Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Dynamic Security Analysis of Power Systems by a Sampling-Based Algorithm

Published: 09 June 2018 Publication History

Abstract

Dynamic security analysis is an important problem of power systems on ensuring safe operation and stable power supply even when certain faults occur. No matter if such faults are caused by vulnerabilities of system components, physical attacks, or cyber-attacks that are more related to cyber-security, they eventually affect the physical stability of a power system. Examples of the loss of physical stability include the Northeast Blackout of 2003 in North America and the 2015 system-wide blackout in Ukraine. The nonlinear hybrid nature, that is, nonlinear continuous dynamics integrated with discrete switching, and the high degree of freedom property of power system dynamics make it challenging to conduct the dynamic security analysis. In this article, we use the hybrid automaton model to describe the dynamics of a power system and mainly deal with the index-1 differential-algebraic equation models regarding the continuous dynamics in different discrete states. The analysis problem is formulated as a reachability problem of the associated hybrid model. A sampling-based algorithm is then proposed by integrating modeling and randomized simulation of the hybrid dynamics to search for a feasible execution connecting an initial state of the post-fault system and a target set in the desired operation mode. The proposed method enables the use of existing power system simulators for the synthesis of discrete switching and control strategies through randomized simulation. The effectiveness and performance of the proposed approach are demonstrated with an application to the dynamic security analysis of the New England 39-bus benchmark power system exhibiting hybrid dynamics. In addition to evaluating the dynamic security, the proposed method searches for a feasible strategy to ensure the dynamic security of the system in the face of disruptions.

