Vicki M. Bier, Eli Robert Gratz, Naraphorn J

Slides:



Advertisements
Similar presentations
Marzieh Parandehgheibi
Advertisements

METHODOLOGY FOR IDENTIFYING NEAR-OPTIMAL INTERDICTION STRATEGIES FOR A POWER TRANSMISSION SYSTEM Vicki M. Bier, Eli Robert Gratz, Naraphorn J. Haphuriwat,
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Framework for comparing power system reliability criteria Evelyn Heylen Prof. Geert Deconinck Prof. Dirk Van Hertem Durham Risk and Reliability modelling.
CVEN 5838 Aug 28, 2008 Lecture 2 Reservoir Capacity Yield Analysis (how to size a reservoir and measure its performance)
Announcements Be reading Chapter 6, also Chapter 2.4 (Network Equations). HW 5 is 2.38, 6.9, 6.18, 6.30, 6.34, 6.38; do by October 6 but does not need.
1 ELECTRIC POWER GRID INTERDICITION Javier Salmeron and Kevin Wood, Naval Postgraduate School Ross Baldick, University of Texas at Austin Sponsored by.
1 ELECTRIC POWER GRID INTERDICTION Javier Salmeron and Kevin Wood, Naval Postgraduate School Ross Baldick, University of Texas at Austin Sponsored in part.
Yashar Ganjali Computer Systems Laboratory Stanford University February 13, 2003 Optimal Routing in the Internet.
1 Evacuation Planning Algorithms Professor Shashi Shekhar Dept. of Computer Science, University of Minnesota Participants: Q. Lu, S. Kim February 2004.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Introduction To be an effective teacher it is essential to capture and maintain the attention of the student. Toward this end it is very helpful to find.
Systems Engineer An engineer who specializes in the implementation of production systems This material is based upon work supported by the National Science.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
This material is based upon work supported by the U.S. Department of Homeland Security, Science and Technology Directorate, Office of University Programs,
Distributed Control of FACTS Devices Using a Transportation Model Bruce McMillin Computer Science Mariesa Crow Electrical and Computer Engineering University.
MIDDLEWARE SYSTEMS RESEARCH GROUP Denial of Service in Content-based Publish/Subscribe Systems M.A.Sc. Candidate: Alex Wun Thesis Supervisor: Hans-Arno.
Systems Engineering for the Transportation Critical Infrastructure The Development of a Methodology and Mathematical Model for Assessing the Impacts of.
Numerical Methods Part: Simpson Rule For Integration.
Evaluation of Non-Uniqueness in Contaminant Source Characterization based on Sensors with Event Detection Methods Jitendra Kumar 1, E. M. Zechman 1, E.
Highway Risk Mitigation through Systems Engineering.
GENERATION SCHEDULING WITH HYBRID ENERGY RESOURCES IN A DEREGULATED POWER SYSTEM Manas Trivedi Clemson University Electric Power Research Association.
A Node and Load Allocation Algorithm for Resilient CPSs under Energy-Exhaustion Attack Tam Chantem and Ryan M. Gerdes Electrical and Computer Engineering.
PAPER PRESENTATION Real-Time Coordination of Plug-In Electric Vehicle Charging in Smart Grids to Minimize Power Losses and Improve Voltage Profile IEEE.
Numerical Methods Continuous Fourier Series Part: Continuous Fourier Series
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
PMIT-6101 Advanced Database Systems By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
Secure In-Network Aggregation for Wireless Sensor Networks
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Criticality and Risk of Large Cascading Blackouts Ian Dobson PSerc, ECE Dept., University of Wisconsin, Madison, WI Benjamin A. Carreras Oak Ridge National.
Grid Defense Against Malicious Cascading Failure Paulo Shakarian, Hansheng Lei Dept. Electrical Engineering and Computer Science, Network Science Center,
Highway Risk Mitigation through Systems Engineering.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems Prof. Hao Zhu Dept. of Electrical and Computer Engineering University of Illinois at Urbana-Champaign.
Numerical Methods Part: False-Position Method of Solving a Nonlinear Equation
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
Numerical Methods Multidimensional Gradient Methods in Optimization- Example
Is there a promising way?
ELECTRIC POWER GRID INTERDICTION
Discrete ABC Based on Similarity for GCP
ELECTRIC POWER GRID INTERDICITION
Non-additive Security Games
Population lost resource
Prepared by Viren Pandya
Trusted Routing in IoT Dr Ivana Tomić In collaboration with:
Numerical Methods Multi Dimensional Direct Search Methods - Example
Discussion and Conclusion
Björn Felten, Tim Felling, Christoph Weber
Secure Control Systems - A Quantitative Risk Management Approach
Rui Wu, Jose Painumkal, Sergiu M. Dascalu, Frederick C. Harris, Jr
Critical - thinking Assessment Test (CAT)
Title of Poster Site Visit 2017 Introduction Results
A Model of Power Transmission Disturbances in Simple Systems
Yiyu Shi*, Wei Yao*, Jinjun Xiong+ and Lei He*
ECEN 460 Power System Operation and Control
The Impact of Multihop Wireless Channel on TCP Performance
Elliptic Partial Differential Equations – Gauss-Seidel Method
Department of Electrical Engineering
Numerical Methods Newton’s Method for One -Dimensional Optimization - Example
Comparison to existing state of security experimentation
A Dynamic System Analysis of Simultaneous Recurrent Neural Network
复杂网络可控性 研究进展 汪秉宏 2014 北京 网络科学论坛.
Title of Poster Site Visit 2018 Introduction Results
ECEN 460 Power System Operation and Control
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Project Title: I. Research Overview and Outcome
Injection Substations No. of Transformer Units Installed
Presentation transcript:

METHODOLOGY FOR IDENTIFYING NEAR-OPTIMAL INTERDICTION STRATEGIES FOR A POWER TRANSMISSION SYSTEM Vicki M. Bier, Eli Robert Gratz, Naraphorn J. Haphuriwat, and Wairimu Magua Department of Industrial and Systems Engineering University of Wisconsin-Madison Kevin R. Wierzbicki Department of Electrical and Computer Engineering

Objectives The objectives of the project are to: Develop a simple, inexpensive, and practical method for identifying promising interdiction strategies Compare our method and results with those of other proposed approaches for vulnerability assessment Study the effectiveness of protecting transmission lines

System Topology We use the IEEE Reliability Test System – 1996 (RTS-96): Representative of typical systems We base our analysis on decoupled load (DC) flow with optimal dispatch

System Topology (continued) We model the RTS-96 systems as networks consisting of: 24 nodes and 38 arcs for the One Area RTS-96 48 nodes and 79 arcs for the Two Area RTS-96

(after a pre-determined Schematic View of Process Load-Flow Algorithm (Determine optimal DC power dispatch) Max Line Interdiction Algorithm (Interdict the line with maximum flow, and any lines in close geographical proximity) Hardening Algorithm (Make the first n sets of interdicted lines from the Max Line algorithm invulnerable) Terminate (after a pre-determined number of iterations)

Other Approaches The method of Apostolakis and Lemon (2005) applies only to distribution networks (with one-directional flows) Salmeron et al. (2004) use a non-linear nested optimization method that is difficult to solve

Results (One Area RTS-96) Attacked:33% Load shed: 56% Attacked:11% Load shed: 44%

Results (Two Area RTS-96) 45% 44%

Results cont’d… The Max Line interdiction strategy reasonably approximates the load shed by Salmeron et al. The transmission lines interdicted by Salmeron et al. differ from those interdicted by our strategy MaxLine Salmeron 64 30 19&21 78&78 23 41 52 11 74&73 34&35 21 21&19 22 24 27&28 30 38&39 61&59 62 69 72&79 77&78

Results (Random Interdiction)

Hardening We apply the hardening algorithm to simulate an upgrade of the system H0 represents the original interdiction strategy H1, H2, and H3 show the interdiction strategies obtained after three iterations of hardening

Results (One Area RTS-96) Strategy H0 results in a loss of 56% Strategy H3, hardening 39% of all lines, results in a loss of 42%

Results (Two Area RTS-96) Strategy H0 results in a loss of 56% Strategy H3, hardening 39% of all lines, results in a loss of 39%

Observations Our results cast doubt on the claim by Salmeron et al.: “By considering the largest possible disruptions, our proposed plan will be appropriately conservative” Hardening even a significant percentage of lines does not dramatically diminish the load shed by an attack Hardening seems unlikely to be cost effective!

Conclusions We developed a simple, inexpensive, and viable method of identifying promising attack strategies Our results are comparable to those of Salmeron et al. A single run of either method will not be sufficient to identify critical vulnerabilities Hardening of transmission lines is unlikely to be cost effective

Directions for Future Research In future research, this method could be extended to: Address other components of transmission systems, such as transformers Identify strategies that may trigger cascading power failures Take into account the importance of different loads Apply to other types of systems, such as structures, water, and transportation

Acknowledgement This material is based upon work supported in part by: The U.S. Army Research Laboratory and the U.S. Army Research Office under grant number DAAD19-01-1-0502 The National Science Foundation under grant number ECS-0214369 The Department of Homeland Security under grant number EMW-004-GR-0112 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors. The authors would like to thank Prof. Ian Dobson of the University of Wisconsin-Madison for his contributions to this study.