Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering

In smart grid systems, vulnerable lines may lead to cascading failures which can cause large-scale blackouts. Successfully detecting vulnerable lines can increase the stability of the smart grid systems and reduce the risk of cascading failures. By modeling a smart grid system into a directed graph,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal Jg. 6; H. 3; S. 5163 - 5171
Hauptverfasser: Gao, Qinghe, Wang, Yawei, Cheng, Xiuzhen, Yu, Jiguo, Chen, Xi, Jing, Tao
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Piscataway IEEE 01.06.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Schlagworte:
ISSN:2327-4662, 2327-4662
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract In smart grid systems, vulnerable lines may lead to cascading failures which can cause large-scale blackouts. Successfully detecting vulnerable lines can increase the stability of the smart grid systems and reduce the risk of cascading failures. By modeling a smart grid system into a directed graph, we investigate the problem of vulnerable line identification from a clustering perspective. By jointly considering the topological parameters and the electrical properties, we propose an affinity propagation-based bus clustering algorithm to classify buses into clusters, where the center of each cluster represents the most influential bus in each partition. According to the clustering results, we design a vulnerable line identification scheme, which captures different types of potential critical lines in the smart grid system. Experiments over the IEEE-39 bus system demonstrate the effectiveness and correctness of our proposed algorithm.
AbstractList In smart grid systems, vulnerable lines may lead to cascading failures which can cause large-scale blackouts. Successfully detecting vulnerable lines can increase the stability of the smart grid systems and reduce the risk of cascading failures. By modeling a smart grid system into a directed graph, we investigate the problem of vulnerable line identification from a clustering perspective. By jointly considering the topological parameters and the electrical properties, we propose an affinity propagation-based bus clustering algorithm to classify buses into clusters, where the center of each cluster represents the most influential bus in each partition. According to the clustering results, we design a vulnerable line identification scheme, which captures different types of potential critical lines in the smart grid system. Experiments over the IEEE-39 bus system demonstrate the effectiveness and correctness of our proposed algorithm.
Author Chen, Xi
Jing, Tao
Wang, Yawei
Gao, Qinghe
Yu, Jiguo
Cheng, Xiuzhen
Author_xml – sequence: 1
  givenname: Qinghe
  surname: Gao
  fullname: Gao, Qinghe
  organization: Department of Computer Science, George Washington University, Washington, DC, USA
– sequence: 2
  givenname: Yawei
  orcidid: 0000-0002-9480-1145
  surname: Wang
  fullname: Wang, Yawei
  organization: Department of Computer Science, George Washington University, Washington, DC, USA
– sequence: 3
  givenname: Xiuzhen
  orcidid: 0000-0001-5912-4647
  surname: Cheng
  fullname: Cheng, Xiuzhen
  organization: Department of Computer Science, George Washington University, Washington, DC, USA
– sequence: 4
  givenname: Jiguo
  orcidid: 0000-0001-6451-1158
  surname: Yu
  fullname: Yu, Jiguo