References

[1]
Nancy M. Amato and Yan Wu. 1996. A randomized roadmap method for path and manipulation planning. In Proceedings of the 1996 IEEE International Conference on Robotics and Automation. 113--120.
[2]
T. Athay, R. Podmore, and S. Virmani. 1979. A practical method for the direct analysis of transient stability. IEEE Trans. Power App. Syst. PAS-98, 2 (Mar./Apr. 1979), 573--584.
[3]
Alireza Bagheri. 2013. Optimal Location and Signal Selection of UPFC Device for Damping Oscillation. Master’s thesis. Najaf Abad Branch, Islamic Azad University.
[4]
Alberto Bemporad and Manfred Morari. 1999. Control of systems integrating logic dynamics and constraints. Automatica 35, 3 (Mar. 1999), 407--427.
[5]
Amit Bhatia and Emilio Frazzoli. 2004. Incremental search methods for reachability analysis of continuous and hybrid systems. In Proceedings of the 7th International Workshop on Hybrid Systems: Computation and Control (Lecture Notes in Computer Science), Rajeev Alur and George J. Pappas (Eds.), Vol. 2993. Springer Berlin, Berlin, Germany, 142--156.
[6]
Michael S. Branicky, Michael M. Curtiss, Joshua A. Levine, and Stuart B. Morgan. 2003. RRTs for nonlinear, discrete, and hybrid planning and control. In Proceedings of the 42nd IEEE Conference on Decision and Control. 657--663.
[7]
K. E. Brenan, S. L. Campbell, and L. R. Petzold. 1996. Numerical Solution of Initial-Value Problems in Differential-Algebraic Equations. Society for Industrial and Applied Mathematics, Philadelphia.
[8]
Hsiao-Dong Chiang. 2010. Direct Methods For Stability Analysis of Electric Power Systems: Theoretical Foundation, BCU Methodologies, and Applications. Wiley, New York.
[9]
Hsiao-Dong Chiang, Chia-Chi Chu, and Gerry Cauley. 1995. Direct stability analysis of electric power systems using energy functions: Theory, applications, and perspective. P. IEEE 83, 11 (Nov. 1995), 1497--1529.
[10]
Joe H. Chow and Kwok W. Cheung. 1992. A toolbox for power system dynamics and control engineering education and research. IEEE Trans. Power Syst. 7, 4 (Nov. 1992), 1559--1564.
[11]
Xiaodong Chu and Yutian Liu. 2004. Real-time transient stability prediction using incremental learning algorithm. In Proceedings of the 2004 IEEE Power Engineering Society General Meeting (PESGM), Vol. 2. 1565--1569.
[12]
Mehmet Hazar Cintuglu, Osaa A. Mohammed, Kemal Akkaya, and A. Selcuk Uluagac. 2017. A survey on smart grid cyber-physical system testbeds. IEEE Commun. Surveys Tuts. 19, 1 (Feb. 2017), 446--464.
[13]
CPS Steering Group. 2008. Cyber-Physical Systems Executive Summary. Arlington.
[14]
Thao Dang and Tarik Nahhal. 2006. Randomized simulation of hybrid systems for circuit validation. In Proceedings of the Forum on Specification and Design Languages. 9--15.
[15]
Thao Dang and Tarik Nahhal. 2009. Coverage-guided test generation for continuous and hybrid systems. Form Methods Syst. Des. 34 (2009), 183--213.
[16]
Electric Power Research Institute. 2009. Report to NIST on the Smart Grid Interoperability Standards Roadmap (Contract No. SB 1341-090CN-0031).
[17]
P. Mohajerin Esfahani, M. Vrakopoulou, K. Margellos, J. Lygeros, and G. Andersson. 2010. Cyber attack in a two-area power system: Impact identification using reachability. In Proc. American Control Conference. 962--967.
[18]
Lester H. Fink and Kjell Carlsen. 1978. Operating under stress and strain. IEEE Spectrum 15, 3 (Mar. 1978), 48--53.
[19]
A. A. Fouad. 1981. Transient Stability Margin as a Tool for Dynamic Security Assessment. Technical Report #EPRI-EL-1755. Dept. of Electrical Engineering, Iowa State University of Science and Technology.
[20]
George K. Fourlas, Kostas J. Kyriakopoulos, and Costas D. Vournas. 2004. Hybrid systems modeling for power systems. IEEE Circuits Syst. Mag. 4, 3 (Third Quarter 2004), 16--23.
[21]
Andy Greenberg. 2017. How an Entire Nation Became Russia’s Test Lab for Cyberwar. (2017). https://www.wired.com/story/russian-hackers-attack-ukraine/.
[22]
Thomas A. Henzinger. 1996. The theory of hybrid automata. In Proceedings of the 7th Annual IEEE Symposium on Logic in Computer Science. 278--292.
[23]
Takashi Hikihara. 2005. Application of hybrid system theory to power system analysis (I) (in Japanese). In Annual Meeting Record IEE Japan, Vol. 6. 187.
[24]
Ian A. Hiskens and M. A. Pai. 2000. Trajectory sensitivity analysis of hybrid systems. IEEE Trans. Circuits Syst. I, Fundam. Theory 47, 2 (Feb. 2000), 204--220.
[25]
Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security—survey. IEEE Internet Things J. 4, 6 (Dec. 2017), 1802--1831.
[26]
Jr. James J. Kuffner and Steven M. LaValle. 2000. RRT-connect: An efficient approach to single-query path planning. In Proceedings of the IEEE International Conference on Robotics and Automation 2 (2000), 995--1001.
[27]
S. Karaman and E. Frazzoli. 2010. Incremental sampling-based algorithms for optimal motion planning. In Proceedings of the Robotics: Science and Systems. 1--8.
[28]
Lydia E. Kavralu, Petr Svestka, Jean-Claude Latombe, and Mark H. Overmars. 1996. Probabilistic roadmaps for path planning in high-dimensional configuration spaces. IEEE Trans. Robot. Autom. 12, 4 (Aug. 1996), 566--580.
[29]
R. J. Kaye and F. F. Wu. 1982. Dynamic security regions of power systems. IEEE Trans. Circuits Syst. CAS-29, 9 (Mar. 1982), 612--623.
[30]
Prabha Kundur. 1994. Power System Stability and Control. McGraw-Hill.
[31]
Steven M. Lavalle. 1998. Rapidly-exploring Random Trees: A New Tool for Path Planning. Technical Report #98-11. Computer Science Dept., Iowa State University.
[32]
Steven M. Lavalle. 2000. Robot motion planning: A game-theoretic foundation. Algorithmica 26, 3 (Apr. 2000), 430--465.
[33]
Steven M. Lavalle. 2006. Planning Algorithms. Cambridge University Press, Cambridge.
[34]
Steven M. Lavalle and James J. Kuffner, Jr. 1999. Randomized kinodynamic planning. In Proceedings of the 1999 IEEE International Conference on Robotics and Automation. 473--479.
[35]
Steven M. Lavalle and James J. Kuffner, Jr. 2001a. Randomized kinodynamic planning. Int. J. Rob. Res. 20, 5 (2001), 378--400.
[36]
Steven M. Lavalle and James J. Kuffner, Jr. 2001b. Rapidly-exploring random trees: Progress and prospects. In Algorithmic and Computational Robotics: New Directions, B. Donald, K. Lynch, and D. Rus (Eds.). A. K. Peters, Wellesley, MA, 293--308.
