skip to main content
10.1145/2728606.2728614acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Vulnerability analysis of dynamical power networks to stochastic link failure attacks

Published: 14 April 2015 Publication History

Abstract

In this paper, we present results for the vulnerability analysis of a power network to stochastic link failure attacks. We assume a network links are subjected to attacks where the link-based attack is modeled as stochastic perturbation to link weight. The objective is to determine which links in the network can tolerate the least amount of stochastic perturbation to maintain stochastic stability of a power network. We develop a system theoretical-based, analytical, and computation framework that allows us to rank links in the order of their critical importance to maintain stochastic stability of the network. The computational approach relies on solving a Linear Matrix Inequality (LMI). The developed framework is applied to a structure preserving model of the power network. The structure preserving model allows for the representation of original network topology, thereby identifying critical links connecting generators and load buses. Simulations are performed on IEEE 14 bus system to demonstrate the application of the developed framework.

References

[1]
A. Diwadkar and U. Vaidya. Stabilization of linear time varying systems over uncertain channels. International Journal of Robust and Nonlinear Control, 24(7): 1205--1220, 2014.
[2]
R. Albert, H. Jeong, and A. Barabasi. Error and attack tolerance of complex networks. Nature, 406: 378--382, 2000.
[3]
A. R. Bergen and D. J. Hill. A structure preserving model for power system stability analysis. IEEE Transactions on Power Apparatus and Systems, 1: 25--35, 1981.
[4]
A. Diwadkar, S. Dasgupta, and U. Vaidya. Stochastic positive real lemma and synchronization over uncertain networks. In Proceedings of IEEE Conference on Decision and Control, pages 4560--4565, Los Angeles, LA, 2014.
[5]
A. Diwadkar and U. Vaidya. Limitation on nonlinear observation over erasure channel. IEEE Transactions on Automatic Control, 58(2): 454--459, 2013.
[6]
A. Diwadkar and U. Vaidya. Limitations and tradeoff in synchronization of large-scale stochastic networks. 2014. Under Review for Publication in Scientific Report.
[7]
M. Fardad, A. Diwadkar, and U. Vaidya. Optimal link removal for maximal controllability degradation in dynamic networks. In Proceedings of IEEE Conference on Decision and Control, pages 499--504, Los Angeles, LA, 2014.
[8]
A. A. Fouad and V. Vittal. Power system transient stability analysis using the transient energy function method. Prentice Hall, 1991.
[9]
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla. Smart grid data integrity attacks: characterizations and countermeasures π. In IEEE International Conference on Smart Grid Communications (SmartGridComm), pages 232--237, Brussels, Belgium, 2011.
[10]
M. Grant, S. Boyd, and Y. Ye. CVX: Matlab software for disciplined convex programming, version 2.0 beta. Recent Advances in Learning and Control, pages 95--110, 2012.
[11]
R. Z. Has'minskii. Stability of differential equations. Sijthoff & Noordhoff, Germantown, MD, 1980.
[12]
M. A. Pai, D. P. Sen, and K. R. Padiyar. Small Signal Analysis of Power Systems. Alpha Science International, 2004.
[13]
F. Pasqualetti, F. Dorfler, and F. Bullo. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Proceedings of IEEE Conference on Decision and Control, pages 2195--2201, Orlando, FL, USA, 2011.
[14]
S. Pushpak, A. Diwadkar, M. Fardad, and U. Vaidya. Vulnerability analysis of coordinated attack for dynamical network. In Australian Control Conference, Canberra, ACT, 2014.
[15]
C. M. Schneider, A. A. Moreira, J. S. Andrade, S. Havlin, and H. J. Herrmann. Mitigation of malicious attacks on networks. PNAS, 108(10): 3838--3841, 2011.
[16]
U. Vaidya, R. Banavar, and N. M. Singh. A chaotic phenomena in the damped power swing equation. In Proceedings of IEEE Conference on Decision and Control, pages 4650--4655, Phoenix, Arizona, 1999.
[17]
U. Vaidya and N. Elia. Limitation on nonlinear stabilization over packet-drop channels: Scalar case. Systems and Control Letters, 61(9): 959--966, 2012.
[18]
U. Vaidya and M. Fardad. On optimal sensor placement for mitigation of vulnerabilities to cyber attacks in large-scale networks. In Proceedings of European Control Conference (ECC), pages 3548--3553, Zurich, Switzerland, July 2013.
[19]
J. C. Willems. Dissipative dynamical systems-Part I: General theory. Archive for Rational Mechanics and Analysis, 45: 321--351, 1972.
[20]
J. C. Willems. Dissipative dynamical systems-Part II: Linear systems with quadratic supply rates. Archive for Rational Mechanics and Analysis, 45(5): 352--393, 1972.
[21]
R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas. Matpower: Steady-state operations, planning, and analysis tools for power systems research and education. Power Systems, IEEE Transactions on, 26(1): 12--19, 2011.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HSCC '15: Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control
April 2015
321 pages
ISBN:9781450334334
DOI:10.1145/2728606
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 April 2015

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

HSCC '15
Sponsor:

Acceptance Rates

Overall Acceptance Rate 153 of 373 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 127
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media