centrality and linear sensitivity factor based vulnerability rankings are performed, and matched pair comparisons of top rankings are presented using the nonparametric Wilcoxon signed rank statistical test. Evidence is presented in support of the edge betweeness centrality measure in determining sensitive line outages based solely on the branch impedance values of a power system. Results obtained for four different test case systems indicate the threat potential of a system attack planned from limited topology information.","PeriodicalId":19873,"journal":{"name":"PES T&D 2012","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":"{\"title\":\"Power system vulnerability analysis - towards validation of centrality measures\",\"authors\":\"Timothy Ernster, A. Srivastava\",\"doi\":\"10.1109/TDC.2012.6281483\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Threat assessments play a key role in determining appropriate mitigation strategies to counter credible threats to the power system. In order to further understand the capability of a malicious agent to coordinate an attack on the power grid given limited system information, graph theory based centrality measures are utilized for power systems vulnerability analysis. Results are compared to vulnerability analysis indices utilizing DC power flow based linear sensitivity factors with complete power system information. Correlations of centrality and linear sensitivity factor based vulnerability rankings are performed, and matched pair comparisons of top rankings are presented using the nonparametric Wilcoxon signed rank statistical test. Evidence is presented in support of the edge betweeness centrality measure in determining sensitive line outages based solely on the branch impedance values of a power system. Results obtained for four different test case systems indicate the threat potential of a system attack planned from limited topology information.\",\"PeriodicalId\":19873,\"journal\":{\"name\":\"PES T&D 2012\",\"volume\":\"20 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"30\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PES T&D 2012\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TDC.2012.6281483\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PES T&D 2012","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TDC.2012.6281483","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Power system vulnerability analysis - towards validation of centrality measures
Threat assessments play a key role in determining appropriate mitigation strategies to counter credible threats to the power system. In order to further understand the capability of a malicious agent to coordinate an attack on the power grid given limited system information, graph theory based centrality measures are utilized for power systems vulnerability analysis. Results are compared to vulnerability analysis indices utilizing DC power flow based linear sensitivity factors with complete power system information. Correlations of centrality and linear sensitivity factor based vulnerability rankings are performed, and matched pair comparisons of top rankings are presented using the nonparametric Wilcoxon signed rank statistical test. Evidence is presented in support of the edge betweeness centrality measure in determining sensitive line outages based solely on the branch impedance values of a power system. Results obtained for four different test case systems indicate the threat potential of a system attack planned from limited topology information.