Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks
In recent years, the collapse of power grid in many countries not only has brought great inconvenience to national life, but also caused huge economic losses. Therefore, it is particularly important to analyze the vulnerability of network structure of power grid. In this paper, US power grid with 4941 nodes and 6594 edges is taken as examples. The network is attacked by deleting some percent nodes according to degree, k-shell value, betweenness centrality, and clustering coefficient, apparently. The largest connected component G, efficiency E, and average distance L are analyzed for measuring vulnerability of US power grid. The simulation results show that, in view of the largest connected component G and efficiency E, Betweenness Centrality-based attack is most destructive to the network structure than other attacks, and the attack based on Aggregation coefficient is the least destructive.
KeywordsComplex networks US power grid Vulnerability Largest connected component Robustness
This research was funded by NSFC (No. 61672020, U1803263, U1636215, 61702309), (No. 18-163-15-ZD-002-003-01), National Key Research and Development Program of China (No. 2019QY1406), Key R&D Program of Guangdong Province (No. 2019B010136003, 2019B010137004), Project of Shandong Province Higher Educational Science and Technology Program (No. J16LN61), and the National Key research and Development Plan (No. 2018YFB1800701, No. 2018YFB0803504, and No. 2018YEB1004003).
- 1.Xin, L., Dongmei, J., Guoquan, Y.: The method in researching the vulnerability of the internet and the problems existing in it. Software 1(1) (2012)Google Scholar
- 5.Minghui, X.: The Vulnerability Analysis of Urban Complementary Teansit Network under Spatially Localized Failures, Huazhong University of Science (2018)Google Scholar
- 8.Atanov, I.V., Khorol’Skii, V.Y., Ershov, A.B., et al.: Formalization of the process of directional composition of structures of autonomous power-supply systems during design. Russ. Electr. Eng. 88(8), 475–479 (2017)Google Scholar
- 11.Umberger, A.: Distributed Generation: How Localized Energy Production Reduces Vulnerability to Outages and Environmental Damage in the Wake of Climate Change. Golden Gate U.envtl.l.j (2012)Google Scholar
- 13.Dan, L.: Overview of research on grid vulnerability based on complex network theory. Heilongjiang Sci. Technol. Inf. 36 (2016)Google Scholar
- 14.Lixiong, X., Junyong, L., Yang, L., Zhanxin, Y., Li, Z., Yang, W.: Structural Characteristics Investigation of Electric Power, Transmission Networks (S2) (2014)Google Scholar
- 16.Jing, G., Wang, D.R.: The vulnerability analysis on power communication networks based on complex network theory. Power Syst. Commun. 30(9), 6–10 (2009)Google Scholar
- 17.Li, S., Wu, X., Li, A., Zhou, B., Tian, Z., Zhao, D.: Structural vulnerability of complex networks under multiple edge-based attacks. In: 2018 IEEE 3rd International Conference on Data Science in Cyberspace (IEEE DSC 2018), pp. 405–409 (2018)Google Scholar
- 19.Zhao, D., Li, L., Li, S., Huo, Y., Yang, Y.: Identifying influential spreaders in interconnected networks. Physica Scripta 89(1) (2014). 0031-8949Google Scholar
- 20.Li, S., Li, L., Jia, Y., Liu, X., Yang, Y.: Identifying vulnerable nodes of complex networks in cascading failures induced by node-based attacks. Math. Probl. Eng. (2013). 938398Google Scholar
- 21.Wei, Z., Liu, J., Zhu, G., et al.: A new integrative vulnerability evaluation model to power grid based on running state and structure. Autom. Electr. Power Syst. 33(8), 11–15 (2009)Google Scholar
- 24.Anji, M., Yu, J., Guo, Z.: Electric power grid structural vulnerability assessment. In: Power Engineering Society General Meeting. IEEE (2006)Google Scholar