Mid-term vulnerability analysis of power systems under intentional attacks

This study addresses the vulnerability analysis of power systems over a time horizon. The authors introduce a model which could be used by system operators to assess where and when, over a specific time horizon, their power systems are most vulnerable to intentional attacks. This new time-phased vul...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IET generation, transmission & distribution Ročník 10; číslo 15; s. 3745 - 3755
Hlavní autoři: Sayyadipour, Saeed, Yousefi, Gholam Reza, Latify, Mohammad Amin
Médium: Journal Article
Jazyk:angličtina
Vydáno: The Institution of Engineering and Technology 17.11.2016
Témata:
ISSN:1751-8687, 1751-8695
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:This study addresses the vulnerability analysis of power systems over a time horizon. The authors introduce a model which could be used by system operators to assess where and when, over a specific time horizon, their power systems are most vulnerable to intentional attacks. This new time-phased vulnerability analysis is modelled as a bilevel programming problem in which in the upper level, an attacker determines the best attack plan, including the best locations and the best times over the time horizon, for launching attacks. In the lower level, the system operator minimises the system operation and load shedding costs. Using duality theory, the bilevel optimisation problem is converted into a mathematical programming with equilibrium constraints which is subsequently converted to a single-level mixed integer linear programming problem by means of linearisation techniques. This model is tested on modified Garver 6-bus test system, modified IEEE 24-bus reliability test system, and IEEE 300-bus test system. The results appreciate the capability of the proposed model and show that it is indispensable to consider the time in analysing the vulnerability of power systems.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1751-8687
1751-8695
DOI:10.1049/iet-gtd.2016.0052