[37]
Zhiyi Li, Mohammad Shahidehpour, and Farrokh Aminifar. 2017. Cybersecurity in distributed power systems. P. IEEE 105, 7 (July 2017), 1367--1388.
[38]
Gaoqi Liang, Junhua Zhao, Fengji Luo, Steven R. Weller, and Zhao Yang Dong. 2017. A review on false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8, 4 (July 2017), 1630--1638.
[39]
John Lygeros. 2006. Lecture Notes on Hybrid Systems. ETH Zuich.
[40]
John Lygeros, Karl Henrik Johansson, Slobodan N. Simic, Jun Zhang, and S. Shankar Sastry. 2003. Dynamical properties of hybrid automata. IEEE Trans. Autom. Control 48, 1 (Jan. 2003), 2--17.
[41]
Jan Machowski, Janusz W. Bialek, and James R. Bumby. 1997. Power System Dynamics: Stability and Control. John Wiley 8 Sons.
[42]
Federico Milano. 2005. An open source power system analysis toolbox. IEEE Trans. Power Syst. 20, 3 (Aug. 2005), 1199--1206.
[43]
K. Morison, Lei Wang, and P. Kundur. 2004. Power system security assessment. IEEE Power and Energy Magazine 2, 5 (Sept. 2004), 30--39.
[44]
K. Morison, Lei Wang, and P. Kundur. 2007. Powerless: Northeast blackout of 2003. System Failure Case Study 1, 10 (Dec. 2007), 1--4.
[45]
M. A. Pai. 1989. Energy Function Analysis for Power System Stability. Kluwer Academic, Dordrecht.
[46]
Alejandro Perez, Robert Platt Jr., George Konidaris, Leslie Kaelbling, and Tomas Lozano-Perez. 2012. LQR-RRT: Optimal sampling-based motion planning with automatically derived extension heuristics. In Proceedings of the IEEE International Conference Robotics and Automtion. 2537--2542.
[47]
Erion Plaku, Lydia E. Kavraki, and Moshe Y. Vardi. 2007. Hybrid systems: From verification to falsification. In Proceedings of 19th International Conference on Computer Aided Verification (Lecture Notes in Computer Science), W. Damm and H. Hermanns (Eds.), Vol. 4590. Springer, 463--476.
[48]
Erion Plaku, Lydia E. Kavraki, and Moshe Y. Vardi. 2009. Hybrid systems: From verification to falsification by combining motion planning and discrete search. Form. Methods Syst. Des. 34, 2 (Apr. 2009), 157--182.
[49]
Radha Poovendran. 2010. Cyber-physical systems: Close encounters between two parallel worlds. P. IEEE 98, 8 (Aug. 2010), 1363--1366.
[50]
Kevin Poulsen. 2004. Software Bug Contributed to Blackout. (2004). https://www.securityfocus.com/news/8016.
[51]
M. Ribbens-Pavella, B. Lemal, and W. Pinard. 1977. On-line operation of Liapunov criterion for transient stability studies. IFAC Proceedings Volumes 10, 1 (Feb. 1977), 292--296.
[52]
M. Ribbens-Pavella, P. G. Murthy, J. L. Horward, and J. L. Carpentier. 1982. Transient stability index for online stability assessment and contingency evaluation. Int. J. Electr. Power Energy Syst. 4, 2 (Apr. 1982), 91--99.
[53]
O. Saito, K. Koizumi, M. Udo, M. Sato, H. Mukae, and T. Tsuji. 1975. Security monitoring systems including fast transient stability studies. IEEE Trans. Power App. Syst. PAS-94, 5 (Sept./Oct. 1975), 1789--1805.
[54]
Peter W. Sauer and M. A. Pai. 1998. Power System Dynamics and Stability. Prentice Hall, Upper Saddle River, NJ.
[55]
N. Shenoy and R. Ramakumar. 2016. Power systems dynamic security assessment using Fisher information metric. In 2016 IEEE Power and Energy Society General Meeting (PESGM). 1--5.
[56]
Ioan A. Şucan, Mark Moll, and Lydia E. Kavraki. 2012. The open motion planning library. IEEE Robotics 8 Automation Magazine 19, 4 (Dec. 2012), 72--82.
[57]
Yoshihiko Susuki and T. John Koo. 2015. An Application of RRT Algorithm to Reliability Assessment of Energy Systems (in Japanese). Technical Report #NLP2014-128. IEICE. 89--94.
[58]
Yoshihiko Susuki, T. John Koo, Hiroaki Ebina, Takuya Yamazaki, Takashi Ochi, Takuji Uemura, and Takashi Hikihara. 2012. A hybrid system approach to the analysis and design of power grid dynamic performance. P. IEEE 100, 1 (Jan. 2012), 225--239.
[59]
Yoshihiko Susuki, Igor Mezić, and Takashi Hikihara. 2011. Coherent swing instability of power grids. J. Nonlinear Sci. 21, 3 (Feb. 2011), 403--439.
[60]
Yoshihiko Susuki, Yu Takatsuji, and Takashi Hikihara. 2009. Hybrid model for cascading outage in a power system: A numerical study. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E92-A, 3 (Mar. 2009), 871--879.
[61]
Claire J. Tomlin, John Lygeros, and S. Shankar Sastry. 2000. A game theoretic approach to controller design for hybrid systems. P. IEEE 88, 7 (July 2000), 949--970.
[62]
U.S.-Canada Power System Outage Task Force. 2003. Interim Report: Causes of the August 14th Blackout in the United States and Canada.
[63]
F. F. Wu and Yu-Kun Tsai. 1983. Probabilistic dynamic security assessment of power systems-I: Basic model. IEEE Trans. Circuits Syst. CAS-30, 3 (Sept. 1983), 148--159.
[64]
Qiang Wu, Yoshihiko Susuki, and T. John Koo. 2016. RRT-based computation for dynamic security analysis of power systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E99-A, 2 (Feb. 2016), 491--501.
[65]
Ji Jie Xu, T. John Koo, and Ze Xiang Li. 2010. Sampling-based finger gaits planning for multifingered robotic hand. Auton. Robot. 28, 4 (May 2010), 385--402.
[66]
Y. Xue, Th. Van Cutsem, and M. Ribbens-Pavella. 1989. Extended equal area criterion justifications, generations, applications. IEEE Trans. Power Syst. 4, 1 (Nov. 1989), 44--52.
[67]
Qingyu Yang, Dou An, Rui Min, Wei Yu, Xinyu Yang, and Wei Zhao. 2017a. On optimal PMU placement-based defense against data integrity attacks in smart grid. IEEE Trans. Inf. Forensics Security 12, 7 (Jul. 2017), 1735--1750.
[68]
Qingyu Yang, Donghe Li, Wei Yu, Yanke Liu, Dou An, Xinyu Yang, and Jie Lin. 2017b. Toward data integrity attacks against optimal power flow in smart grid. IEEE Internet Things J. 4, 3 (Oct. 2017), 1726--1738.
[69]
Qingyu Yang, Jie Yang, Dou An, Nan Zhang, and Wei Zhao. 2014. On false data-injection attacks against power system state estimation: Modeling and countermeasures. IEEE Trans. Parallel Distrib. Syst. 25, 3 (Mar. 2014), 717--729.
[70]
Yumeng Yang. 2013. Hardware Acceleration of Power System Simulation. Master’s thesis. Imperial College London.
[71]
William Young and Nancy G. Leveson. 2014. An integrated approach to safety and security based on systems theory. Comm. ACM 57, 2 (Feb. 2014), 31--35.
[72]
Kim Zetter. 2016. Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. (2016). https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/.