  email: jiguoyu@sina.com
  organization: School of Computer Science and Technology, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China
– sequence: 5
  givenname: Xi
  surname: Chen
  fullname: Chen, Xi
  organization: Development and Planning Department, GEIRI North America, San Jose, CA, USA
– sequence: 6
  givenname: Tao
  surname: Jing
  fullname: Jing, Tao
  organization: School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China
BookMark eNp9kEFLwzAUx4NMcM59APES8NyZpGmbHOfQORlM2PRa0vZlZHTpTNLDvr2dHSIePL13-P_-j_e7RgPbWEDolpIJpUQ-vC5WmwkjVE6YkBmP-QUasphlEU9TNvi1X6Gx9ztCSIclVKZDpBYV2GC0KVUwjcWNxh9tbcGpoga8NBY8Nhav98oFPHemwuujD7D3-FF5qHCHTLU21oQjfnPNQW37nlnddjFn7PYGXWpVexif5wi9Pz9tZi_RcjVfzKbLqGQyDhFwLRXLMqmgKgUlHApaJUxyrlkhRJFyARqUIIyJlGeV5KRUNMlkVhRcVjIeofu-9-CazxZ8yHdN62x3MmeMd1ISLpIuRftU6RrvHej84Ez33DGnJD_JzE8y85PM_CyzY7I_TGnC95vBKVP_S971pAGAn0sijWNJePwFUAmDzQ
CODEN IITJAU
CitedBy_id crossref_primary_10_1016_j_ijepes_2025_110929
crossref_primary_10_1109_ACCESS_2024_3372660
crossref_primary_10_1109_ACCESS_2023_3327640
crossref_primary_10_1016_j_apenergy_2020_115237
crossref_primary_10_3390_en18133431
crossref_primary_10_1109_TSG_2022_3147421
crossref_primary_10_3390_su13168957
crossref_primary_10_1109_JIOT_2021_3131171
crossref_primary_10_1109_ACCESS_2023_3243806
crossref_primary_10_1016_j_conengprac_2021_104789
crossref_primary_10_1108_DTA_11_2020_0291
crossref_primary_10_1155_2021_9919541
crossref_primary_10_1016_j_rineng_2025_107148
crossref_primary_10_1109_TPWRD_2021_3061358
crossref_primary_10_1109_JIOT_2022_3160864
crossref_primary_10_32604_cmc_2023_042222
crossref_primary_10_1016_j_ijepes_2021_107592
crossref_primary_10_1016_j_egyr_2022_06_016
crossref_primary_10_1109_TII_2020_2977980
crossref_primary_10_3390_en17163918
crossref_primary_10_1016_j_ijepes_2020_106362
crossref_primary_10_1109_JIOT_2021_3074503
Cites_doi 10.1109/TCSII.2018.2869941
10.1109/TPWRS.2010.2051168
10.1109/SURV.2012.010912.00035
10.1126/science.1136800
10.1109/TPWRS.2011.2177868
10.1109/TIFS.2013.2249065
10.1109/PSCE.2009.4840032
10.1109/TPWRS.2009.2021225
10.1109/TPDS.2013.92
10.1063/1.2737822
10.1109/TIFS.2017.2686367
10.1109/JIOT.2017.2683200
10.1109/JIOT.2014.2312291
10.1109/APPEEC.2015.7380975
10.3390/app5030622
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/JIOT.2019.2897434
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 5171
ExternalDocumentID 10_1109_JIOT_2019_2897434
8633904
Genre orig-research
GrantInformation_xml – fundername: National Science Foundation
  grantid: IIS-1741279
  funderid: 10.13039/100000001
– fundername: National Natural Science Foundation of China
  grantid: 61771289; 61672321; 61832012; 61373027; 61572070
  funderid: 10.13039/501100001809
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
RIG
ID FETCH-LOGICAL-c293t-e4f9a2779aedc8104eb1d52944f2b88b648efea80228647d940ca15797bb49d93
IEDL.DBID RIE
ISICitedReferencesCount 34
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000472596200101&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2327-4662
IngestDate Sun Jun 29 12:23:39 EDT 2025
Tue Nov 18 21:36:33 EST 2025
Sat Nov 29 06:16:46 EST 2025
Wed Aug 27 05:56:11 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-e4f9a2779aedc8104eb1d52944f2b88b648efea80228647d940ca15797bb49d93
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-5912-4647
0000-0002-9480-1145
0000-0001-6451-1158
PQID 2244345485
PQPubID 2040421
PageCount 9
ParticipantIDs ieee_primary_8633904
proquest_journals_2244345485
crossref_primary_10_1109_JIOT_2019_2897434
crossref_citationtrail_10_1109_JIOT_2019_2897434
PublicationCentury 2000
PublicationDate 2019-06-01
PublicationDateYYYYMMDD 2019-06-01
PublicationDate_xml – month: 06
  year: 2019
  text: 2019-06-01
  day: 01
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref12
ref14
wang (ref16) 2014; 42
yu (ref8) 2009
ref2
ref1
ref17
jia (ref19) 2017; 43
ma (ref20) 2017; 37
bakshi (ref10) 2012
ref23
ref22
ref21
zhang (ref25) 2012
wang (ref18) 2014; 38
chen (ref13) 2007
ref28
lu (ref27) 2008
he (ref26) 2017; 45
ref7
frey (ref24) 2007; 315
ref4
ref3
mccalley (ref11) 2003
ref6
ref5
bacher (ref9) 2003
panigrahi (ref15) 2013
References_xml – ident: ref12
  doi: 10.1109/TCSII.2018.2869941
– ident: ref28
  doi: 10.1109/TPWRS.2010.2051168
– volume: 42
  start-page: 1
  year: 2014
  ident: ref16
  article-title: Vulnerable line identification of complex power grid based on electrical betweenness
  publication-title: Power Syst Protect Control
– start-page: 1
  year: 2003
  ident: ref11
  article-title: Operational defense of power system cascading sequences: Probability, prediction and mitigation
  publication-title: Proc Power Syst Eng Res Center (PSerc) Seminars
– ident: ref3
  doi: 10.1109/SURV.2012.010912.00035
– volume: 315
  start-page: 972
  year: 2007
  ident: ref24
  article-title: Clustering by passing messages between data points
  publication-title: Science
  doi: 10.1126/science.1136800
– start-page: 1
  year: 2008
  ident: ref27
  article-title: Constrained spectral clustering through affinity propagation
  publication-title: Proc IEEE Conf Comput Vis Pattern Recognit
– start-page: 495
  year: 2012
  ident: ref25
  article-title: Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective
  publication-title: Proc IEEE InfoCom
– ident: ref21
  doi: 10.1109/TPWRS.2011.2177868
– ident: ref7
  doi: 10.1109/TIFS.2013.2249065
– year: 2012
  ident: ref10
  article-title: Report of the enquiry committee on grid disturbance in Northern region on 30th July 2012 and in Northern, Eastern & North-Eastern region on 31st July 2012
– volume: 38
  start-page: 1907
  year: 2014
  ident: ref18
  article-title: Power betweenness based identification of power grid critical links
  publication-title: Power Syst Technol
– start-page: 1
  year: 2007
  ident: ref13
  article-title: Identification of vulnerable lines in power grid based on complex network theory
  publication-title: Proc IEEE Power Eng Soc Gen Meeting
– ident: ref22
  doi: 10.1109/PSCE.2009.4840032
– ident: ref23
  doi: 10.1109/TPWRS.2009.2021225
– volume: 43
  start-page: 307
  year: 2017
  ident: ref19
  article-title: Identification of critical line in power systems based on absolute power flow betweenness and distribution factor correlation
  publication-title: High Voltage Eng
– ident: ref4
  doi: 10.1109/TPDS.2013.92
– ident: ref6
  doi: 10.1063/1.2737822
– volume: 37
  start-page: 36
  year: 2017
  ident: ref20
  article-title: Rapid identification of vulnerable lines in power grid using modified PageRank algorithm part II: Factors affecting identification results
  publication-title: Proc CSEE
– ident: ref5
  doi: 10.1109/TIFS.2017.2686367
– ident: ref2
  doi: 10.1109/JIOT.2017.2683200
– year: 2003
  ident: ref9
  article-title: Report on the blackout in Italy on 28 September 2003
– ident: ref1
