Interconnected power grid cascading fault risk assessment and alarming method considering communication vulnerability degrees

A technology of cascading faults and interconnected grids, applied in the direction of instruments, data processing applications, resources, etc., can solve the problem that the risk assessment method of cascading fault paths is not deep enough, the importance is not discussed, and the real-time performance indicators of communication links and communication nodes are not discussed, etc. question

Active Publication Date: 2018-02-09
SOUTHWEST JIAOTONG UNIV
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The article [Guo Jing. Vulnerability Analysis of Electric Power Communication Network Based on Complex Network Theory. North China Electric Power University (Hebei) Master’s Degree Thesis, 2010] based on complex network theory, evaluates the topology vulnerability and physical vulnerability of communication network, but the communication chain Real-time performance metrics of road and communication nodes are not discussed
The second is to establish a CPS co-simulation model to study the development mechanism of cascading faults in the interconnected grid under communic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interconnected power grid cascading fault risk assessment and alarming method considering communication vulnerability degrees
  • Interconnected power grid cascading fault risk assessment and alarming method considering communication vulnerability degrees
  • Interconnected power grid cascading fault risk assessment and alarming method considering communication vulnerability degrees

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0209] Set up DDoS attack nodes in the OPNET communication simulation software, set two attack modes to simulate DDoS attacks on communication nodes in different locations, study the results of DDoS attacks in different locations on the comprehensive risk assessment of chain failure paths, and set up DDoS attack nodes , that is, set the source IP address as an unreachable fake address. After setting up a DDoS attack node, set up its internal business model. Connect multiple DDoS attack client nodes to the internal switch or core router of the communication node, so as to adjust the DDoS attack intensity of a communication node. The setting interface of multiple DDoS attack client nodes targeting internal switches or core routers in OPNET is as follows: Figure 4 shown.

[0210] The power branch 2-3 is set as the initial fault branch, and two attack modes are set for comparison, and the impact of the location of the attacked communication node on the risk assessment of power ...

Embodiment 2

[0229] Randomly select communication nodes in different locations to carry out DDoS attacks. For power nodes whose power flow data is unobservable, the data of the moment before the attack is used to carry out the risk assessment of cascading failures. The attack intensity takes the ratio of the number of attacked communication nodes to the total number of communication nodes, such as 5%, 10%, 15%, 20%, 25%, 30%, 35%, and 40%. The power branch 2-3 is set as the initial fault branch disconnected, and the more likely cascading failure paths under different DDoS attack intensities are studied.

[0230] Power risk P of each cascading failure path under different DDoS attack intensities L-ev , communication risk degree C L-ev , comprehensive risk R iskL-ev As shown in Table 6, Figure 5 shown.

[0231] Table 6 The highest comprehensive risk of cascading failure paths under different DDoS attack intensities

[0232] Attack Strength / %

Highest risk cascading failure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an interconnected power grid cascading fault risk assessment and alarming method considering communication vulnerability degrees. Unified empirical extreme values are constructed separately for the sending delay, propagation delay, queue delay and link utilization rate of communication links; normalization processing, zero suppression processing and equal weight addition areperformed, so that the vulnerability degrees of the communication links of the same standards under different time cross sections are obtained; and the vulnerability degrees of communication nodes are constructed through using the node degree-based performance vulnerability degrees, service routing matrix-based topological vulnerability degrees, and business criticality degrees of the communication nodes. With the communication vulnerability degrees are considered, the outage probability model of branches at all levels of an interconnected power grid is established; load loss quantities, voltage fluctuation degrees, average communication link utilization rates and communication unobservable rates are defined as the consequence indicators of cascading fault paths; and the cascading fault paths are sorted and assessed, and a variety of alarms are given out. According to the interconnected power grid cascading fault risk assessment and alarming method considering communication vulnerability degrees of the invention, power risk assessment and communication vulnerability are combined together, so that the fault analysis and control of an interconnected power grid wide-area measurementand control system can be more comprehensive and reasonable.

Description

technical field [0001] The invention relates to the field of operation analysis of interconnected grids, in particular to a risk assessment and alarm method for cascading failures of interconnected grids considering communication vulnerability. Background technique [0002] In recent years, there have been frequent blackouts at home and abroad caused by cascading failures of power systems, which have had a bad impact on national economic and social development. The traditional analysis of cascading failures mostly starts from the operating state of the power system, and studies the development mechanism of cascading failures based on the theory of complex networks and self-organized criticality. However, the vulnerability of the communication network has relatively little consideration for the risks brought by the operation of the power system. The modern power system is a CPS (Cyber ​​Physical System) that integrates the power network and the communication network. Therefor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q50/06
CPCG06Q10/0635G06Q10/06393G06Q50/06
Inventor 童晓阳刘焱滨
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products