Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk assessment and warning method of cascading faults in interconnected power grid considering communication vulnerability

A technology for cascading failures and interconnecting power grids, applied in data processing applications, instruments, computing, etc., can solve the problem of undiscussed importance, lack of discussion of real-time performance indicators of communication links and communication nodes, and in-depth risk assessment methods for cascading failure paths, etc. question

Active Publication Date: 2021-06-08
SOUTHWEST JIAOTONG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The article [Guo Jing. Vulnerability Analysis of Electric Power Communication Network Based on Complex Network Theory. North China Electric Power University (Hebei) Master’s Degree Thesis, 2010] based on complex network theory, evaluates the topology vulnerability and physical vulnerability of communication network, but the communication chain Real-time performance metrics of road and communication nodes are not discussed
The second is to establish a CPS co-simulation model to study the development mechanism of cascading faults in the interconnected grid under communication faults. , 2015, 41(10): 3464-3469] established a CPS simulation model to discuss the impact of the coupling mode and strength of the system on the vulnerability of the interconnected grid, but treated all kinds of power services transmitted by the communication network uniformly, and did not discuss their importance. Spend
Although there are some methods for cascading failure analysis models and risk assessment methods, the risk assessment methods for power system cascading failure paths considering the vulnerability of communication networks are not deep enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk assessment and warning method of cascading faults in interconnected power grid considering communication vulnerability
  • Risk assessment and warning method of cascading faults in interconnected power grid considering communication vulnerability
  • Risk assessment and warning method of cascading faults in interconnected power grid considering communication vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0209] Set up DDoS attack nodes in the OPNET communication simulation software, set two attack modes to simulate DDoS attacks on communication nodes in different locations, study the results of DDoS attacks in different locations on the comprehensive risk assessment of chain failure paths, and set up DDoS attack nodes , that is, set the source IP address as an unreachable fake address. After setting up a DDoS attack node, set up its internal business model. Connect multiple DDoS attack client nodes to the internal switch or core router of the communication node, so as to adjust the DDoS attack intensity of a communication node. The setting interface of multiple DDoS attack client nodes targeting internal switches or core routers in OPNET is as follows: Figure 4 shown.

[0210] The power branch 2-3 is set as the initial fault branch, and two attack modes are set for comparison, and the impact of the location of the attacked communication node on the risk assessment of power ...

Embodiment 2

[0229] Randomly select communication nodes in different locations to carry out DDoS attacks. For power nodes whose power flow data is unobservable, the data of the moment before the attack is used to carry out the risk assessment of cascading failures. The attack intensity takes the ratio of the number of attacked communication nodes to the total number of communication nodes, such as 5%, 10%, 15%, 20%, 25%, 30%, 35%, and 40%. The power branch 2-3 is set as the initial fault branch disconnected, and the more likely cascading failure paths under different DDoS attack intensities are studied.

[0230] Power risk P of each cascading failure path under different DDoS attack intensities L-ev , communication risk degree C L-ev , comprehensive risk R iskL-ev As shown in Table 6, Figure 5 shown.

[0231] Table 6 The highest comprehensive risk of cascading failure paths under different DDoS attack intensities

[0232] Attack Strength / % Highest risk cascading failure ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a risk assessment and alarm method for cascading failures of the interconnected power grid considering the vulnerability of communication, and constructs a unified empirical maximum value for the transmission delay, propagation delay, queue delay, and link utilization of the communication link, respectively. Perform normalization processing, de-zero processing, and equal weight addition to obtain the vulnerability of communication links of the same standard under different time sections; use the performance vulnerability of communication nodes based on the node degree and the topology vulnerability based on the business routing matrix , Business criticality, constructs the vulnerability of communication nodes. Considering the communication vulnerability, establish the outage probability model of the branches of the interconnected grid at all levels; define the loss of load, voltage fluctuation, average communication link utilization rate, and communication unobservable rate as the consequence indicators of the cascading failure path. Paths are sorted and evaluated, and various alerts are given. The invention combines power risk assessment and communication vulnerability to make the fault analysis and control of the wide-area measurement and control system of the interconnected power grid more comprehensive and reasonable.

Description

technical field [0001] The invention relates to the field of operation analysis of interconnected grids, in particular to a risk assessment and alarm method for cascading failures of interconnected grids considering communication vulnerability. Background technique [0002] In recent years, there have been frequent blackouts at home and abroad caused by cascading failures of power systems, which have had a bad impact on national economic and social development. The traditional analysis of cascading failures mostly starts from the operating state of the power system, and studies the development mechanism of cascading failures based on the theory of complex networks and self-organized criticality. However, the vulnerability of the communication network has relatively little consideration for the risks brought by the operation of the power system. The modern power system is a CPS (Cyber ​​Physical System) that integrates the power network and the communication network. Therefor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06G06Q50/06
CPCG06Q10/0635G06Q10/06393G06Q50/06
Inventor 童晓阳刘焱滨
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products