You are on page 1of 8

Comparative Studies of Power Grid Security with

Network Connectivity and Power Flow Information


Using Unsupervised Learning
Shiva Poudel, Zhen Ni Xiangnan Zhong, Haibo He
Electrical Engineering and Computer Science Department Department of Electrical, Computer, and Biomedical Engineering
South Dakota State University University of Rhode Island
Brookings, SD, USA 57007 Kingston, RI, USA 02881
Email: {shiva.poudel, zhen.ni}@sdstate.edu Email: {xzhong,he}@ele.uri.edu

Abstract—The modern electric power grid has become highly for initiating an attack. Because of the interconnected structure
integrated in order to increase reliability of power transmission of modern grid, the result of an attack can trigger a cascading
from the generating units to end consumers. This integrated failure or a blackout as it allows the local failures to propagate
nature and its upgrade toward an intelligent smart grid make
the power grid vulnerable when facing cyber or physical attacks through out the system. Predicting the probability of the
as well as intentional attacks. Therefore, determining the most occurrence of blackout in large interconnected power system is
vulnerable components (e.g., buses or generators) is critically difficult and the socio-economic impact is devastating, e.g., the
important for power grid defense. In this paper, a new definition 2003 Northeast blackout [2] and Indian power grid blackout in
of load is proposed by taking power flow into consideration in 2012 [3]. Therefore, there is growing awareness towards the
comparison with the load definition based on degree or network
connectivity. Unsupervised learning techniques (e.g., K-means power grid security from engineering societies, government,
algorithm and self-organizing map (SOM)) are introduced to and power industry.
cluster the nodes (i.e., buses) in IEEE-39 bus and IEEE-57 Research work has been conducted on security of complex
bus benchmarks. Then most vulnerable node in each cluster power system network against failure of grid components and
is determined based on their load information to form initial intrusions from attackers. An extended topological approach
victim set. We use percentage of failure (PoF) to compare
the performance of clustering based approach and traditional was proposed for assessing the vulnerability of power grid
load based approach during cascading failure process. With the components during cascading failures with limited knowledge
simulation results, the unsupervised learning (clustering based) about dynamics of power system information [4]. Transient
approaches are more efficient in finding the most vulnerable stability and voltage security assessment using machine learn-
nodes and our proposed definition of load is relatively useful in ing was studied in [5]. Random sampling techniques were
studying power grid security.
considered for screening all the operating situations of power
Index Terms—power grid security, cascading failures, compu- system. The use of modular neural networks and multilayer
tational intelligence, unsupervised learning, self-organizing map perceptrons (MLP) helps to detect and recognize intrusions in
(SOM), and K-means algorithm. computer networks with higher accuracy [6]. In [7] combi-
nation of unsupervised and supervised learning was used for
I. I NTRODUCTION online security evaluation of N − 1 contingency. Generally,
With thousands of substations and interconnected transmis- higher order contingency is one of the major contributions to
sion lines, the modern electric power grid is regarded as one cascading failures and the identification of the contingency set
of the most complex network. U.S. power grid as of today is the foremost step for studying power grid security [8]. The
consists of more than 9,200 electric generating units with application of well-known higher order contingency (N − k)
more than 1 million Mega Watts of generating capacity which used for searching k critical components has the drawback
are connected to more than 300,000 miles of transmission of high computational and analysis cost. To overcome the
lines [1]. With purpose of adding resiliency to the existing complexity for assessing all N − k contingency combinations,
electric power system, information and communication tech- risk analysis methodologies like cluster-based approach, enu-
nologies (ICTs) are introduced and electric grid are becoming meration of likely cascade paths, uniform sampling and bulk
smarter these days. With the help of ICT network, smart analysis method are discussed [9]. During study of cascading
grid provides better situational awareness during emergencies failure in power grid, it has been recognized that topological
such as storms, earthquakes and terrorist attacks. Due to the structure of power grid has key impact in propagation of
large amount of information being exchanged in the network, cascading events [10], [11]. Utilization of spatial features of
an attacker with enough knowledge of the power grid can electric power grid can help to analyze the electrical system
penetrate into the network and find the vulnerable components behaviour in cascading failure scenarios [12].

978-1-5090-0620-5/16/$31.00 2016
c IEEE 2730
In order to study the cascading process for power grid A. Definition of load based on network connectivity
security, one needs to define load associated with buses (nodes) First, we define load of a particular node based on degree
so that it helps to keep track of which nodes are knocked down (connectivity). Previous work on cascading failures of high
in successive time steps. Load of a particular node in complex level power grid structure have suggested that load of a par-
network can be defined as overall transmission capabilities, ticular node is related to the connectivity with/of its immediate
which is also referred to as extended betweenness of that neighbours [16], [17]. In this model, we define load of a
node [13]. A new model was proposed to define load of a particular node as product of its degree and sum of degree
node as product of its own degree and sum of degree of its of its neighbouring nodes. Let kv be the degree of a particular
immediate neighbours [12], [14]. A degradation model based node, the initial load, Lv is defined by
on degree was proposed to evaluate the stress on a particular 
node due to failure of neighbouring nodes. This stress on Lv = kv ∗ km , m ∈ N br(v) (1)
node was supposed to decrease its life expectancy analogous
where N br(v) is the set of neighbouring nodes of a particular
to “wearout” process [15]. However, these definitions of load
node v. If one or more nodes are knocked down, they are
are based on network connectivity and ignore the power flow
assumed to be out of service and the load flowing through
governed by basic circuit laws in power system. So, these
that node gets proportionally redistributed to the neighbouring
definitions may not be that realistic and useful from power
nodes. So, the nearby nodes must take up the slack for the
system viewpoint as they do not take power flow analysis into
failed node. Hence the load gets redistributed according to the
consideration.
model proposed in [16] and the load of immediate neighbours
The aforementioned literature mainly focus in complex is updated with some additional load as defined by (2) and
network theories and have defined load of node based on (3).
degree or network connectivity only. In actual power system, Lm
it is not always true that a node with higher connection takes δm =  ∗ Lv (2)
Lm
greater portion of load. With these considerations, we propose 
a new definition of load by taking fundamental laws of power Lm = Lm + δm (3)
flow into consideration. Two unsupervised learning algorithms where Lv is the initial lode of failure node, δm is the additional
(self-organizing map (SOM) and K-means) are introduced in load assigned to neighbouring nodes due to failure of node
this paper for searching the initial victim by preserving the v. This may lead to a new situation that these neighbouring
topological features of power grid. We perform cascading nodes will exceed their capacity and thus result in new failure.
failure experiments on IEEE-39 bus system and IEEE-57 bus If the load lost that is to be reabsorbed is large, the failure
system with the traditional load-based and clustering-based propagation will continue and spread over the network and
approaches. The performance comparison of different attack it continues until all the nodes are compromised which is
strategies is conducted by evaluating severity of cascading referred as “cascading failure” in literature.
failures in terms of total number of nodes failed after victim
nodes are knocked down. In addition, we compare the phe- B. Definition of load based on power flow
nomenon of cascading failure in power system benchmark for In second model, we define load of a particular node as
both definition of load, i.e., load defined based on network the burden of total MW that it carries during its healthy state.
connectivity and load defined by taking power flow into When electric power from the generating units is delivered to
consideration. end consumers, it can travel through different routes through
The rest of this paper is organised as follows: Section different buses (nodes). The node may have some MW of
II introduces the system model and metrics used in our real load, or a generator, or it may be simply a transmission
work. Section III describes our proposed work which includes path delivering power to other substations. Assume D is the
traditional load-based attack strategy and our proposed cluster- demand present at a particular node v, I1 , I2 , ..., Ik be the
ing approach using unsupervised learning. Simulation results amount of power flowing into node v from k neighbouring
and performance comparison of different attack strategies are nodes and O1 , O2 , ..., Om be the amount of power flowing
shown in Section IV. Section V discusses about the compar- out from node v to m neighbouring nodes. An initial load
ison of failure propagation by defining load based on power that a particular node carries during normal operation of grid
flow information and network connectivity. Finally Section V is defined by (4). Information regarding power flowing into the
gives the conclusion of the work. node I, flowing out of node O, and demand in that node D
can be obtained by simulating the benchmark in PowerWorld
simulator and Matpower. The power flow is presented in Fig.
II. S YSTEM MODEL AND EVALUATION METRICS 1 and the load definition is provided as,
k
 m

In this section, we introduce two different models of the L(v) = Ii = Oj + D, v∈n (4)
i=1 j=1
power grid to define the load of the node and the attack model
for cascading failure to occur. where v is a given node of a system with n nodes.

2016 International Joint Conference on Neural Networks (IJCNN) 2731


A. Traditional load based attack strategy
Attack on nodes with the highest load is a common attack
strategy and is based on the fact that the failure of a node
with the largest value of load causes significant amount of
load to be redistributed among its neighbours. The optimal
strategy in this attack is to select the desired number of
victim nodes in descending order of loads and to remove
them from the network. Authors in [21] studied cascading
failures in North American power grid using information from
its network structure. Loss of single high-load or high-degree
substation reduced efficiency of power grid by 25%. It seems
Fig. 1. Load burden of a node using power flow information. The direction reasonable to choose victim nodes according to the load, but
of each arrow shows whether power is entering or exiting a node. Demand one should always remember that network topology plays a
is the power consumed at that node. For node 16, with given power flow
information, its initial load burden is L(16) = 204.12+289.71+329.4 = 823.23 crucial role in complex network failures.
MW.
B. Clustering-based attack strategy
The attack model for this case is similar to that as de- In this approach, clustering of nodes is done so as to
scribed earlier in section II-A. But the redistribution of load capture the topological aspects of the complex power grid
after failure of particular node is based on circuit laws and network. As stated in [12], the cooperative effect of nodes
independent of initial load of neighbouring nodes as described failure occurred in distance can result in strong impact to the
in (2). Also this redistribution is not only limited to adjacent grid. In order to capture the topological feature, substations
network components [18] and despite overloading, there may are clustered into several groups and the most loaded ones
be a situation in cascading analysis where a neighbouring node are selected from each group to initiate an attack. We
may get functionally disconnected from the system causing use unsupervised learning algorithms which use unlabelled
load shedding at those nodes or form isolated networks [19]. samples for clustering the nodes into different groups. Among
various approaches, SOM and K-means algorithm are used in
C. Evaluation Metrices our work.

Following [20], we define capacity C(v) of each node which 1) K-means: K-means clustering (MacQueen, 1967) is a
is directly proportional to its initial load L(v) that it carries method commonly used to partition n data set into k groups
in a healthy network as, in which each data belongs to the cluster with nearest mean
[22]. It is one of the simplest unsupervised learning algorithms
C(v) = αL(v), v ∈ n (5) for solving the clustering problem. The procedure follows a
simple way to classify given set of data to certain number of
where α ≥ 1 is the system tolerance. Higher value of α means clusters fixed apriori. K-means algorithm attempts to find the
higher capability of node to resist perturbations. cluster centers so as to minimize the within-cluster sum of
At this moment, we are interested in identifying the most square (WCSS) distance. Simply, its objective is to minimize
critical components in the grid network from the cascading the following objective function,
failure perspective. So a new metric, Percentage of Failure
nj
k 
(PoF), is investigated to evaluate the damage caused by the 
failure of any grid components [12]. The PoF is defined as, J= |Vij − Cj |2 (7)
j=1 i=1

N
P oF = 1 − (6) where Vij is the ith input of j th cluster, Cj is the centroid
N of a particular cluster, k is the total number of clusters, and
where N is total number of nodes in system before attack and nj is the number of data set belonging to j th cluster. The

N is number of nodes survived after attack. algorithm behind this objective can be summarized as:

III. P ROPOSED ATTACK STRATEGIES Step 1. Initialization: Choose C1 , C2 , ..., Ck as initial cluster
centers. They represent the “temporary” means of the clusters.
The primary goal of this research is to analyze the cascading The dimension of initial centers is same as that of input vector.
failures during various multivictim attack strategies. We will
compare two different attack strategies in this section. We Step 2. Assignment: Each observation (data set) is assigned
discuss traditional load based attack strategy (Section III- to a closest cluster by calculating the squared Euclidean
A) and clustering-based attack strategy (Section III-B) and distance.
compare their performance. D = |V (t) − C(t)| (8)

2732 2016 International Joint Conference on Neural Networks (IJCNN)