  doi: 10.1109/JIOT.2014.2312291
– year: 2009
  ident: ref8
  article-title: Does liberalisation cause more electricity blackouts? Evidence from a global study of newspaper reports
– ident: ref17
  doi: 10.1109/APPEEC.2015.7380975
– volume: 45
  start-page: 97
  year: 2017
  ident: ref26
  article-title: Fast search of the key transmission sections based on clustering algorithms
  publication-title: Power Syst Protect Control
– year: 2013
  ident: ref15
  article-title: Topological analysis of power grid to identify vulnerable transmission lines and nodes
– ident: ref14
  doi: 10.3390/app5030622
SSID ssj0001105196
Score 2.3359435
Snippet In smart grid systems, vulnerable lines may lead to cascading failures which can cause large-scale blackouts. Successfully detecting vulnerable lines can...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 5163
SubjectTerms Affinity
Affinity propagation (AP)
Algorithms
cascading failure
Clustering
Clustering algorithms
Complex networks
Electrical properties
factor graph
Failure analysis
Graph theory
Internet of Things
machine learning
max-sum algorithm
Parameter identification
Partitioning algorithms
Power system faults
Power system protection
Propagation
Smart grid
Smart grids
Title Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering
URI https://ieeexplore.ieee.org/document/8633904
https://www.proquest.com/docview/2244345485
Volume 6
WOSCitedRecordID wos000472596200101&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 2327-4662
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001105196
  issn: 2327-4662
  databaseCode: RIE
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFH6oePBiXbFaJQdP4uh0mslyVHGlVMEFb0NWKdRWugj-e19m0ooogrc55IUwX17e-5K3AOwrSrVGxzjhKtUJtU4nosVkkpucOSVty5T5FU9t3umI52d5NweHs1wY51wZfOaOwmf5lm8HZhKuyo4FayFFp_MwzzmrcrW-7lOawRlh8eGymcrjm-vbhxC7JY-QVKChpN9MT9lL5ccBXFqVi9r_1rMCy9F7JCcV3Ksw5_prUJt2ZiBRUddBVfm3Pl7IkYEnT5NeKDCte460Q6g76fbJ_StuHHI57FoSK5eTU7RqlqDIifddVPcPcjdEXv1SzXPWm4TCCmjuNuDx4vzh7CqJzRQSgxZ9nDjqpco4l8pZI5CE4SFt80xS6jMthGZUOO9UyLwVjHIraWpUM-eSa02lla1NWOgP-m4LCB4SiDxTmnpOPXLcjCkmqFLeozNpsjqk0_9cmFhpPDS86BUl40hlEaApAjRFhKYOBzORt6rMxl-D1wMWs4ERhjo0pmAWURFHBXooKIG0LN_-XWoHlsLcVfRXAxbGw4nbhUXzPu6OhnvlHvsEF-DQ7g
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTxsxEB4BRYILtAVEKLQ-9IS6sNnMeu0jRVBo04BEirit_ESRQoLyQOLfM951UiEQErc9eLyr_Tye-ex5AHxXiFqTY5wUKtUJWqcT0eIyyU3OnZK2Zar8iut20emImxt5uQA_5rkwzrkq-MwdhMfqLt8OzTQclR0K3iKKjovwIUfM0jpb6_-JSjO4IzxeXTZTefj7_KIborfkAdEKMpX4zPhU3VRebMGVXTldf98XfYS16D-yoxrwT7DgBp9hfdabgUVV3QBVZ-D6eCTHhp5dT_uhxLTuO9YOwe6sN2BXd7R02K9Rz7JYu5z9JLtmGYkced8jhX9klyNi1rf1PMf9aSitQAZvE_6dnnSPz5LYTiExZNMniUMvVVYUUjlrBNEw2qZtnklEn2khNEfhvFMh91ZwLKzE1KhmXshCa5RWtrZgaTAcuG1gtE0Q9lxp9AV6YrkZV1ygUt6TO2myBqSz_1yaWGs8tLzolxXnSGUZoCkDNGWEpgH7c5H7utDGW4M3AhbzgRGGBuzOwCyjKo5L8lFIgohZvvO61DdYOev-bZft886fL7Aa3lPHgu3C0mQ0dXuwbB4mvfHoa7XengAcUdQ1
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Identification+of+Vulnerable+Lines+in+Smart+Grid+Systems+Based+on+Affinity+Propagation+Clustering&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Gao%2C+Qinghe&rft.au=Wang%2C+Yawei&rft.au=Cheng%2C+Xiuzhen&rft.au=Yu%2C+Jiguo&rft.date=2019-06-01&rft.issn=2327-4662&rft.eissn=2327-4662&rft.volume=6&rft.issue=3&rft.spage=5163&rft.epage=5171&rft_id=info:doi/10.1109%2FJIOT.2019.2897434&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JIOT_2019_2897434
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon