Professional Documents
Culture Documents
Abstract—The modern electric power grid has become highly for initiating an attack. Because of the interconnected structure
integrated in order to increase reliability of power transmission of modern grid, the result of an attack can trigger a cascading
from the generating units to end consumers. This integrated failure or a blackout as it allows the local failures to propagate
nature and its upgrade toward an intelligent smart grid make
the power grid vulnerable when facing cyber or physical attacks through out the system. Predicting the probability of the
as well as intentional attacks. Therefore, determining the most occurrence of blackout in large interconnected power system is
vulnerable components (e.g., buses or generators) is critically difficult and the socio-economic impact is devastating, e.g., the
important for power grid defense. In this paper, a new definition 2003 Northeast blackout [2] and Indian power grid blackout in
of load is proposed by taking power flow into consideration in 2012 [3]. Therefore, there is growing awareness towards the
comparison with the load definition based on degree or network
connectivity. Unsupervised learning techniques (e.g., K-means power grid security from engineering societies, government,
algorithm and self-organizing map (SOM)) are introduced to and power industry.
cluster the nodes (i.e., buses) in IEEE-39 bus and IEEE-57 Research work has been conducted on security of complex
bus benchmarks. Then most vulnerable node in each cluster power system network against failure of grid components and
is determined based on their load information to form initial intrusions from attackers. An extended topological approach
victim set. We use percentage of failure (PoF) to compare
the performance of clustering based approach and traditional was proposed for assessing the vulnerability of power grid
load based approach during cascading failure process. With the components during cascading failures with limited knowledge
simulation results, the unsupervised learning (clustering based) about dynamics of power system information [4]. Transient
approaches are more efficient in finding the most vulnerable stability and voltage security assessment using machine learn-
nodes and our proposed definition of load is relatively useful in ing was studied in [5]. Random sampling techniques were
studying power grid security.
considered for screening all the operating situations of power
Index Terms—power grid security, cascading failures, compu- system. The use of modular neural networks and multilayer
tational intelligence, unsupervised learning, self-organizing map perceptrons (MLP) helps to detect and recognize intrusions in
(SOM), and K-means algorithm. computer networks with higher accuracy [6]. In [7] combi-
nation of unsupervised and supervised learning was used for
I. I NTRODUCTION online security evaluation of N − 1 contingency. Generally,
With thousands of substations and interconnected transmis- higher order contingency is one of the major contributions to
sion lines, the modern electric power grid is regarded as one cascading failures and the identification of the contingency set
of the most complex network. U.S. power grid as of today is the foremost step for studying power grid security [8]. The
consists of more than 9,200 electric generating units with application of well-known higher order contingency (N − k)
more than 1 million Mega Watts of generating capacity which used for searching k critical components has the drawback
are connected to more than 300,000 miles of transmission of high computational and analysis cost. To overcome the
lines [1]. With purpose of adding resiliency to the existing complexity for assessing all N − k contingency combinations,
electric power system, information and communication tech- risk analysis methodologies like cluster-based approach, enu-
nologies (ICTs) are introduced and electric grid are becoming meration of likely cascade paths, uniform sampling and bulk
smarter these days. With the help of ICT network, smart analysis method are discussed [9]. During study of cascading
grid provides better situational awareness during emergencies failure in power grid, it has been recognized that topological
such as storms, earthquakes and terrorist attacks. Due to the structure of power grid has key impact in propagation of
large amount of information being exchanged in the network, cascading events [10], [11]. Utilization of spatial features of
an attacker with enough knowledge of the power grid can electric power grid can help to analyze the electrical system
penetrate into the network and find the vulnerable components behaviour in cascading failure scenarios [12].
978-1-5090-0620-5/16/$31.00 2016
c IEEE 2730
In order to study the cascading process for power grid A. Definition of load based on network connectivity
security, one needs to define load associated with buses (nodes) First, we define load of a particular node based on degree
so that it helps to keep track of which nodes are knocked down (connectivity). Previous work on cascading failures of high
in successive time steps. Load of a particular node in complex level power grid structure have suggested that load of a par-
network can be defined as overall transmission capabilities, ticular node is related to the connectivity with/of its immediate
which is also referred to as extended betweenness of that neighbours [16], [17]. In this model, we define load of a
node [13]. A new model was proposed to define load of a particular node as product of its degree and sum of degree
node as product of its own degree and sum of degree of its of its neighbouring nodes. Let kv be the degree of a particular
immediate neighbours [12], [14]. A degradation model based node, the initial load, Lv is defined by
on degree was proposed to evaluate the stress on a particular
node due to failure of neighbouring nodes. This stress on Lv = kv ∗ km , m ∈ N br(v) (1)
node was supposed to decrease its life expectancy analogous
where N br(v) is the set of neighbouring nodes of a particular
to “wearout” process [15]. However, these definitions of load
node v. If one or more nodes are knocked down, they are
are based on network connectivity and ignore the power flow
assumed to be out of service and the load flowing through
governed by basic circuit laws in power system. So, these
that node gets proportionally redistributed to the neighbouring
definitions may not be that realistic and useful from power
nodes. So, the nearby nodes must take up the slack for the
system viewpoint as they do not take power flow analysis into
failed node. Hence the load gets redistributed according to the
consideration.
model proposed in [16] and the load of immediate neighbours
The aforementioned literature mainly focus in complex is updated with some additional load as defined by (2) and
network theories and have defined load of node based on (3).
degree or network connectivity only. In actual power system, Lm
it is not always true that a node with higher connection takes δm = ∗ Lv (2)
Lm
greater portion of load. With these considerations, we propose
a new definition of load by taking fundamental laws of power Lm = Lm + δm (3)
flow into consideration. Two unsupervised learning algorithms where Lv is the initial lode of failure node, δm is the additional
(self-organizing map (SOM) and K-means) are introduced in load assigned to neighbouring nodes due to failure of node
this paper for searching the initial victim by preserving the v. This may lead to a new situation that these neighbouring
topological features of power grid. We perform cascading nodes will exceed their capacity and thus result in new failure.
failure experiments on IEEE-39 bus system and IEEE-57 bus If the load lost that is to be reabsorbed is large, the failure
system with the traditional load-based and clustering-based propagation will continue and spread over the network and
approaches. The performance comparison of different attack it continues until all the nodes are compromised which is
strategies is conducted by evaluating severity of cascading referred as “cascading failure” in literature.
failures in terms of total number of nodes failed after victim
nodes are knocked down. In addition, we compare the phe- B. Definition of load based on power flow
nomenon of cascading failure in power system benchmark for In second model, we define load of a particular node as
both definition of load, i.e., load defined based on network the burden of total MW that it carries during its healthy state.
connectivity and load defined by taking power flow into When electric power from the generating units is delivered to
consideration. end consumers, it can travel through different routes through
The rest of this paper is organised as follows: Section different buses (nodes). The node may have some MW of
II introduces the system model and metrics used in our real load, or a generator, or it may be simply a transmission
work. Section III describes our proposed work which includes path delivering power to other substations. Assume D is the
traditional load-based attack strategy and our proposed cluster- demand present at a particular node v, I1 , I2 , ..., Ik be the
ing approach using unsupervised learning. Simulation results amount of power flowing into node v from k neighbouring
and performance comparison of different attack strategies are nodes and O1 , O2 , ..., Om be the amount of power flowing
shown in Section IV. Section V discusses about the compar- out from node v to m neighbouring nodes. An initial load
ison of failure propagation by defining load based on power that a particular node carries during normal operation of grid
flow information and network connectivity. Finally Section V is defined by (4). Information regarding power flowing into the
gives the conclusion of the work. node I, flowing out of node O, and demand in that node D
can be obtained by simulating the benchmark in PowerWorld
simulator and Matpower. The power flow is presented in Fig.
II. S YSTEM MODEL AND EVALUATION METRICS 1 and the load definition is provided as,
k
m
In this section, we introduce two different models of the L(v) = Ii = Oj + D, v∈n (4)
i=1 j=1
power grid to define the load of the node and the attack model
for cascading failure to occur. where v is a given node of a system with n nodes.
Following [20], we define capacity C(v) of each node which 1) K-means: K-means clustering (MacQueen, 1967) is a
is directly proportional to its initial load L(v) that it carries method commonly used to partition n data set into k groups
in a healthy network as, in which each data belongs to the cluster with nearest mean
[22]. It is one of the simplest unsupervised learning algorithms
C(v) = αL(v), v ∈ n (5) for solving the clustering problem. The procedure follows a
simple way to classify given set of data to certain number of
where α ≥ 1 is the system tolerance. Higher value of α means clusters fixed apriori. K-means algorithm attempts to find the
higher capability of node to resist perturbations. cluster centers so as to minimize the within-cluster sum of
At this moment, we are interested in identifying the most square (WCSS) distance. Simply, its objective is to minimize
critical components in the grid network from the cascading the following objective function,
failure perspective. So a new metric, Percentage of Failure
nj
k
(PoF), is investigated to evaluate the damage caused by the
failure of any grid components [12]. The PoF is defined as, J= |Vij − Cj |2 (7)
j=1 i=1
N
P oF = 1 − (6) where Vij is the ith input of j th cluster, Cj is the centroid
N of a particular cluster, k is the total number of clusters, and
where N is total number of nodes in system before attack and nj is the number of data set belonging to j th cluster. The
N is number of nodes survived after attack. algorithm behind this objective can be summarized as:
III. P ROPOSED ATTACK STRATEGIES Step 1. Initialization: Choose C1 , C2 , ..., Ck as initial cluster
centers. They represent the “temporary” means of the clusters.
The primary goal of this research is to analyze the cascading The dimension of initial centers is same as that of input vector.
failures during various multivictim attack strategies. We will
compare two different attack strategies in this section. We Step 2. Assignment: Each observation (data set) is assigned
discuss traditional load based attack strategy (Section III- to a closest cluster by calculating the squared Euclidean
A) and clustering-based attack strategy (Section III-B) and distance.
compare their performance. D = |V (t) − C(t)| (8)
0.8
attack is able to find the victim set with nodes carrying less
0.7
load but with greater impact than the traditional load based
0.6 strategy.
0.5 C. Power system model based on actual power flow
0.4 In this approach, we select the victim nodes based on the
0.3 load defined by equation (4). The power flow information was
obtained from PowerWorld and Matpower for 39 bus system
0.2
and 57 bus system respectively. After calculating the load of
0.1 each buses, attack was initiated by selecting victim set for both
0 traditional load-based and clustering-based strategy.
1 1.2 1.4 1.6 1.8 2 2.2
Tolerance (α) TABLE II. Cascading events for IEEE 39 bus system at tolerance of α
=1.25. The initial victim sets (nodes 6 and 39) are chosen according to the
(a) load ranking, i.e., load-based attack strategy. The load of these nodes are
IEEE 57 bus system simulated in Matlab calculated based on equation (4). Li denotes initial load of a node and C is
1 the capacity of node defined by, Ci =α Li
Load−based attack
0.9 Clustering−based attack Bus Initial load (Li ) Capacity (C) 1st 2nd
1.0 116.3 145.4 0.0 0.0
Percentage of Failure (PoF)
0.8
2.0 481.5 601.9 872.2 0.0
0.7 3.0 398.8 498.5 897.5 0.0
4.0 500.0 625.0 1274.2 0.0
0.6 5.0 482.8 603.5 769.0 0.0
6.0 910.0 1137.5 0.0 0.0
0.5
7.0 426.8 533.5 233.8 0.0
0.4 8.0 523.0 653.8 763.0 0.0
9.0 12.1 15.1 0.0 0.0
0.3 10.0 650.0 812.5 650.0 0.0
11.0 350.3 437.9 31.9 0.0
0.2 12.0 7.5 9.4 31.8 0.0
0.1 13.0 299.7 374.6 642.4 0.0
14.0 292.9 366.1 717.8 0.0
0 15.0 320.1 400.1 397.4 320.0
1 1.2 1.4 1.6 1.8 2 2.2
16.0 823.9 1029.9 822.7 808.8
Tolerance (α)
17.0 204.1 255.1 183.8 158.3
(b) 18.0 192.3 240.4 183.7 158.2
19.0 629.2 786.5 629.0 614.3
Fig. 3. Performance comparison of traditional load based and clustering 20.0 680.2 850.3 680.2 680.3
based attack. Higher PoF for given value of tolerance signifies more number of 21.0 604.6 755.8 604.2 604.4
failed components. For both benchmark system, the load of node is calculated 22.0 650.0 812.5 650.0 650.0
based on network connectivity. 23.0 601.3 751.6 601.4 601.4
24.0 353.8 442.3 353.9 353.8
25.0 538.3 672.9 538.3 224.0
and redistribution of load. Nodes 16 and 26 in grey colored 26.0 409.6 512.0 512.8 0.0
cells were knocked down to initiate an attack. These set of 27.0 281.9 352.4 372.9 0.0
nodes corresponds to the load based attack strategy. As these 28.0 347.5 434.4 347.8 206.0
29.0 824.8 1031.0 824.7 490.1
victim nodes are knocked down to initiate an attack, the 30.0 250.0 312.5 741.0 0.0
load carried by those victim nodes gets redistributed to their 31.0 571.3 714.1 9.2 9.2
immediate neighbors. Now the updated load is calculated using 32.0 650.0 812.5 650.0 0.0
33.0 632.0 790.0 632.0 617.1
equation (2) and compared with their capacity. If their updated 34.0 508.0 635.0 508.0 508.0
load is higher than capacity, i.e., if they are overloaded then 35.0 650.0 812.5 650.0 650.0
these nodes are again knocked down in next time steps. The 36.0 560.0 700.0 560.0 560.0
overloaded nodes in different time steps are represented by 37.0 540.0 675.0 540.0 224.3
38.0 830.0 1037.5 830.0 491.9
bold figures in table. 39.0 1116.3 1395.4 0.0 0.0
For clustering based approach, the mostly loaded nodes
from each cluster were selected to form the initial victim set. For traditional load-based strategy, nodes 6 and 39 are found
For 39 bus system it was found that node 16 and 2 are the to be most loaded for 39 bus system. Whereas for 57 bus
most loaded ones and in 57 bus system nodes 9, 13 and 12 are system, nodes 8, 1 and 12 are most loaded. These set of nodes
the most loaded. The load redistribution process and cascading are the initial victims which are knocked down to trigger a
0.7
0.7
0.6
0.6
0.5
0.5
0.4
0.4
0.3
0.3 0.2
0.2 0.1
0.1 0
1 1.5 2 2.5 3 3.5 4 4.5 1 2 3 4 5 6
Tolerance (α) Tolerance (α)
(a) (b)
Fig. 4. Performance comparison of traditional load based and clustering based attack. Higher PoF for given value of tolerance signifies more number of
failed components. For both benchmark system, the load of node is calculated based on actual power flow.
cascading event. For clustering based approach, the mostly of connection with its neighbours should take higher amount
loaded nodes from each cluster is selected to form the initial of load for delivery. Also the load redistribution after failure
victim set. Based on Fig. 2a, nodes 38 and 39 are selected of a parent node is limited to its immediate neighbours only.
from two different cluster for 39 bus system. Similarly for 57 But this is not always true in power system network because
bus system, nodes 8, 1 and 13 are selected as initial victim set the power flowing in the electric grid depends on demand at a
as shown in Fig. 2b. These nodes are marked with a red circle particular node, generating units in a node, and transmission
in clustering results of both benchmark system. However, for line parameters. For simplicity, the cascading phenomenon
IEEE-57 bus system, DC power flow was used in Matpower to in electric power grid can be explained based on network
update the branch flow after initiating an attack. The use of AC connectivity. However, the results are not supportive to study
power flow in this benchmark was limited due to convergence the real cascading event in power system as it ignores load
problem after some cascading time steps. loss, formation of isolated networks and system blackout.
To explain the cascading process in this model, we consider
load based attack in IEEE-39 bus system. Nodes 6 and 39 are
knocked down initially to initiate an attack. As these victim We studied IEEE-118 bus system with two initial victim
nodes are knocked down, the load carried by those victim nodes for cascading failures. During the simulation it was
nodes is redistributed according to basic circuit laws. Unlike observed that the system was able to reach final steady state
the previous model, we can observe that the load redistribution when simulated using network connectivity concept. On the
is not only limited to immediate neighbors and independent contrary, when the system was studied with the power flow
of initial load of nodes. The updated load of nodes are information in power system software (e.g., PowerWorld), it
calculated using branch flow information from PowerWorld. was unstable for even triggering an attack in the system. We
Next, the overloaded nodes are identified and knocked down tried to knock down nodes 69 and 80 (mostly loaded nodes
in successive time steps. The whole process is summarized in according to power flow information) in IEEE-118 bus system
table II. but there was blackout and system was unstable. Similarly, the
Finally, the number of survived components in steady state study of cascading events in IEEE-39 bus system with power
was evaluated and PoF was calculated using equation (6). Per- flow information (Figure 4a) shows a certain range of system
formance comparison in Fig. 4 suggests that clustering-based tolerance (1.75 to 2.5) where PoF is equal to 1. This represents
attack is more efficient than load-based attack in searching a particular situation in power system, i.e., a blackout where
of vulnerable components which can cause greater damage in the demand of surviving nodes was not fulfilled and system
power system benchmark. was unstable. Hence fundamental circuit laws governing the
power flow should be considered to mimic the real cascading
V. D ISCUSSION phenomenon during attack or failure of nodes. The proposed
The simulation of cascading failure for power system bench- load definition and load redistribution based on PowerWorld
mark using concept of network connectivity ignores the actual and Matpower provides realistic results including formation
power flowing through the buses. This concept assumes that in of islands and even blackout in power system benchmark to
any interconnected network, the nodes having greater number analyse the impact of cascading failure.