Skip to main content
Log in

Identification of Key Nodes Considering Different Roles of Power Businesses in Power Communication System and Power System

  • Original Article
  • Published:
Journal of Electrical Engineering & Technology Aims and scope Submit manuscript

Abstract

In the power communication network, the importance of the power businesses are the key to evaluate the key nodes of the power communication system. As a special network of power system, when determining the importance of power businesses, the different roles of power businesses in power communication system and power system should be considered. Based on analytic hierarchy process (AHP), entropy weight method and weight degradation method, this paper presents a method to identify the key nodes of power communication network. Firstly, the roles of power businesses in power communication network and power system are analyzed, and a multi-level evaluation model is set up. The evaluation indexes are quantified in the form of quantitative assignment, and the importance of power businesses are evaluated based on improved AHP and entropy weight method. Secondly, on the premise of getting the importance of power businesses, combining with the topology of power communication network to improve the weight degradation method to identify the key nodes of power communication system. Finally, the power communication backbone network of Qingdao and Jinan in China are taken as the simulation objects to verify the correctness of the method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Strasser T, Andrén F, Kathan J, Cecati C, Buccella C, Siano P, Leitão P, Zhabelova G, Vyatkin V, Vrba P, Mařík V (2015) A review of architectures and concepts for intelligence in future electric energy systems. IEEE Trans Industr Electron 62(4):2424–2438

    Article  Google Scholar 

  2. Xie Z, Manimaran G, Vittal V, Phadke AG, Centeno V (2002) An information architecture for future power systems and its reliability analysis. IEEE Trans Power Syst 17(3):857–863

    Google Scholar 

  3. Manickam A, Kamalasadan S, Edwards D, Simmons S (2014) A novel self-evolving intelligent multiagent framework for power system control and protection. IEEE Syst J 8(4):1086–1095

    Article  Google Scholar 

  4. Lin H, Veda S, Shukla S, Mili L, Thorp J (2012) GECO: global event-driven co-simulation framework for interconnected power system and communication network. IEEE Trans Smart Grid 3(3):1444–1456

    Article  Google Scholar 

  5. Dong X, Wang D, Zhao M, Wang B, Shi S, Apostolov A (2016) Smart power substation development in china. CSEE J Power Energy Syst 2(4):1–5

    Article  Google Scholar 

  6. Sodhi R, Sharieff MI (2015) Phasor measurement unit placement framework for enhanced wide-area situationalawareness. IET Gener Transm Distrib 9(2):172–182

    Article  Google Scholar 

  7. Dichen L, Xingpei J, Bo W, Fei T (2015) Topological vulnerability analysis and countermeasures of electrical communication network based on complex network theory. Power Syst Technol 39(12):3615–3621

    Google Scholar 

  8. Dichen L, Xingpei J, Guo C, Bo W, Daqian W (2016) Link addition strategy based on complex network theory for power communication network. Autom Electr Power Syst 36(10):121–126

    Google Scholar 

  9. Wang Q, Pipattanasomporn M, Kuzlu M, Tang Yi, Li Yang, Rahman Saifur (2016) Framework for vulnerability assessment of communication systems for electric power grids. IET Gener Transm Distrib 10(2):477–486

    Article  Google Scholar 

  10. Zhou X, Han X, Wu Y, Ju R, Tang Y, Ni M (2014) Vulnerability assessment of the electric power and communication composite system. In: 2014 China international conference on electricity distribution (CICED). IEEE, Shenzhen, China, pp 369–372

    Chapter  Google Scholar 

  11. Runze W, Baojian Z, Liangrui T (2015) A cascading failure based nodal importance evaluation method applied in dual network coupling model. Power Syst Technol 39(4):1053–1058

    Google Scholar 

  12. Saaty TL (1980) The analytic hierarchy process. Mc Graw-Hill, New York

    MATH  Google Scholar 

  13. Cai L, Thornhill NF, Pal BC (2017) Multivariate detection of power system disturbances based on fourth order moment and singular value decomposition. IEEE Trans Power Syst 32(6):4289–4297

    Article  Google Scholar 

  14. Shengwei L, Yi G, Lihu J, Fujian C, Leijiao G (2017) Subjective and objective evaluation method of cloud computing in power system under the background of energy internet. In: 2017 IEEE conference on energy internet and energy system integration (EI2). IEEE, Beijing, China, pp 1–6

    Google Scholar 

  15. Lai Z, Shen Y, Zhang G (2016) A security risk assessment method of website based on threat analysis combined withahp and entropy weight. In: 2016 7th IEEE international conference on software engineering and service science (ICSESS). IEEE, Beijing, China, pp 481–484

    Google Scholar 

  16. Shize Guo, Zheming Lu (2012) The basic theory of complex network. Science Press, Beijing

    Google Scholar 

  17. Yingyi Huang, Chun Jin, Lili Rong (2014) Evaluation method on node importance in network based on triangle module operator. ICIC Express Lett Part B 5(5):1341–1346

    Google Scholar 

  18. Weilin D (2018) An improved node algorithm based on the evaluation of weighted network node importance. J Algorithms Computational Technol 12(1):62–68

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This study was financially supported by “the Fundamental Research Funds for the Central Universities (16CX06052A)”, “the State Grid Science and Technology Planning Project (SGZJ0000KXJS1800332)” and “A Project of Shandong Province Higher Educational Science and Technology Program (J18KA387)”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kang Zhongjian.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Changchao, L., Zhongjian, K., Hongguo, Y. et al. Identification of Key Nodes Considering Different Roles of Power Businesses in Power Communication System and Power System. J. Electr. Eng. Technol. 14, 1407–1419 (2019). https://doi.org/10.1007/s42835-018-00082-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42835-018-00082-w

Keywords

Navigation