where V (t) is the sample input vector at tth iteration, C(t) where δ is the distance between the neuron and BMU.
is the weight vector of cluster center. A unique feature of this learning is that the area of the
neighbourhood and learning rate decreases over time. The
Step 3. Update: The new centroid of the clusters are neighbourhood size (i.e., σo ) and SOM learning rate (i.e., Lo )
calculated using (9) are updated using exponential decay function defined by,
1  L(t) = Lo e−t/λ1 (12)
Cj = Vi (9)
nj
Vi ∈j σ(t) = σo e−t/λ2 (13)
where nj is the number of data set (Vi ) belonging to a where t is number of iterations and λ1 is the time constant
particular cluster j after assignment. Since the arithmetic whose value depends on σo , λ1 = 100/log(σo ).
mean is a least square estimator, this will minimize the
WCSS objective in equation (7). Step 4. Convergence: After the parameters are updated,
neurons are dragged towards input vector to adjust their
Step 4. Convergence: Repeat step 2 and 3 until there is no weight. Since we are using Gaussian kernel as neighbourhood
further change in position of centroid of each clusters. function, the weight of the neurons closer to BMU will be
updated as,
2) Self Organizing Map: Self organizing map commonly
known as Kohonen network is a class of artificial neural W (t + 1) = W (t) + H(σ)L(t)(V (t) − W (t)) (14)
network (ANN) in an unsupervised learning category [23]. At this stage, we finish the training of neurons and they will
It is an effective platform for visualizing and analysing high find their own positions in lattice. Each of them represents
dimensional data. The two modes of operation of SOM the centroid of clusters. Finally, the mapping process starts
are training and mapping. During the training process, the in which the input vector will be clustered according to the
neurons are settled at different locations in the lattice. During Euclidean distance.
the mapping process, the input vector are clustered. The
number of neurons depends on the number of initial victims IV. R ESULTS AND P ERFORMANCE C OMPARISON
targeted for multivictim attack. The training of neurons occur We study the IEEE-39 bus and IEEE-57 bus system for
in several steps as described below. analysing the multivictim attack from two different strate-
gies. A simulator was built in MATLAB 2014a environment
Step 1. Initialization: Before training, each neuron’s weight for simulating load redistribution process for different attack
needs to be initialized. Among various initialization processes strategies. For preserving the topological information in both
we choose random initialization approach for its simplicity. benchmark system, X and Y coordinates for different nodes
So, the weight of the neurons are set to small standardized were extracted from PowerWorld simulator. A system case
random values such that 0 < W < 1, where W is the weight with branch and bus state for 39 bus system was obtained
vector of neuron. The dimension of weight vector is same as from Illinois Center for a Smarter Electric Grid (ICSEG) [24]
that of input vector. and 57 bus system from Matpower [25].
A. Simulation parameter setup
Step 2. Best Matching Unit (BMU): After initialization, a
sample input vector is selected from the set of training data The coordinates of buses (nodes) for both test cases ob-
and presented as input to SOM. Each neuron is now examined tained from PowerWorld were normalized by using following
to find which one’s weight is closest to the current input. The equation as,
winner is called the BMU. To determine this unit, Euclidean z − min(Z)
distance between each neurons’s weight vector and current z= , z∈Z (15)
max(Z) − min(Z)
input vector being presented to lattice is calculated as,
where z stands for either X or Y coordinate.
Dist = |V (t) − W (t)| (10) We plan to attack two different nodes in IEEE-39 bus system
so the number of neurons in SOM training was 2. We used
where V (t) is the sample input vector at tth iteration and W (t) 1-D SOM lattice for training of neurons and the dimension
is the weight vector of neuron. The neuron that minimizes this of input vector in our case is 2, i.e., X and Y coordinate,
distance is tagged as BMU. each neuron carry a 1-by-2 weight vector. The weight of two
Step 3. Parameters Update: Now, a neighbourhood func- neurons are set to uniform random values such that 0<W <1.
tion is defined to calculate which neurons are within the In our simulation, the initial values of neighborhood size (i.e.,
neighbourhood of BMU. Gaussian kernel function is used as σ0 ), SOM learning rate (i.e., L0 ), and length of rough training
neighbourhood function which adjust the weights of neurons (λ2 ) are selected as 1.2, 0.01, and 15 respectively.
based on its distance to BMU. It is defined by, Since we plan to attack three different nodes in IEEE-57
1 2 2 bus system, we have three different initial cluster centers. The
H(σ) = √ e−δ /2σ (11) dimension of the sample input vector in our case is 2, i.e., X
2πσ

2016 International Joint Conference on Neural Networks (IJCNN) 2733


TABLE I. Cascading events for IEEE 39 bus system at tolerance of α =1.6.
The initial victim sets (nodes 16 and 26) are chosen according to the load
ranking, i.e., load-based attack strategy. Li denotes initial load of a node and
C is the capacity of node defined by, Ci =α Li
Bus Li C 1st 2nd 3rd 4th 5th 6th 7th
1 12 19.2 12 12 12 12 24.1 0 0
2 36 57.6 36 36 36 58.0 0 0 0
3 27 43.2 27 27 54.5 0 0 0 0
4 27 43.2 27 27 53.3 0 0 0 0
5 30 48 30 30 30 60.4 0 0 0
6 36 57.6 36 36 36 36 74.1 0 0
7 14 22.4 14 14 14 14 14 52.6 0
8 21 33.6 21 21 21 21 43.2 0 0
9 10 16 10 10 10 10 10 23.2 0
10 21 33.6 21 21 21 51.15 0 0 0
11 27 43.2 27 27 27 27 102.2 0 0
12 12 19.2 12 12 12 29.2 0 0 0
13 24 38.4 24 24 47.3 0 0 0 0
14 24 38.4 24 49.6 0 0 0 0 0
15 16 25.6 25.6 0 0 0 0 0 0
16 60 96 0 0 0 0 0 0 0
17 27 43.2 43.3 0 0 0 0 0 0
(a) Two clusters of IEEE 39 bus system using SOM 18 12 19.2 12 27.5 0 0 0 0 0
19 24 38.4 38.5 0 0 0 0 0 0
20 8 12.8 8 36.0 0 0 0 0 0
21 16 25.6 25.6 0 0 0 0 0 0
22 18 28.8 18 43.6 0 0 0 0 0
23 18 28.8 18 43.6 0 0 0 0 0
24 16 25.6 25.7 0 0 0 0 0 0
25 27 43.2 41.2 41.2 41.2 41.2 82.9 0 0
26 40 64 0 0 0 0 0 0 0
27 14 22.4 21.3 49.1 0 0 0 0 0
28 14 22.4 21.3 21.3 21.3 21.3 21.3 21.3 21.3
29 21 33.6 32.0 32.0 32.0 32.0 32.0 32.0 32.0
30 4 6.4 4 4 4 4 8.0 0 0
31 4 6.4 4 4 4 4 4 6.4 0
32 3 4.8 3 3 3 3 8.1 0 0
33 3 4.8 3 13.5 0 0 0 0 0
34 2 3.2 2 2 38.0 0 0 0 0
35 3 4.8 3 3 5.8 0 0 0 0
36 3 4.8 3 3 8.4 0 0 0 0
37 3 4.8 3 3 3 3 3 85.9 0
38 3 4.8 3 3 3 3 3 3 3
39 8 12.8 8 8 8 8 8 32.1 0

(b) Three Clusters of IEEE 57 bus system using K-means algorithm


Fig. 2. Clustering result showing nodes of power grid. Centroid of each ing to their initial load and find the most loaded ones to form
cluster is represented by a solid (green) circle. Mostly loaded nodes in each
cluster is highlighted by red circle.
the initial victim set. In IEEE-39 bus system, it was found that
nodes 16 and 26 are the most loaded ones and in 57 bus system
and Y coordinate and hence these cluster centers also carry a nodes 15, 13 and 9 are most loaded nodes. These set of nodes
1-by-2 weight vector. The weight of three cluster centers are are selected to form the initial victim set for traditional load
set to uniform random values such that 0<C<1. based attack strategy. In order to study the cascading failure
From Fig. 2, we can see that 39 buses (nodes) of IEEE-39 process, we knocked down the initial set of nodes in both
bus system benchmark are grouped into two different clusters benchmark system. This causes the redistribution of load in
using SOM and 57 buses (nodes) of IEEE-57 bus system are remaining nodes according to equation (2) and it was observed
grouped into three different clusters using K-means algorithm. that some of the nodes are overloaded beyond their capacities.
Centroid of each cluster is represented by a solid (green) circle. Next these overloaded nodes are also knocked down. This
process was repeated several times until the system achieved
final steady state. Finally, the number of survived components
B. Power system model based on network connectivity in steady state was evaluated and PoF was calculated using
In this model, load of a particular node is calculated using equation (6).
equation (1). Based on the loading information of all nodes, To further explain the cascading phenomenon, we present
we initiated an attack on power system benchmark from both failure of different nodes in successive time steps for IEEE-
traditional load-based and proposed clustering-based approach. 39 bus system at system tolerance of 1.6 as shown in table
For traditional load based strategy, we sorted the nodes accord- I. The benchmark was simulated in Matlab for calculation

2734 2016 International Joint Conference on Neural Networks (IJCNN)


IEEE 39 bus system simulated in Matlab phenomenon is similar as described for traditional load-based
1 attack strategy. PoF for clustering-based attack was calculated
Load−based attack
0.9 Clustering−based attack and compared with traditional approach for both benchmark
system. From Fig. 3, we can observe that the clustering-based
Percentage of Failure (PoF)

0.8
attack is able to find the victim set with nodes carrying less
0.7
load but with greater impact than the traditional load based
0.6 strategy.
0.5 C. Power system model based on actual power flow
0.4 In this approach, we select the victim nodes based on the
0.3 load defined by equation (4). The power flow information was
obtained from PowerWorld and Matpower for 39 bus system
0.2
and 57 bus system respectively. After calculating the load of
0.1 each buses, attack was initiated by selecting victim set for both
0 traditional load-based and clustering-based strategy.
1 1.2 1.4 1.6 1.8 2 2.2
Tolerance (α) TABLE II. Cascading events for IEEE 39 bus system at tolerance of α
=1.25. The initial victim sets (nodes 6 and 39) are chosen according to the
(a) load ranking, i.e., load-based attack strategy. The load of these nodes are
IEEE 57 bus system simulated in Matlab calculated based on equation (4). Li denotes initial load of a node and C is
1 the capacity of node defined by, Ci =α Li
Load−based attack
0.9 Clustering−based attack Bus Initial load (Li ) Capacity (C) 1st 2nd
1.0 116.3 145.4 0.0 0.0
Percentage of Failure (PoF)

0.8
2.0 481.5 601.9 872.2 0.0
0.7 3.0 398.8 498.5 897.5 0.0
4.0 500.0 625.0 1274.2 0.0
0.6 5.0 482.8 603.5 769.0 0.0
6.0 910.0 1137.5 0.0 0.0
0.5
7.0 426.8 533.5 233.8 0.0
0.4 8.0 523.0 653.8 763.0 0.0
9.0 12.1 15.1 0.0 0.0
0.3 10.0 650.0 812.5 650.0 0.0
11.0 350.3 437.9 31.9 0.0
0.2 12.0 7.5 9.4 31.8 0.0
0.1 13.0 299.7 374.6 642.4 0.0
14.0 292.9 366.1 717.8 0.0
0 15.0 320.1 400.1 397.4 320.0
1 1.2 1.4 1.6 1.8 2 2.2
16.0 823.9 1029.9 822.7 808.8
Tolerance (α)
17.0 204.1 255.1 183.8 158.3
(b) 18.0 192.3 240.4 183.7 158.2
19.0 629.2 786.5 629.0 614.3
Fig. 3. Performance comparison of traditional load based and clustering 20.0 680.2 850.3 680.2 680.3
based attack. Higher PoF for given value of tolerance signifies more number of 21.0 604.6 755.8 604.2 604.4
failed components. For both benchmark system, the load of node is calculated 22.0 650.0 812.5 650.0 650.0
based on network connectivity. 23.0 601.3 751.6 601.4 601.4
24.0 353.8 442.3 353.9 353.8
25.0 538.3 672.9 538.3 224.0
and redistribution of load. Nodes 16 and 26 in grey colored 26.0 409.6 512.0 512.8 0.0
cells were knocked down to initiate an attack. These set of 27.0 281.9 352.4 372.9 0.0
nodes corresponds to the load based attack strategy. As these 28.0 347.5 434.4 347.8 206.0
29.0 824.8 1031.0 824.7 490.1
victim nodes are knocked down to initiate an attack, the 30.0 250.0 312.5 741.0 0.0
load carried by those victim nodes gets redistributed to their 31.0 571.3 714.1 9.2 9.2
immediate neighbors. Now the updated load is calculated using 32.0 650.0 812.5 650.0 0.0
33.0 632.0 790.0 632.0 617.1
equation (2) and compared with their capacity. If their updated 34.0 508.0 635.0 508.0 508.0
load is higher than capacity, i.e., if they are overloaded then 35.0 650.0 812.5 650.0 650.0
these nodes are again knocked down in next time steps. The 36.0 560.0 700.0 560.0 560.0
overloaded nodes in different time steps are represented by 37.0 540.0 675.0 540.0 224.3
38.0 830.0 1037.5 830.0 491.9
bold figures in table. 39.0 1116.3 1395.4 0.0 0.0
For clustering based approach, the mostly loaded nodes
from each cluster were selected to form the initial victim set. For traditional load-based strategy, nodes 6 and 39 are found
For 39 bus system it was found that node 16 and 2 are the to be most loaded for 39 bus system. Whereas for 57 bus
most loaded ones and in 57 bus system nodes 9, 13 and 12 are system, nodes 8, 1 and 12 are most loaded. These set of nodes
the most loaded. The load redistribution process and cascading are the initial victims which are knocked down to trigger a

2016 International Joint Conference on Neural Networks (IJCNN) 2735


IEEE 39 bus system simulated in PowerWorld IEEE 57 bus system simulated in MATPOWER
1 1
Load−based attack Load−based attack
0.9 Clustering−based attack 0.9 Clustering−based attack
Percentage of Failure (PoF)

Percentage of Failure (PoF)


0.8 0.8

0.7
0.7
0.6
0.6
0.5
0.5
0.4
0.4
0.3
0.3 0.2
0.2 0.1

0.1 0
1 1.5 2 2.5 3 3.5 4 4.5 1 2 3 4 5 6
Tolerance (α) Tolerance (α)
(a) (b)
Fig. 4. Performance comparison of traditional load based and clustering based attack. Higher PoF for given value of tolerance signifies more number of
failed components. For both benchmark system, the load of node is calculated based on actual power flow.

cascading event. For clustering based approach, the mostly of connection with its neighbours should take higher amount
loaded nodes from each cluster is selected to form the initial of load for delivery. Also the load redistribution after failure
victim set. Based on Fig. 2a, nodes 38 and 39 are selected of a parent node is limited to its immediate neighbours only.
from two different cluster for 39 bus system. Similarly for 57 But this is not always true in power system network because
bus system, nodes 8, 1 and 13 are selected as initial victim set the power flowing in the electric grid depends on demand at a
as shown in Fig. 2b. These nodes are marked with a red circle particular node, generating units in a node, and transmission
in clustering results of both benchmark system. However, for line parameters. For simplicity, the cascading phenomenon
IEEE-57 bus system, DC power flow was used in Matpower to in electric power grid can be explained based on network
update the branch flow after initiating an attack. The use of AC connectivity. However, the results are not supportive to study
power flow in this benchmark was limited due to convergence the real cascading event in power system as it ignores load
problem after some cascading time steps. loss, formation of isolated networks and system blackout.
To explain the cascading process in this model, we consider
load based attack in IEEE-39 bus system. Nodes 6 and 39 are
knocked down initially to initiate an attack. As these victim We studied IEEE-118 bus system with two initial victim
nodes are knocked down, the load carried by those victim nodes for cascading failures. During the simulation it was
nodes is redistributed according to basic circuit laws. Unlike observed that the system was able to reach final steady state
the previous model, we can observe that the load redistribution when simulated using network connectivity concept. On the
is not only limited to immediate neighbors and independent contrary, when the system was studied with the power flow
of initial load of nodes. The updated load of nodes are information in power system software (e.g., PowerWorld), it
calculated using branch flow information from PowerWorld. was unstable for even triggering an attack in the system. We
Next, the overloaded nodes are identified and knocked down tried to knock down nodes 69 and 80 (mostly loaded nodes
in successive time steps. The whole process is summarized in according to power flow information) in IEEE-118 bus system
table II. but there was blackout and system was unstable. Similarly, the
Finally, the number of survived components in steady state study of cascading events in IEEE-39 bus system with power
was evaluated and PoF was calculated using equation (6). Per- flow information (Figure 4a) shows a certain range of system
formance comparison in Fig. 4 suggests that clustering-based tolerance (1.75 to 2.5) where PoF is equal to 1. This represents
attack is more efficient than load-based attack in searching a particular situation in power system, i.e., a blackout where
of vulnerable components which can cause greater damage in the demand of surviving nodes was not fulfilled and system
power system benchmark. was unstable. Hence fundamental circuit laws governing the
power flow should be considered to mimic the real cascading
V. D ISCUSSION phenomenon during attack or failure of nodes. The proposed
The simulation of cascading failure for power system bench- load definition and load redistribution based on PowerWorld
mark using concept of network connectivity ignores the actual and Matpower provides realistic results including formation
power flowing through the buses. This concept assumes that in of islands and even blackout in power system benchmark to
any interconnected network, the nodes having greater number analyse the impact of cascading failure.

2736 2016 International Joint Conference on Neural Networks (IJCNN)


VI. C ONCLUSION [11] M. Rosas-Casals, S. Valverde, and R. V. Solé, “Topological vulnerability
of the european power grid under errors and attacks,” International
This paper introduced the concept of load flow in addition Journal of Bifurcation and Chaos, vol. 17, no. 07, pp. 2465–2475, 2007.
to network connectivity to calculate actual burden of a node [12] J. Yan, Y. Zhu, H. He, and Y. Sun, “Multi-contingency cascading analysis
by taking power flow into considerations. During simulating of smart grid based on self-organizing map,” Information Forensics and
the cascading process using real power flow information, Security, IEEE Transactions on, vol. 8, no. 4, pp. 646–656, 2013.
formation of isolated networks as well as load loss were taken [13] E. Bompard, D. Wu, and F. Xue, “Structural vulnerability of
power systems: A topological approach,” Electric Power Systems
into account to calculate severity of damage. The performance Research, vol. 81, no. 7, pp. 1334 – 1340, 2011. [Online]. Available:
comparison of two different attack strategies was made based http://www.sciencedirect.com/science/article/pii/S0378779611000332
on failure of number of grid components. It was observed [14] W. Wang, Q. Cai, Y. Sun, and H. He, “Risk-aware attacks and catas-
that preserving both the electrical features and topological trophic cascading failures in us power grid,” in Global Telecommunica-
information of grid can assist in selecting most vulnerable tions Conference (GLOBECOM 2011), 2011 IEEE. IEEE, 2011, pp.
1–6.
components in cascading failures. Thus, for both test cases,
[15] M. Schläpfer and J. L. Shapiro, “Analyzing failure propagation in
clustering-based strategy was more effective than traditional complex engineering networks,” Lecture Notes of the Institute for Com-
load based strategy in selecting the victim sets for initiating puter Sciences, Social Informatics and Telecommunications Engineering,
an attack to cause the cascading failure. vol. 5, pp. 2127–2138, 2009.
[16] J.-W. Wang and L.-L. Rong, “Cascade-based attack vulnerability on the
R EFERENCES us power grid,” Safety Science, vol. 47, no. 10, pp. 1332–1336, 2009.
[17] S. Jonnavithula and R. Billinton, “Topological analysis in bulk power
[1] U. S. Department of Energy, “Smart grid: An introduciton,” [Online] system reliability evaluation,” Power Systems, IEEE Transactions on,
,avaliable:https://www.smartgrid.gov/the smart grid/smart grid.html. vol. 12, no. 1, pp. 456–463, 1997.
[2] P. Pourbeik, P. S. Kundur, and C. W. Taylor, “The anatomy of a power
grid blackout,” IEEE Power and Energy Magazine, vol. 4, no. 5, pp. [18] I. Dobson, B. A. Carreras, V. E. Lynch, and D. E. Newman, “Complex
22–29, 2006. systems analysis of series of blackouts: Cascading failure, critical points,
[3] Y. Tang, G. Bu, and J. Yi, “Analysis and lessons of the blackout in indian and self-organization,” Chaos: An Interdisciplinary Journal of Nonlinear
power grid on july 30 and 31, 2012,” in Zhongguo Dianji Gongcheng Science, vol. 17, no. 2, p. 026103, 2007.
Xuebao(Proceedings of the Chinese Society of Electrical Engineering), [19] J. Song, E. Cotilla-Sanchez, G. Ghanavati, and P. D. Hines, “Dy-
vol. 32, no. 25. Chinese Society for Electrical Engineering, 2012, pp. namic modeling of cascading failure in power systems,” arXiv preprint
167–174. arXiv:1411.3990, 2014.
[4] J. Yan, H. He, and Y. Sun, “Integrated security analysis on cascading
failure in complex networks,” Information Forensics and Security, IEEE [20] P. Crucitti, V. Latora, M. Marchiori, and A. Rapisarda, “Error and attack
Transactions on, vol. 9, no. 3, pp. 451–463, 2014. tolerance of complex networks,” Physica A: Statistical Mechanics and
[5] L. Wehenkel, “Machine-learning approaches to power-system security its Applications, vol. 340, no. 1, pp. 388–394, 2004.
assessment,” IEEE Intelligent Systems, no. 5, pp. 60–72, 1997. [21] R. Kinney, P. Crucitti, R. Albert, and V. Latora, “Modeling cascading
[6] V. Golovko, L. U. Vaitsekhovich, P. Kochurko, U. S. Rubanau et al., failures in the north american power grid,” The European Physical
“Dimensionality reduction and attack recognition using neural network Journal B-Condensed Matter and Complex Systems, vol. 46, no. 1, pp.
approaches,” in Neural Networks, 2007. IJCNN 2007. International Joint 101–107, 2005.
Conference on. IEEE, 2007, pp. 2734–2739.
[7] M. Boudour and A. Hellal, “Combined use of unsupervised and super- [22] K. Wagstaff, C. Cardie, S. Rogers, S. Schrödl et al., “Constrained k-
vised learning for large scale power system static security mapping,” in means clustering with background knowledge,” in ICML, vol. 1, 2001,
Industrial Electronics, 2004 IEEE International Symposium on, vol. 2. pp. 577–584.
IEEE, 2004, pp. 1321–1326. [23] T. Kohonen, “The self-organizing map,” Proceedings of the IEEE, vol. 9,
[8] S. Khaitan and D. McCalley, “System topology based identification of pp. 1464–1479, 2007.
high risk nk contingencies,” Iowa State University, 2006.
[24] I. T. Institute, “Illinois center for a smarter electric grid (icseg),” http://
[9] M. Vaiman, K. Bell, Y. Chen, B. Chowdhury, I. Dobson, P. Hines, M. Pa-
publish.illinois.edu/smartergrid/ieee-39-bus-system/, 2013, [Online; ac-
pic, S. Miller, and P. Zhang, “Risk assessment of cascading outages:
cessed 03-Nov-2015].
Methodologies and challenges,” Power Systems, IEEE Transactions on,
vol. 27, no. 2, pp. 631–641, 2012. [25] R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas, “Mat-
[10] R. Albert, I. Albert, and G. L. Nakarado, “Structural vulnerability of power: Steady-state operations, planning, and analysis tools for power
the north american power grid,” Physical review E, vol. 69, no. 2, p. systems research and education,” Power Systems, IEEE Transactions on,
025103, 2004. vol. 26, no. 1, pp. 12–19, 2011.

2016 International Joint Conference on Neural Networks (IJCNN) 2737

You might also like