Cited By

View all
  • (2023)Enhancing dynamic security assessment in converter dominated distribution networks through digital twin-based small signal stability analysisat - Automatisierungstechnik10.1515/auto-2023-011971:12(1028-1040)Online publication date: 27-Nov-2023
  • (2023)Split-based sequential sampling for realtime security assessmentInternational Journal of Electrical Power & Energy Systems10.1016/j.ijepes.2022.108790146(108790)Online publication date: Mar-2023
  • (2019)A Security Model of SCADA System Based on Attack Tree2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2)10.1109/EI247390.2019.9062213(2653-2658)Online publication date: Nov-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Cyber-Physical Systems
ACM Transactions on Cyber-Physical Systems  Volume 2, Issue 2
Special Issue on the Internet of Things: Part 1
April 2018
180 pages
ISSN:2378-962X
EISSN:2378-9638
DOI:10.1145/3229080
  • Editor:
  • Tei-Wei Kuo
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 09 June 2018
Accepted: 01 April 2018
Revised: 01 March 2018
Received: 01 July 2016
Published in TCPS Volume 2, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Dynamic security
  2. hybrid automaton
  3. power system
  4. rapidly-exploring random tree (RRT)
  5. reachability

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • National Natural Science Foundation of China (NSFC)
  • Japan Science and Technology Agency (JST) CREST

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)1
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Enhancing dynamic security assessment in converter dominated distribution networks through digital twin-based small signal stability analysisat - Automatisierungstechnik10.1515/auto-2023-011971:12(1028-1040)Online publication date: 27-Nov-2023
  • (2023)Split-based sequential sampling for realtime security assessmentInternational Journal of Electrical Power & Energy Systems10.1016/j.ijepes.2022.108790146(108790)Online publication date: Mar-2023
  • (2019)A Security Model of SCADA System Based on Attack Tree2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2)10.1109/EI247390.2019.9062213(2653-2658)Online publication date: Nov-2019
  • (undefined)Split-Based Sequential Sampling for Realtime Security AssessmentSSRN Electronic Journal10.2139/ssrn.4059939

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media