Security analysis method for power system suffering from terror attack

A technology of power systems and analysis methods, applied in system integration technology, information technology support systems, instruments, etc., can solve problems such as only considering active power, ignoring voltage, reactive power, and simple models

Inactive Publication Date: 2015-11-25
TONGJI UNIV
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Aiming at the two-layer optimization model of the power grid vulnerability analysis problem, the partition concept of power generation rich area and load rich area is proposed, and then by analogy with the problem of network suppression (the so-called network suppression problem refers to attacking the network in the most economical

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security analysis method for power system suffering from terror attack
  • Security analysis method for power system suffering from terror attack
  • Security analysis method for power system suffering from terror attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0198] Such as figure 1 Shown is the optimization flowchart of the terrorist attack problem of the present invention.

[0199] The graph model of IEEE-14 node systemization is as follows figure 2 As shown, it contains 5 generator nodes, 9 load nodes and 20 edges. The computer used in the experiment is configured with CPU2.0GHz, memory 1G, and optimization software Cplex.

[0200] The IEEE-14 node data is shown in Table 1, and the branch data is shown in Table 2. The total system load is 2.59pu, and each quantity is a unit value. The power flow calculation takes node 1 as the balance node, and the voltage amplitude, angle, line Both the transmitted power and the active power injection of node 1 are the results of power flow calculations.

[0201] Table 1 IEEE-14 node data

[0202]

[0203] Table 2 IEEE-14 tributary data

[0204]

[0205]

[0206] Note: Type 0 means AC line, 1 means transformer winding, 2 means grounding branch; for AC line YK means susceptance to...

Embodiment 2

[0214] IEEE-118 calculation example

[0215] IEEE-118 node system wiring such as Figure 5 , where the black dots represent the load nodes, and the white squares represent the generator nodes. The system contains a total of 19 generating units, with a total output power of 4374.9MW, a total load of 4242MW in the network, and a benchmark capacity of 100MVA.

[0216] Similar to the IEEE-14 node, it is also assumed that the attacker’s attack line cost is 1, that is, = 1, and the threshold of the upper limit of the cut set capacity is set to 18, and then iteratively solves the problem by using the invented idea, and finally obtains the system load shedding and cutting off The line results are shown in Table 4 (the convergence target is reached when active and reactive power is iterated 12 times)

[0217] Table 4 Comparison of IEEE-118 node attack results

[0218]

[0219]

[0220] The change trend of load shedding in each iteration of the 118 system after the attack is as...

Embodiment 3

[0222] IEEE-280 calculation example

[0223] The total output power of IEEE-280 nodes is 4389.56MW, the total load in the network is 4331.69MW, and the reference capacity is 100MVA. Also assume that the attacker’s attack line cost is 1, that is, =1, and the threshold of the upper limit of the cut set capacity is set to 15, and then Utilize the thinking of the present invention to carry out iterative solution, and the system load shedding amount and cut-off circuit result finally obtained are shown in Table 5 (when the active and reactive power alternate iteration is 12 times, the convergence target is reached)

[0224] Table 5 Comparison of IEEE-280 node attack results

[0225]

[0226] The trend of load shedding in each iteration of the 280-node system after the attack is as follows Figure 7 Shown:

[0227] It can be seen from the figure that the amount of load shedding also tends to be stable in the late iteration, which also shows that the fault degree of the terroris...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security analysis method for a power system suffering from a terror attack. The method comprises the following steps: 1) establishing a double-layer mixed integer nonlinear optimization model regarding the terror attack; 2) replacing an inner layer optimization model in the double-layer mixed integer nonlinear optimization model by adopting a KKT (Karush-Kuhn-Tucker) condition to transform the double-layer optimization model into a single-layer optimization model; 3) performing active and reactive power decoupling on the single-layer optimization model to decompose the single-layer optimization model into an active power optimization sub-model and a reactive power adjusting sub-model; 4) simplifying the active power optimization model into a combined model according to a Lagrangian multiplier of the KKT condition, and performing approximate solving by using a max-flow min-cut model; and 5) alternatively solving the active power optimization sub-model and the reactive power adjusting sub-model till the voltage difference of two times of iteration satisfies a corresponding convergence condition, and finally obtaining an optimal solution. Compared with the prior art, the method has the advantages that solution nesting is avoided, the model is comprehensive, the result is accurate and the like.

Description

technical field [0001] The invention relates to the field of vulnerability analysis of power grids, in particular to a security analysis method for power systems under terrorist attacks. Background technique [0002] As one of the important infrastructures in modern society, the power system has higher and higher requirements for its safe and stable operation as various advanced equipment and control systems are put into operation. However, due to the complex structure of the cross-regional power system, numerous devices, and a vast area covered, the current system cannot completely avoid the occurrence of system failures and the expansion of accidents or even system collapse caused by partial failures. The direct and indirect losses caused by accidents or terrorist damage to cross-regional systems are huge. Among them, human malicious attacks on power systems caused by various social conflicts, terrorist activities, and wars are more serious, which may cause system damage. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/04G06Q10/06G06Q50/06
CPCY02E40/70Y04S10/50
Inventor 林济铿李飞刘阳升刘慧杰张鑫王忠岳
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products