Professional Documents
Culture Documents
CrossMark
View Export
Online Citation
AFFILIATIONS
1
Associated Laboratory for Computing and Applied Mathematics, National Institute for Space Research, Sao José dos Campos,
SP 12243-010, Brazil
2
Luxembourg Centre for Systems Biomedicine, University of Luxembourg, Belvaux L-4367, Luxembourg
3
Institute of Science and Technology, Federal University of Sao Paulo, Sao José dos Campos, SP 12247-014, Brazil
a)
Author to whom correspondence should be addressed: jussara.dias@inpe.br
ABSTRACT
Interconnected systems with critical infrastructures can be affected by small failures that may trigger a large-scale cascade of failures, such
as blackouts in power grids. Vulnerability indices provide quantitative measures of a network resilience to component failures, assessing the
break of information or energy flow in a system. Here, we focus on a network vulnerability analysis, that is, indices based solely on the network
Blackouts are cascading outages that start in vulnerable compo- as well as jeopardize the safety of consumers. Small failures in
nents of a power grid. This paper studies the vulnerability of secondary transmission lines or low-power generators can cause
power grids from a structural point of view. The power-grid struc- subsequent failures that can trigger a cascade of failures resulting in
ture can be represented as a complex network in which centrality a blackout. As nonlinear phenomena, blackouts are both challenging
measures can be used to quantitatively measure the importance to predict and mitigate once the cascade has started. Decentralized
of an edge (transmission line) in the energy flow of the system. control strategies, for example, can mitigate blackouts by improv-
We evaluate the use of three centrality measures, as well as a ing the system stability and suppressing perturbations that could
combined index, for the vulnerability analysis of real-world and potentially lead to cascades.1–3 Another viable alternative, which we
randomly generated power grids. A modified efficiency measure explore in this paper, is the use of robustness assessment tools to
assesses the drop in network performance after simulations of guide the design of power grids that are deliberately resilient to
successive failures of transmission lines. Since this modified effi- the propagation of cascading failures4,5—a pressing problem as new
ciency metric implicitly accounts for the power flow distribution grid extension strategies are considered to accommodate distributed
in the grid, we expect that our framework can be used to pro- power generation.6
vide a more accurate analysis of the network vulnerability to Robustness assessment tools for power grids can be classi-
out-of-operation transmission lines. fied into two categories: (1) network analysis, which focuses on the
network structure describing the interconnections between gener-
ators and consumers;7–9 and (2) dynamical analysis, which models
I. INTRODUCTION the power flow through the grid, the electrical and thermal capac-
Electrical blackouts are extreme events that affect the entire ity of the system components, and the synchronization dynamics
society. They can suddenly lead to large economic consequences between generators and loads.10–12 Although dynamical analysis can
provide a more accurate description of the power-grid dynamics, and established power-grid benchmarks. Moreover, we show that
it is also more dependent on the validity of the modeling assump- the network efficiency is substantially more vulnerable to attacks on
tions and sensitive to the considered dynamical parameters.13,14 edges that are highly central to the system’s power flow distribution
In particular, previous works have shown that different modeling (e.g., using the current-flow betweenness centrality), as compared
assumptions can lead to the formation of distinct, possibly larger, to attack strategies based on other centrality measures in network
cascades.15 On the other hand, network analysis is only based on a science (e.g., disconnected component centrality).
very reliable representation of the network structure and other static This paper is organized as follows. Section II revises complex
power grid specifications (e.g., nominal power and transmission line network theory and centrality measures investigated in this work.
capacities).9 Section III presents the methodology to assess the power-grid vul-
The robustness of an interconnected system can be assessed nerability under different attack strategies. Numerical results are
by quantifiers known as network vulnerability indices.16,17 Defined presented and discussed in Sec. IV, while Sec. V concludes this work
as the system’s susceptibility to damage, vulnerability indices quan- by summarizing the main results and future research directions.
tify the extent to which a system is affected by an adverse sit-
uation, including environmental factors and human-based attack
strategies. For instance, vulnerability indices have been designed to II. COMPLEX NETWORK THEORY
measure the robustness of a power grid to random and targeted A. Graph definitions
attacks,18–20 with many techniques being based on complex network
theory.8,9,21,22 Network analysis of critical infrastructure systems, like Complex network theory refers to graphs with a non-trivial
power grids, provides a simplified framework to identify and pre- structure representing complex relationships, such as biological,
dict potential vulnerable components (nodes and edges) in these neuronal, social, communications, and energy delivery networks.42
systems. Based solely on structural data of the grid,23,24 previous A complex network can be represented as a graph defined by
works showed that it is possible to mitigate widespread outages G = {V, E}, where V = {1, . . . , n} represents the set of nodes and
caused by terrorist attacks25 and extreme weather events.26,27 Recent E ⊆ V × V represents the set of edges (i, j) ∈ E.
works have then provided a more reliable analysis of the power-grid Let A ∈ {0, 1}n×n be the adjacency matrix of an unweighted
vulnerability by incorporating other static (line impedance, nomi- graph G; i.e., Aij = 1 if i, j ∈ E and Aij = 0 otherwise. The
nal power) and dynamic (power flow) characteristics of the power Laplacian matrix of a graph G is defined by L = D − A, where
grid.9,28,29 D = diag(d 1 , . . . , dn ) is the degree matrix given by the node degrees
the network information flow, being defined by To model cascade propagation in power grids, centrality mea-
sures should not only reflect the power grid structure but also the
X σkl (i, j) underlying energy flow in these systems.50,51 Accordingly, different
B(i, j) = , (1) types of variations and generalizations of centrality measures have
σkl
k,l∈V been proposed for vulnerability analysis, in which the most promi-
nent ones are the betweenness current flow, spanning trees, and
where σkl (i, j) is the number of shortest paths from node k to l that disconnected component measures. These centrality measures are
pass through edge (i, j) and σkl is the number of all shortest paths defined as follows.
between k and l.
Betweenness centrality is widely used in the literature for
robustness analyses,44 including applications in many disciplines, 1. Current-flow betweenness centrality
such as social,45 psychological,46 and infrastructure networks.20 Vari- The standard betweenness centrality quantifies the information
ations of this measure, such as the relative betweenness centrality,47 flow in the network based only on the shortest paths between nodes.
can quantify the importance of an edge with respect to the impor- However, in power transmission networks, the current flow (as well
tance of its end-nodes. This measure can also be extended to mea- as the power flow) is not only transmitted through the shortest path,
sure the influence of a team or a group (i.e., a subset of nodes) but through all connected components between two given nodes,
in social networks48 and assess critical components in multiplex prioritizing paths of smaller resistance. Therefore, in the context of
networks, such as cyber-physical systems.49 power grids, it is more appropriate to implicitly model the current
FIG. 2. Network efficiency as a function of the number of edges removed for different attack strategies in IEEE benchmark systems: (a) IEEE-300. (b) IEEE-118. (c) IEEE-57.
Edges are successively removed in order of importance according to the centrality measures: current-flow betweenness, disconnected components, spanning tree, and
structural index. Edges are incrementally removed until 20% of the total number of edges is removed.
flow into the structural analysis of such networks,52 as formalized by pairs (s, d),
the current-flow betweenness centrality measure.53
F(s,d)
P
Let each transmission line (edge) be represented as a resistor, CB(i, j) =
s<d ij
. (4)
1
assigned with a unit value for simplification purposes.54 Consider a 2
n(n − 1)
source node s for the input current and another target node d for the
output current. The current flow between a source-target pair (s, d) Note that this centrality measure is equivalent to the notion
that passes through an edge (i, j) is given by53 of random-walk betweenness centrality (for a large number of
random-walk realizations),55 which provides a more computation-
FIG. 3. Node degree distribution of IEEE benchmark systems: (a) IEEE-300. (b) IEEE-118. (c) IEEE-57. The inset plot shows the graph corresponding to each power-grid
benchmark.
FIG. 4. Node degree distribution of randomly generated power grids: (a) Distribution of a single random network realization. (b) Distribution over 100 random network
realizations.
where ρ(i, j) is the number of nodes in the largest connected com- where, in what follows, we set the weights as wi = 1 (i = 1, 2, 3) for
ponent of the graph G = {V, E\(i, j)} after the removal of an edge simplification purposes. We choose a geometric mean to normalize
(i, j). Consequently, after the edge removal, the smaller the largest its terms, and this makes it possible to compare metrics at any scale.
V(i, j) be the network vulnerability to the removal of the edge (i, j), For power grids, vulnerability is also related to a drop in the
defined as9,59,60 efficiency of the system’s energy transmission under disturbing pro-
cesses that causes the removal of an edge (a transmission line) or the
ξ − ξ(i, j) isolation of a node (a generator or load).22,61,62 Consequently, effi-
V(i, j) = , (8)
ξ ciency measures can be used to identify vulnerable components that
can potentially trigger a cascade of failures and blackouts.59 Among
where ξ and ξ(i, j) represent a centrality measure computed for the several definitions of efficiency for complex networks,63 consider the
corresponding graphs before and after the removal of the edge (i, j), following one based on the average shortest distance between any
respectively. Note that we focus on edge attacks in this work because pair of nodes:8,64,65
transmission lines represent a relatively easy target to destructive
agents or severe weather events (e.g., strong winds, atmospheric dis-
1 X 1
charges, or wildfires) compared to other operational components, Ed = . (9)
such as generators and substations (nodes). N(N − 1) i6=j d(i, j)
Although the measure (9) has been applied to assess the vul- TABLE I. IEEE benchmark systems.
nerability to cascades in synthetic and real-world power grids,66,67 it
assumes that energy flows only through the shortest path between Benchmark Nodes Edges Average degree
any two nodes. For the same reasons stated in Sec. II, the energy
IEEE-57 57 78 2.74
flow in power grids is more appropriately represented by all paths
IEEE-118 118 179 3.03
between any two nodes, weighted according to their resistance.
IEEE-300 300 409 2.73
Therefore, for the vulnerability analysis of power grids, here, we con-
sider the modified measure (9) based on the resistance distance R(i, j)
between any two nodes rather than the geodesic distance d(i, j),68
1 X 1
Er = , (10) Among the evaluated measures, edge attacks based on current-
N(N − 1) i6=j R(i, j) flow betweenness centrality show the largest decrease in network
efficiency in all benchmark systems compared to other centrality
where R(i, j) is conceptually related to the admittance matrix of a measures. Network efficiency drops to around 6% of the nominal
power system and can be computed using the Laplacian matrix as efficiency (under no attacks) by removing only 10% of the total
follows:69 number of edges ranked according to the current-flow betweenness
det L(i, j) centrality, whereas other centrality measures require 20% or more
R(i, j) = . (11)
det L(i) attacks to reach the same level of network efficiency.
These results show that power grids are highly vulnerable to
Note that, for undirected unweighted graphs, the resistance dis- attacks on important edges ranked with current-flow betweenness
tance R(i, j) between two nodes i and j connected by an edge (i, j) is centrality. However, for the first few attacks (less than 5%), simula-
equivalent to the spanning tree centrality ST(i, j) of this edge. tions also show that power grids are more vulnerable to attacks on
edges ranked with disconnected component centrality compared to
IV. RESULTS AND DISCUSSION the current-flow betweenness centrality and other measures. This is
often a consequence of a few bridge edges interconnecting the net-
We investigate the vulnerability of power grids to different
work to a branch of N ≥ 2 nodes containing “dead ends” [see edges
edge attack strategies. The relation between the network efficiency
1 and 2 in Fig. 1(b)]. After these few bridge edges are removed, cen-
especially, its node degree distribution following exponential decay- distribution in the grid. In fact, both the network efficiency measure
ing tail. (10) and the current-flow betweenness centrality (4) depend on the
Figure 5 presents the network vulnerability of random power power flow distribution and the resistance distances (11) between
grids under different attack strategies. Overall, the same qualitative any two nodes—which might justify the higher vulnerability to
results observed in Fig. 2 are observed for the random networks. attacks on important edges with respect to current-flow between-
The network efficiency is considerably more vulnerable to attacks ness centrality compared to other measures. However, the relation
on the 5%–10% most important edges with respect to current-flow between the network efficiency (10) and the centrality measure is not
betweenness centrality and also highly vulnerable to the attacks on trivial and still deserves further investigation. For instance, note that,
the 3%–5% most important edges with respect to the disconnected even though the spanning tree centrality is computed using the same
component centrality (but showing low sensitivity for successive expression (6) as the resistance distance (11), all power grids showed
edge attacks). Power grids (real and synthetic) are less vulnera- low sensitivity to attacks on central edges with respect to spanning
ble to attacks on important edges ranked according to spanning centrality. We highlight that, although our research was designed
tree centrality. Finally, the structural index shows an average result with the power grid application in mind, the centrality and network
between current-flow betweenness and disconnected component efficiency measures used in our work are relevant to many other
centrality measures, suggesting its potential use as a representative infrastructure networks, including water and gas supply networks
vulnerability index for both measures. as well as multi-layer energy delivery systems. Potentially, other
applications could benefit from the framework developed here.
The dependence between the network efficiency and its vul-
V. CONCLUSIONS nerability to edges that are more important to the power flow
The vulnerability analysis of critical systems, such as power distribution shows promising results for future studies on network
grids, is necessary to support decision-making policies for mitigat- design and expansion. The studied vulnerability indices, especially
ing outages and the design of more resilient systems. The proposed those implicitly related to the power flow distribution in the grid,
methodology for network vulnerability analysis networks locates, may be incorporated in the co-design of power grids that simultane-
in power-grid networks, transmission lines that are vulnerable to ously optimize the system’s power flow and maximize the network
adversarial attacks and extreme weather events (such as fires, thun- resilience (redundancy) to edge attacks and failures—while also
derstorms, etc.). Such events are geographically localized; therefore, considering the many geographic and costs constraints involved.
their effects can be mitigated if vulnerable transmission lines can be This paper is, however, a pilot study in this direction, and
This research was also supported by the São Paulo Research Foun- 18
P. Crucitti, V. Latora, and M. Marchiori, “A topological analysis of the Italian
dation (FAPESP), Brazil (Grant Nos. 2015/50122-0, DFG-IRTG electric power grid,” Phys. A: Stat. Mech. Appl. 338, 92–97 (2004).
19
1740/2, and 2018/03211-6). M. Rosas-Casals, S. Valverde, and R. V. Solé, “Topological vulnerability of
the European power grid under errors and attacks,” Int. J. Bifurc. Chaos 17,
2465–2475 (2007).
AUTHOR DECLARATIONS 20
M. A. S. Monfared, M. Jalili, and Z. Alipour, “Topology and vulnerability of the
Iranian power grid,” Phys. A: Stat. Mech. Appl. 406, 24–33 (2014).
Conflict of Interest 21
S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang, “Complex
The authors have no conflicts to disclose. networks: Structure and dynamics,” Phys. Rep. 424, 175–308 (2006).
22
M. Ouyang, Z. Pan, L. Hong, and L. Zhao, “Correlation analysis of different
vulnerability metrics on power grids,” Phys. A: Stat. Mech. Appl. 396, 204–211
Author Contributions (2014).
23
Jussara Dias: Methodology (equal). Arthur N. Montanari: M. Ouyang and K. Yang, “Does topological information matter for power grid
vulnerability?,” Chaos 24, 043121 (2014).
Methodology (equal). Elbert E. N. Macau: Methodology (equal). 24
A. A. Tahirovic, D. Angeli, and G. Strbac, “A complex network approach to
power system vulnerability analysis based on rebalance based flow centrality,”
DATA AVAILABILITY in 2021 IEEE Power & Energy Society General Meeting (PESGM) (IEEE, 2021),
pp. 01–05.
Data sharing is not applicable to this article as no new data were 25
B. Xie, X. Tian, L. Kong, and W. Chen, “The vulnerability of the power grid
created or analyzed in this study. structure: A system analysis based on complex network theory,” Sensors 21, 7097
(2021).
26
R. Piccinelli and E. Krausmann, Space Weather and Power Grids: Vulnerability
REFERENCES Assessment (Publications Office of the European Union, 2014).
1 27
L. Bakule, “Decentralized control: An overview,” IFAC Proc. Vols. 40, 39–48 A. M. Karpachevskiy, O. G. Filippova, and P. E. Kargashin, “GIS-analysis of the
(2007). Ural power grid vulnerability to the impact of sleet and wind,” Geogr. Environ.
2
N. Xue and A. Chakrabortty, “Control inversion: A clustering-based method for Sustain. 15, 14–25 (2022).
28
distributed wide-area control of power systems,” IEEE Trans. Control Netw. Syst. I. Adebayo and Y. Sun, “New approaches for the identification of influential and
6, 937–949 (2018). critical nodes in an electric grid,” Arch. Electr. Eng. 71, 671–686 (2022).
3 29
M. Frasca and L. V. Gambuzza, “Control of cascading failures in dynamical F. Hu, L. Chen, and J. Chen, “Robustness evaluation of complex power grids
models of power grids,” Chaos, Solitons Fractals 153, 111460 (2021). containing renewable energy,” Int. J. Electr. Power Energy Syst. 132, 107187
4
P. Crucitti, V. Latora, and M. Marchiori, “Model for cascading failures in (2021).
45 59
A. Landherr, B. Friedl, and J. Heidemann, “A critical review of centrality V. Latora and M. Marchiori, “Vulnerability and protection of infrastructure
measures in social networks,” Bus. Inf. Syst. Eng. 2, 371–385 (2010). networks,” Phys. Rev. E 71, 015103 (2005).
46 60
L. F. Bringmann, T. Elmer, S. Epskamp, R. W. Krause, D. Schoch, M. Wich- V. Gol’dshtein, G. Koganov, and G. I. Surdutovich, “Vulnerability and hierarchy
ers, J. T. Wigman, and E. Snippe, “What do centrality measures measure in of complex networks,” arXiv:cond-mat/0409298 (2004).
61
psychological networks?,” J. Abnorm. Psychol. 128, 892 (2019). R. Baldick, B. Chowdhury, I. Dobson, Z. Dong, B. Gou, D. Hawkins, Z. Huang,
47
D. Vukičević, R. Škrekovski, and A. Tepeh, “Relative edge betweenness central- M. Joung, J. Kim, D. Kirschen, and S. Lee, “Vulnerability assessment for cascading
ity,” Ars Math. Contemp. 12, 261–270 (2016). failures in electric power systems,” in 2009 IEEE/PES Power Systems Conference
48
J. Lee, Y. Lee, S. M. Oh, and B. Kahng, “Betweenness centrality of teams in social and Exposition (IEEE, 2009), pp. 1–9.
62
networks,” Chaos 31, 061108 (2021). E. Bompard, R. Napoli, and F. Xue, “Analysis of structural vulnerabilities in
49
A. Umunnakwe, A. Sahu, M. R. Narimani, K. Davis, and S. Zonouz, “Cyber- power transmission grids,” Int. J. Crit. Infrastruct. Prot. 2, 5–12 (2009).
63
physical component ranking for risk sensitivity analysis using betweenness cen- P. Crucitti, V. Latora, and M. Marchiori, “Locating critical lines in high-voltage
trality,” IET Cyber-Phys. Syst.: Theory Appl. 6, 139–150 (2021). electrical power grids,” Fluct. Noise Lett. 5, L201–L208 (2005).
50 64
A. Nasiruzzaman, H. Pota, and M. Mahmud, “Application of centrality mea- A. Dwivedi, X. Yu, and P. Sokolowski, “Identifying vulnerable lines in a power
sures of complex network framework in power grid,” in IECON 2011—37th network using complex network theory,” in 2009 IEEE International Symposium
Annual Conference of the IEEE Industrial Electronics Society (IEEE, 2011), pp. on Industrial Electronics (IEEE, 2009), pp. 18–23.
65
4660–4665. S. Arianos, E. Bompard, A. Carbone, and F. Xue, “Power grid vulnerability: A
51
A. Albarakati and M. Bikdash, “Vulnerabilities of power grid due to line failures complex network approach,” Chaos 19, 013119 (2009).
66
based on power traffic centrality of the line graph,” in SoutheastCon 2018 (IEEE, Y. Guo, J. Cao, R. Duan, and S. Li, “Power grid vulnerability identifying based
2018), pp. 1–7. on complex network theory,” in 2012 Second International Conference on Instru-
52
E. Bozzo and M. Franceschet, “Resistance distance, closeness, and between- mentation, Measurement, Computer, Communication and Control (IEEE, 2012),
ness,” Soc. Netw. 35, 460–469 (2013). pp. 474–477.
53 67
U. Brandes and D. Fleischer, “Centrality measures based on current flow,” in R. Kinney, P. Crucitti, R. Albert, and V. Latora, “Modeling cascading failures in
Annual Symposium on Theoretical Aspects of Computer Science (Springer, 2005), the North American power grid,” Eur. Phys. J. B-Condens. Matter Complex Syst.
pp. 533–544. 46, 101–107 (2005).
54 68
If other power grid specifications are available, such as the admittance of the M. Li, S. Zhou, G. Chen, W. Lin, and Q. Zhou, “Novel resistive dis-
transmission line, the current-flow betweenness centrality can be extended to tance descriptors on complex network,” IEEE Access 10, 14548–14563
accommodate these data. (2022).
55 69
M. E. Newman, “A measure of betweenness centrality based on random walks,” V. S. S. Vos, “Methods for determining the effective resistance,” master’s thesis
Soc. Netw. 27, 39–54 (2005). (Mathematisch Instituut Universiteit Leiden, 2016).
56 70
A. S. Teixeira, P. T. Monteiro, J. A. Carriço, M. Ramirez, and A. P. Francisco, B. Schäfer, T. Pesch, D. Manik, J. Gollenstede, G. Lin, H.-P. Beck, D. Witthaut,
“Not seeing the forest for the trees: Size of the minimum spanning trees (MSTs) and M. Timme, “Understanding Braess’ paradox in power grids,” Nat. Commun.