Journal
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Volume 9, Issue 12, Pages 2340-2354Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2014.2363786
Keywords
Power grid security; attack strategies; cascading failures
Funding
- National Science Foundation [CNS-1117314, CNS-0643532, ECCS-1053717]
- Army Research Office [W911NF-12-1-0378]
- Direct For Computer & Info Scie & Enginr
- Division Of Computer and Network Systems [1117314] Funding Source: National Science Foundation
- Directorate For Engineering
- Div Of Electrical, Commun & Cyber Sys [1053717] Funding Source: National Science Foundation
Ask authors/readers for more resources
The modern society increasingly relies on electrical service, which also brings risks of catastrophic consequences, e.g., large-scale blackouts. In the current literature, researchers reveal the vulnerability of power grids under the assumption that substations/transmission lines are removed or attacked synchronously. In reality, however, it is highly possible that such removals can be conducted sequentially. Motivated by this idea, we discover a new attack scenario, called the sequential attack, which assumes that substations/transmission lines can be removed sequentially, not synchronously. In particular, we find that the sequential attack can discover many combinations of substation whose failures can cause large blackout size. Previously, these combinations are ignored by the synchronous attack. In addition, we propose a new metric, called the sequential attack graph (SAG), and a practical attack strategy based on SAG. In simulations, we adopt three test benchmarks and five comparison schemes. Referring to simulation results and complexity analysis, we find that the proposed scheme has strong performance and low complexity.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available