Skip to main content

Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks

  • Conference paper
  • First Online:
Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2019)

Abstract

Power Grid as a kind of complex network is particularly important for every country, even brings huge losses if the power grid suffered from natural or even artificial attacks. Therefore, how to investigate the vulnerable edges of the power grid with under attacks has become an important proposition. In this paper, taking the US power grid as an example, by deliberately deleting some percent of edges according to different strategies which represents different attacks apparently, we calculate the collapse degree of the attacked network by three metrics (The largest connected component G, efficiency E, and average distance L). We found that, under intentional attack on the edges with higher betweenness centrality and the ones with larger multiplication of node betweenness centrality, the US power grid is inferior in invulnerability. The methods used in this paper could be used to identify the vulnerable edges of complex networks, especially for the key infrastructures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arianos, S., Bompard, E., Carbone, A., et al.: Power grids vulnerability: a complex network approach. Chaos 19(1), 175 (2009)

    Article  Google Scholar 

  2. Koç, Y., Warnier, M., Van Mieghem, P., et al.: The impact of the topology on cascading failures in electric power grids. Comput. Sci. (2013)

    Google Scholar 

  3. Kadloor, S., Santhi, N.: Understanding cascading failures in power grids. Comput. Sci. 28(5), 24–30 (2012)

    Google Scholar 

  4. Wang, X., Koc, Y., Robert, E., et al: A network approach for power grid robustness against cascading failures. In: 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM). IEEE (2015)

    Google Scholar 

  5. Simonsen, I., Buzna, L., Peters, K., et al.: Transient dynamics increasing network vulnerability to cascading failures. Phys. Rev. Lett. 100(21), 218701 (2008)

    Article  Google Scholar 

  6. Buldyrev, S.V., Parshani, R., Paul, G., et al.: Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010)

    Google Scholar 

  7. Schaub, M.T., Lehmann, J., Yaliraki, S.N., et al.: Structure of complex networks: quantifying edge-to-edge relations by failure-induced flow redistribution. Netw. Sci. 2(01), 66–89 (2014)

    Google Scholar 

  8. Yong, Y., Yu, F.: Case study on survivability of urban rail transit network. Logistics Technol. 37(12), 58–62 (2018)

    Google Scholar 

  9. Sun, Y., Yang, D., Meng, L., et al.: Universal framework for vulnerability assessment of power grid based on complex networks. In: The 30th Chinese Control and Decision Conference (2018)

    Google Scholar 

  10. Runze, W., Wanxu, W., Li, L., Bing, F., Liangrui, T.: Topology diagnosis of power communication network based on node influence. Power Syst. Prot. Control 47(10), 147–155 (2019)

    Google Scholar 

  11. Riondato, M., Kornaropoulos, E.M.: Fast approximation of betweenness centrality through sampling. Data Min. Knowl. Discov. 30(2), 438–475 (2016). (S1384-5810)

    Google Scholar 

  12. Segarra, S., Ribeiro, A.: Stability and continuity of centrality measures in weighted graphs. IEEE Trans. Sig. Process. 64(3), 543–555 (2016)

    Article  MathSciNet  Google Scholar 

  13. Yun, L.: Node importance rank by attribute reduction set evaluation and application. Shandong Normal University (2018)

    Google Scholar 

  14. Li, S., Wu, X., Zhu, C., Li, A., Li, L., Jia, Y.: Vulnerability of complex networks under multiple node-based attacks. In: IET International Conference on Information & Communications Technologies (2013)

    Google Scholar 

  15. Ruan, Y., Lao, S.-Y., Wang, J., Bai, L., Chen, L.-D.: Node importance measurement based on neighborhood similarity in complex network. Acta Phys. Sin. 66(03), 371–379 (2017)

    Google Scholar 

  16. Li, C., Wei, L., Lu, T., Gao, W.: Invulnerability simulation analysis of compound traffic network in urban agglomeration. J. Syst. Simul. 30(02), 489–496 (2018)

    Google Scholar 

  17. Sun, K., Han, Z.X., Cao, Y.J.: Review on models of cascading failures in complex power grid. Power Syst. Technol. 13, 1–9 (2005)

    Google Scholar 

  18. Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440 (1998)

    Google Scholar 

  19. Yuejin, T., Xin, L., Jun, W., Hongzhong, D.: Main scientific problems for the invulnerability research of complex networks. In: The 15th Chinese Congress of Systems Science and Systems Engineering Proceeding. Systems Engineering Society of China (2008)

    Google Scholar 

  20. Verma, T., Ellens, W., Kooij, R.E.: Context-independent centrality measures underestimate the vulnerability of power grids. Int. J. Crit. Infrastruct. 11(1), 62 (2013)

    Google Scholar 

  21. Tian, Z., et al.: Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Ind. Inform. 15(7), 4285–4294 (2019)

    Google Scholar 

  22. Tian, Z., Su, S., Shi, W., Du, X., Guizani, M., Yu, X.: A data-driven method for future internet route decision modeling. Future Gener. Comput. Syst. 95, 212–220 (2019)

    Google Scholar 

  23. Li, S., Li, L., Yang, Y., Luo, Q.: Revealing the process of edge-based-attack cascading failures. Nonlinear Dyn. 69(3), 837–845 (2012)

    Article  MathSciNet  Google Scholar 

  24. Li, S., Li, L., Jia, Y., Liu, X., Yang, Y.: Identifying vulnerable nodes of complex networks in cascading failures induced by node-based attacks. Math. Probl. Eng. 2013, 938 (2013)

    Google Scholar 

  25. Zhao, D., Li, L., Peng, H., Luo, Q., Yang, Y.: Multiple routes transmitted epidemics on multiplex networks. Phys. Lett. A 378, 770–776 (2014)

    Google Scholar 

Download references

Acknowledgement

This research was funded by NSFC (No. 61672020, U1803263, U1636215), (No.18-163-15-ZD-002-003-01), National Key Research and Development Program of China (No. 2019QY1406), Key R&D Program of Guangdong Province(No. 2019B010136003, 2019B010137004), A Project of Shandong Province Higher Educational Science and Technology Program (No. J16LN61), and the National Key research and Development Plan (No. 2018YFB1800701, No. 2018YFB0803504, and No. 2018YEB1004003).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shudong Li or Weihong Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Li, S., Chen, Y., He, P., Wu, X., Han, W. (2019). Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks. In: Wang, G., Bhuiyan, M.Z.A., De Capitani di Vimercati, S., Ren, Y. (eds) Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123. Springer, Singapore. https://doi.org/10.1007/978-981-15-1304-6_37

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1304-6_37

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1303-9

  • Online ISBN: 978-981-15-1304-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics