You are on page 1of 11

RESEARCH ARTICLE | MARCH 14 2023

Power-grid vulnerability and its relation with network


structure 
Jussara Dias  ; Arthur N. Montanari ; Elbert E. N. Macau

Chaos 33, 033122 (2023)


https://doi.org/10.1063/5.0137919

CrossMark

 
View Export
Online Citation

24 November 2023 14:25:46


Chaos ARTICLE scitation.org/journal/cha

Power-grid vulnerability and its relation with


network structure
Cite as: Chaos 33, 033122 (2023); doi: 10.1063/5.0137919
Submitted: 6 December 2022 · Accepted: 20 February 2023 ·
Published Online: 14 March 2023 View Online Export Citation CrossMark

Jussara Dias,1,a) Arthur N. Montanari,2 and Elbert E. N. Macau3

AFFILIATIONS
1
Associated Laboratory for Computing and Applied Mathematics, National Institute for Space Research, Sao José dos Campos,
SP 12243-010, Brazil
2
Luxembourg Centre for Systems Biomedicine, University of Luxembourg, Belvaux L-4367, Luxembourg
3
Institute of Science and Technology, Federal University of Sao Paulo, Sao José dos Campos, SP 12247-014, Brazil

a)
Author to whom correspondence should be addressed: jussara.dias@inpe.br

ABSTRACT
Interconnected systems with critical infrastructures can be affected by small failures that may trigger a large-scale cascade of failures, such
as blackouts in power grids. Vulnerability indices provide quantitative measures of a network resilience to component failures, assessing the
break of information or energy flow in a system. Here, we focus on a network vulnerability analysis, that is, indices based solely on the network

24 November 2023 14:25:46


structure and its static characteristics, which are reliably available for most complex networks. This work studies the structural connectivity
of power grids, assessing the main centrality measures in network science to identify vulnerable components (transmission lines or edges) to
attacks and failures. Specifically, we consider centrality measures that implicitly model the power flow distribution in power systems. This
framework allow us to show that the efficiency of the power flow in a grid can be highly sensitive to attacks on specific (central) edges.
Numerical results are presented for randomly generated power-grid models and established power-grid benchmarks, where we demonstrate
that the system’s energy efficiency is more vulnerable to attacks on edges that are central to the power flow distribution. We expect that the
vulnerability indices investigated in our work can be used to guide the design of structurally resilient power grids.
Published under an exclusive license by AIP Publishing. https://doi.org/10.1063/5.0137919

Blackouts are cascading outages that start in vulnerable compo- as well as jeopardize the safety of consumers. Small failures in
nents of a power grid. This paper studies the vulnerability of secondary transmission lines or low-power generators can cause
power grids from a structural point of view. The power-grid struc- subsequent failures that can trigger a cascade of failures resulting in
ture can be represented as a complex network in which centrality a blackout. As nonlinear phenomena, blackouts are both challenging
measures can be used to quantitatively measure the importance to predict and mitigate once the cascade has started. Decentralized
of an edge (transmission line) in the energy flow of the system. control strategies, for example, can mitigate blackouts by improv-
We evaluate the use of three centrality measures, as well as a ing the system stability and suppressing perturbations that could
combined index, for the vulnerability analysis of real-world and potentially lead to cascades.1–3 Another viable alternative, which we
randomly generated power grids. A modified efficiency measure explore in this paper, is the use of robustness assessment tools to
assesses the drop in network performance after simulations of guide the design of power grids that are deliberately resilient to
successive failures of transmission lines. Since this modified effi- the propagation of cascading failures4,5—a pressing problem as new
ciency metric implicitly accounts for the power flow distribution grid extension strategies are considered to accommodate distributed
in the grid, we expect that our framework can be used to pro- power generation.6
vide a more accurate analysis of the network vulnerability to Robustness assessment tools for power grids can be classi-
out-of-operation transmission lines. fied into two categories: (1) network analysis, which focuses on the
network structure describing the interconnections between gener-
ators and consumers;7–9 and (2) dynamical analysis, which models
I. INTRODUCTION the power flow through the grid, the electrical and thermal capac-
Electrical blackouts are extreme events that affect the entire ity of the system components, and the synchronization dynamics
society. They can suddenly lead to large economic consequences between generators and loads.10–12 Although dynamical analysis can

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-1


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

provide a more accurate description of the power-grid dynamics, and established power-grid benchmarks. Moreover, we show that
it is also more dependent on the validity of the modeling assump- the network efficiency is substantially more vulnerable to attacks on
tions and sensitive to the considered dynamical parameters.13,14 edges that are highly central to the system’s power flow distribution
In particular, previous works have shown that different modeling (e.g., using the current-flow betweenness centrality), as compared
assumptions can lead to the formation of distinct, possibly larger, to attack strategies based on other centrality measures in network
cascades.15 On the other hand, network analysis is only based on a science (e.g., disconnected component centrality).
very reliable representation of the network structure and other static This paper is organized as follows. Section II revises complex
power grid specifications (e.g., nominal power and transmission line network theory and centrality measures investigated in this work.
capacities).9 Section III presents the methodology to assess the power-grid vul-
The robustness of an interconnected system can be assessed nerability under different attack strategies. Numerical results are
by quantifiers known as network vulnerability indices.16,17 Defined presented and discussed in Sec. IV, while Sec. V concludes this work
as the system’s susceptibility to damage, vulnerability indices quan- by summarizing the main results and future research directions.
tify the extent to which a system is affected by an adverse sit-
uation, including environmental factors and human-based attack
strategies. For instance, vulnerability indices have been designed to II. COMPLEX NETWORK THEORY
measure the robustness of a power grid to random and targeted A. Graph definitions
attacks,18–20 with many techniques being based on complex network
theory.8,9,21,22 Network analysis of critical infrastructure systems, like Complex network theory refers to graphs with a non-trivial
power grids, provides a simplified framework to identify and pre- structure representing complex relationships, such as biological,
dict potential vulnerable components (nodes and edges) in these neuronal, social, communications, and energy delivery networks.42
systems. Based solely on structural data of the grid,23,24 previous A complex network can be represented as a graph defined by
works showed that it is possible to mitigate widespread outages G = {V, E}, where V = {1, . . . , n} represents the set of nodes and
caused by terrorist attacks25 and extreme weather events.26,27 Recent E ⊆ V × V represents the set of edges (i, j) ∈ E.
works have then provided a more reliable analysis of the power-grid Let A ∈ {0, 1}n×n be the adjacency matrix of an unweighted
vulnerability by incorporating other static (line impedance, nomi- graph G; i.e., Aij = 1 if i, j ∈ E and Aij = 0 otherwise. The
nal power) and dynamic (power flow) characteristics of the power Laplacian matrix of a graph G is defined by L = D − A, where
grid.9,28,29 D = diag(d 1 , . . . , dn ) is the degree matrix given by the node degrees

24 November 2023 14:25:46


di = j Aij (i.e., the number of edges linked to a node).
P
Complex network models, such as small-world30 and scale- 
free 31,32
networks, play a key role in assessing the robustness of differ- The geodesic distance d i, j is defined as the shortest path
ent types of network structures to random and targeted attacks.33–35 length (i.e., the smallest number of edges) connecting node i to node
In particular, power grids share some topological similarities, such j. If there is no path connecting two nodes (i, j), then d(i, j) = ∞.
as a node degree distribution with an exponential tail. Based on A connected component of an undirected graph is a subgraph G0
statistical properties of real-world power grids, a synthetic power- = {V0 , E0 } in which any pair of nodes are connected via some path,
grid generation model was proposed as a statistical benchmark for where V0 ⊆ V and E0 ⊆ E. A graph is connected if there is exactly
the trade-off analysis between cost-optimization and redundancy in one connected component.
power-grid design,36 a framework used in several works to analyze Power grids can be represented as undirected graphs, where
the power-grid resilience to random perturbations.37–40 nodes represent generators and consumers, while edges represent
In this work, we analyze the power-grid vulnerability to tar- transmission lines interconnecting these components. The Lapla-
geted attacks (edge removals). Using solely data of the network cian matrix provides important properties of a graph, such as the
structure of the power grid, we measure the energy efficiency in algebraic connectivity and the number of spanning trees of a graph.
the power grid and evaluate its vulnerability to the removal of In the context of power grids, it can be used for the calculation
central edges (according to different centrality measures). Previ- of resistance distances and electrical network analysis, as it also
ous works have shown that the power-grid efficiency can be vul- represents the network admittance matrix.43
nerable to attacks on highly central edges.9 However, such works
were restricted to efficiency and/or centrality measures based on
the geodesic distance between nodes, which are not appropriate to B. Centrality measures
model the power flow between generators and loads in a grid. To Centrality measures of complex networks determine the
more accurately represent the energy flow in power grids in our importance of nodes and edges in the network information flow
analysis, we evaluate the network efficiency with a distance mea- based on their structural characteristics. Such measures allow the
sure that models the current-flow path in electrical systems, known identification of vulnerable points in the system to attacks or fail-
as the “resistance distance.”41 This distance measure provides an ures. For example, pinpointing vulnerable edges (transmission lines)
implicit, and more realistic, representation of the energy flow in can indicate the need to improve the electrical system redundancy in
power grids, while also preserving the simplicity of our analysis to certain areas against storms, forest fires, and other electrical faults.
account for systems where only structural data are reliably avail- The most representative centrality measures in complex net-
able. Using this measure, we find that, in general, the power grid’s works are the degree and betweenness centrality measures. Degree
efficiency decreases under targeted attacks on edges with high cen- centrality ranks nodes according to their node degree di , while
trality, as demonstrated in randomly generated power-grid models betweenness centrality assesses the importance of an edge (i, j) in

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-2


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

24 November 2023 14:25:46


FIG. 1. Top five most central edges in the IEEE-118 benchmark system as ranked by each centrality measures: (a) current-flow betweenness, (b) disconnected components,
(c) spanning tree, and (d) structural index. Note that some edges are relevant with respect to two or more measures.

the network information flow, being defined by To model cascade propagation in power grids, centrality mea-
sures should not only reflect the power grid structure but also the
X σkl (i, j) underlying energy flow in these systems.50,51 Accordingly, different
B(i, j) = , (1) types of variations and generalizations of centrality measures have
σkl
k,l∈V been proposed for vulnerability analysis, in which the most promi-
nent ones are the betweenness current flow, spanning trees, and
where σkl (i, j) is the number of shortest paths from node k to l that disconnected component measures. These centrality measures are
pass through edge (i, j) and σkl is the number of all shortest paths defined as follows.
between k and l.
Betweenness centrality is widely used in the literature for
robustness analyses,44 including applications in many disciplines, 1. Current-flow betweenness centrality
such as social,45 psychological,46 and infrastructure networks.20 Vari- The standard betweenness centrality quantifies the information
ations of this measure, such as the relative betweenness centrality,47 flow in the network based only on the shortest paths between nodes.
can quantify the importance of an edge with respect to the impor- However, in power transmission networks, the current flow (as well
tance of its end-nodes. This measure can also be extended to mea- as the power flow) is not only transmitted through the shortest path,
sure the influence of a team or a group (i.e., a subset of nodes) but through all connected components between two given nodes,
in social networks48 and assess critical components in multiplex prioritizing paths of smaller resistance. Therefore, in the context of
networks, such as cyber-physical systems.49 power grids, it is more appropriate to implicitly model the current

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-3


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

FIG. 2. Network efficiency as a function of the number of edges removed for different attack strategies in IEEE benchmark systems: (a) IEEE-300. (b) IEEE-118. (c) IEEE-57.
Edges are successively removed in order of importance according to the centrality measures: current-flow betweenness, disconnected components, spanning tree, and
structural index. Edges are incrementally removed until 20% of the total number of edges is removed.

flow into the structural analysis of such networks,52 as formalized by pairs (s, d),
the current-flow betweenness centrality measure.53
F(s,d)
P
Let each transmission line (edge) be represented as a resistor, CB(i, j) =
s<d ij
. (4)
1
assigned with a unit value for simplification purposes.54 Consider a 2
n(n − 1)
source node s for the input current and another target node d for the
output current. The current flow between a source-target pair (s, d) Note that this centrality measure is equivalent to the notion
that passes through an edge (i, j) is given by53 of random-walk betweenness centrality (for a large number of
random-walk realizations),55 which provides a more computation-

24 November 2023 14:25:46


F(sd) =
X
Aij |v(sd) − v(sd) (2) ally efficient method to compute Eq. (4).
ij i j |,
j∈V
2. Disconnected component centrality
where v(sd)
i = L+ +
is − Lid is the potential at node i and L
+
is the Let bridge edges and cut-off nodes be elements that divide the
Moore–Penrose pseudoinverse of the Laplacian matrix. Thus, graph into two or more disconnected components. Such elements
Eq. (2) can be expressed as can assess the system vulnerability to the break of information flow
X in the overall network due to disconnected components. In practice,
F(sd)
ij = Aij |L+ + + +
is − Lid − Ljs + Ljd |. (3) it allows the identification of network elements without redundancy.
j∈V The disconnected component centrality of an edge (i, j) is defined as
Finally, the current-flow betweenness centrality CB(i, j) is the 1
DC(i, j) = , (5)
current flow through edge (i, j) averaged over all source–target ρ(i, j)

FIG. 3. Node degree distribution of IEEE benchmark systems: (a) IEEE-300. (b) IEEE-118. (c) IEEE-57. The inset plot shows the graph corresponding to each power-grid
benchmark.

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-4


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

FIG. 4. Node degree distribution of randomly generated power grids: (a) Distribution of a single random network realization. (b) Distribution over 100 random network
realizations.

where ρ(i, j) is the number of nodes in the largest connected com- where, in what follows, we set the weights as wi = 1 (i = 1, 2, 3) for
ponent of the graph G = {V, E\(i, j)} after the removal of an edge simplification purposes. We choose a geometric mean to normalize
(i, j). Consequently, after the edge removal, the smaller the largest its terms, and this makes it possible to compare metrics at any scale.

24 November 2023 14:25:46


connected component, the larger the measure, indicating a more
vulnerable edge. 5. Example
Figure 1 illustrates the importance of edges according to each
3. Spanning tree centrality of the described centrality measures in the power-grid IEEE-118
This measure is defined as the fraction of minimum spanning benchmark system.58 Note that the most important (vulnerable)
trees (MST) in which a particular edge is present, assessing the edges are different depending on the computed measure, show-
importance of the edge to the graph connectivity in non-redundant ing that each centrality measure models a different aspect of the
paths for the network information flow. The spanning tree centrality information (energy) flow over the network. Compared to the other
of an edge (i, j) is defined as56 measures, the current-flow betweenness centrality selects edges that
are more vital to the interconnection of geodesically distant nodes
τ (i, j) in the network (or, in other words, geographically apart areas in
ST(i, j) = , (6)
τ power grid), facilitating the power flow distribution between distant
sections of the system. On the other hand, the disconnected com-
where τ is the total number of different MST in G and τ (i, j) is the ponents and spanning tree centrality measures tend to rank edges
number of different MST containing the edge (i, j). Equation (6) can located at the extremes (or “dead ends”) of the power grid as most
be computed following the matrix-tree theorem.57 Let L(i, j) be the important, pinpointing edges whose removal can lead to isolated
Laplacian matrix in the absence of rows i and j and columns j and nodes (generators or consumers).
i, and let L(i) be the Laplacian matrix in the absence of row and
column i. Therefore, for undirected unweighted graphs, the number
III. VULNERABILITY ANALYSIS IN POWER GRIDS
of MSTs are given by τ (i, j) = det L(i, j) and τ = det L(i).
Network vulnerability is a property of complex networks that
quantifies the susceptibility of the information or energy flow to
4. Structural index damage (e.g., removal) of a particular element of the graph.21 How-
Each centrality measure ranks the importance of an edge with ever, modeling of the information or energy flow of a network
respect to a different characteristic of the power-grid structure. To usually requires more challenging and detailed assumptions regard-
unify the analysis of well-established measures into a single measure, ing the underlying dynamical processes. Thus, one viable alternative
we consider a structural index based on the geometric mean of the is to determine proxy measures that can quantify the network vul-
aforementioned centrality measures, defined as nerability based on more reliable data, such as the network structure.
Pi wi Here, the centrality measures described in Sec. II are used to
SI(i, j) = CB(i, j)w1 DC(i, j)w2 ST(i, j)w3 , (7) quantify the network vulnerability to edge attacks (removal). Let

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-5


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

24 November 2023 14:25:46


FIG. 5. Network efficiency of randomly generated networks as a function of the number of edges removed for different attack strategies, shown as an average over 100 network
realizations (shaded colors represent one standard deviation). Edges are successively removed in order of importance according to the centrality measures: (a) current-flow
betweenness, (b) disconnected components, (c) spanning tree, and (d) structural index.

V(i, j) be the network vulnerability to the removal of the edge (i, j), For power grids, vulnerability is also related to a drop in the
defined as9,59,60 efficiency of the system’s energy transmission under disturbing pro-
cesses that causes the removal of an edge (a transmission line) or the
ξ − ξ(i, j) isolation of a node (a generator or load).22,61,62 Consequently, effi-
V(i, j) = , (8)
ξ ciency measures can be used to identify vulnerable components that
can potentially trigger a cascade of failures and blackouts.59 Among
where ξ and ξ(i, j) represent a centrality measure computed for the several definitions of efficiency for complex networks,63 consider the
corresponding graphs before and after the removal of the edge (i, j), following one based on the average shortest distance between any
respectively. Note that we focus on edge attacks in this work because pair of nodes:8,64,65
transmission lines represent a relatively easy target to destructive
agents or severe weather events (e.g., strong winds, atmospheric dis-
1 X 1
charges, or wildfires) compared to other operational components, Ed = . (9)
such as generators and substations (nodes). N(N − 1) i6=j d(i, j)

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-6


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

Although the measure (9) has been applied to assess the vul- TABLE I. IEEE benchmark systems.
nerability to cascades in synthetic and real-world power grids,66,67 it
assumes that energy flows only through the shortest path between Benchmark Nodes Edges Average degree
any two nodes. For the same reasons stated in Sec. II, the energy
IEEE-57 57 78 2.74
flow in power grids is more appropriately represented by all paths
IEEE-118 118 179 3.03
between any two nodes, weighted according to their resistance.
IEEE-300 300 409 2.73
Therefore, for the vulnerability analysis of power grids, here, we con-
sider the modified measure (9) based on the resistance distance R(i, j)
between any two nodes rather than the geodesic distance d(i, j),68
1 X 1
Er = , (10) Among the evaluated measures, edge attacks based on current-
N(N − 1) i6=j R(i, j) flow betweenness centrality show the largest decrease in network
efficiency in all benchmark systems compared to other centrality
where R(i, j) is conceptually related to the admittance matrix of a measures. Network efficiency drops to around 6% of the nominal
power system and can be computed using the Laplacian matrix as efficiency (under no attacks) by removing only 10% of the total
follows:69 number of edges ranked according to the current-flow betweenness
det L(i, j) centrality, whereas other centrality measures require 20% or more
R(i, j) = . (11)
det L(i) attacks to reach the same level of network efficiency.
These results show that power grids are highly vulnerable to
Note that, for undirected unweighted graphs, the resistance dis- attacks on important edges ranked with current-flow betweenness
tance R(i, j) between two nodes i and j connected by an edge (i, j) is centrality. However, for the first few attacks (less than 5%), simula-
equivalent to the spanning tree centrality ST(i, j) of this edge. tions also show that power grids are more vulnerable to attacks on
edges ranked with disconnected component centrality compared to
IV. RESULTS AND DISCUSSION the current-flow betweenness centrality and other measures. This is
often a consequence of a few bridge edges interconnecting the net-
We investigate the vulnerability of power grids to different
work to a branch of N ≥ 2 nodes containing “dead ends” [see edges
edge attack strategies. The relation between the network efficiency
1 and 2 in Fig. 1(b)]. After these few bridge edges are removed, cen-

24 November 2023 14:25:46


measure (10) and the removal of highly central edges is investi-
tral edges ranked with disconnected component centrality are more
gated according to the centrality measures described in Sec. II. The
likely located at direct connections between the network and its dead
subsequent removal of edges is expected to decrease the network
ends [see edges 3, 4, and 5 in Fig. 1(b)], in which removal/isolation is
efficiency, although the removal of lines may also increase it due
less crucial to the overall power flow distribution and network effi-
to the Braess’s paradox.70 We expect the removal of more important
ciency. Consequently, after the first initial attacks (e.g., >5% of the
edges to reflect more significant drops in efficiency depending on the
total edges), the network efficiency displays less sensitivity to attacks
considered centrality measure. To that end, we evaluate the decrease
on central edges based on disconnected component centrality.
in measure (10) as edges are subsequently attacked according to
Given all the specific characteristics of each centrality measure,
the vulnerability index (8) for some centrality measure ξ , targeting
the structural index captures the average behavior among all con-
the most vulnerable edge at a time. This attack strategy is simu-
sidered attack strategies. For the first few attacks on important edges
lated according to the following greedy algorithm. Consider some
ranked with the structural index, results show large drops of network
graph G = {V, E}. At each iteration, Eq. (8) is computed for all edges
efficiency, followed by a less sensitive decrease for the remaining
(i, j) ∈ E in graph G, and we select the edge (k, l) that maximizes the
edge attacks. The large drop is related to the high sensitivity of the
vulnerability index,
network efficiency to attacks on: (i) important edges ranked with
(k, l) = argmax(i,j)∈E V(i, j). (12) the current-flow betweenness centrality and (ii) the first few impor-
tant edges ranked with the disconnected component centrality. The
Then, we remove the selected edge (k, l) from the graph subsequent small decrease, on the other hand, is a consequence of
G0 = {V, E\(k, l)}, updating the graph G ← G0 , and proceeding to the low vulnerability of the network efficiency to attacks on edges
the next iteration. The network efficiency (10) is reevaluated at located at dead ends, which are often classified as important with the
every iteration after the removal of an edge. Numerical results are disconnected components and spanning tree centrality measures.
presented for established power-grid benchmark systems (publicly The vulnerability analysis conducted so far depends on the
available datasets at Matpower toolbox;58 summarized in Table I) structural characteristics of the systems, such as its node degree
and randomly generated synthetic power grids (generated using the distribution (Fig. 3), and may be dependent on the specific bench-
model36 with N = 100 nodes, average node degree 2.7, and other mark cases considered in our study. To further confirm the results
parameters set as n0 = 1, p = 0.2, q = 0.3, r = 1/3, and s = 0.1). observed in the IEEE benchmark systems and statistically evaluate
Figure 2 compares the vulnerability of IEEE power grids to dif- the network vulnerability under different attack strategies, we ran-
ferent target attack strategies. As expected, the network efficiency domly generate 100 power-grid networks following the power-grid
always decreases with the removal (attack) of any given edge. How- network model.36 Figure 4 illustrates the node degree distributions
ever, the decrease of network efficiency (vulnerability) may be more for randomly generated networks, leading to synthetic networks
sensitive depending on the choice of edge and its centrality ranking. that share similar characteristics to real-world power grids (Fig. 3),

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-7


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

especially, its node degree distribution following exponential decay- distribution in the grid. In fact, both the network efficiency measure
ing tail. (10) and the current-flow betweenness centrality (4) depend on the
Figure 5 presents the network vulnerability of random power power flow distribution and the resistance distances (11) between
grids under different attack strategies. Overall, the same qualitative any two nodes—which might justify the higher vulnerability to
results observed in Fig. 2 are observed for the random networks. attacks on important edges with respect to current-flow between-
The network efficiency is considerably more vulnerable to attacks ness centrality compared to other measures. However, the relation
on the 5%–10% most important edges with respect to current-flow between the network efficiency (10) and the centrality measure is not
betweenness centrality and also highly vulnerable to the attacks on trivial and still deserves further investigation. For instance, note that,
the 3%–5% most important edges with respect to the disconnected even though the spanning tree centrality is computed using the same
component centrality (but showing low sensitivity for successive expression (6) as the resistance distance (11), all power grids showed
edge attacks). Power grids (real and synthetic) are less vulnera- low sensitivity to attacks on central edges with respect to spanning
ble to attacks on important edges ranked according to spanning centrality. We highlight that, although our research was designed
tree centrality. Finally, the structural index shows an average result with the power grid application in mind, the centrality and network
between current-flow betweenness and disconnected component efficiency measures used in our work are relevant to many other
centrality measures, suggesting its potential use as a representative infrastructure networks, including water and gas supply networks
vulnerability index for both measures. as well as multi-layer energy delivery systems. Potentially, other
applications could benefit from the framework developed here.
The dependence between the network efficiency and its vul-
V. CONCLUSIONS nerability to edges that are more important to the power flow
The vulnerability analysis of critical systems, such as power distribution shows promising results for future studies on network
grids, is necessary to support decision-making policies for mitigat- design and expansion. The studied vulnerability indices, especially
ing outages and the design of more resilient systems. The proposed those implicitly related to the power flow distribution in the grid,
methodology for network vulnerability analysis networks locates, may be incorporated in the co-design of power grids that simultane-
in power-grid networks, transmission lines that are vulnerable to ously optimize the system’s power flow and maximize the network
adversarial attacks and extreme weather events (such as fires, thun- resilience (redundancy) to edge attacks and failures—while also
derstorms, etc.). Such events are geographically localized; therefore, considering the many geographic and costs constraints involved.
their effects can be mitigated if vulnerable transmission lines can be This paper is, however, a pilot study in this direction, and

24 November 2023 14:25:46


identified in advance. many other factors have yet to be considered. For example, here,
We evaluated four centrality measures used in network science the analysis is simplified by assuming that the admittance of each
to quantify the vulnerability of power grids to target edge attacks. edge (transmission line) is normalized to a unit value. Results may
The network efficiency, related to its overall power flow distribution, be quantitatively different if the actual admittance matrix of real-
showed different sensitivities to edge attacks depending on its cen- world power grids is also considered in the vulnerability analysis,
trality ranking. While most works in the literature have investigated which can be further analyzed using real-world databases. More-
the power-grid vulnerability to critical node failures,71 here, we focus over, although this work shows a clear link between network effi-
on centrality metrics to indicate critical edges. The betweenness cen- ciency and centrality measures, the relation between these measures
trality is the most commonly used indication of critical edges as it and the emergence of cascading failures (blackouts) in power grids
represents an essential path for the flow in the network. We apply is still an open challenge. This can be further pursued by explicitly
a variation of this metric, which more realistically models the flow modeling the power grid’s nonlinear dynamics and its synchroniza-
of energy (information) in power grids. Likewise, the spanning tree tion conditions under edge attacks on important edges to the power
metric gives us an indication of an edge relevance or redundancy flow distribution. The research problem is quite vast and depen-
to the power flow, indicating edges that have a significant effect on dent on the network structure of the transmission networks under
the power flow distribution and may overload other components study as well as the underlying dynamics. Based on our frame-
if attacked or removed. The disconnected component centrality is work, critical components can be identified solely based on the
then used to assess whether a component failure may break the network structure. To assess the system stability and resilience to
power flow in two isolated components, possibly leading to “outage the impact and propagation of large perturbations, we expect that
isles.” Finally, creating a composite index of these three measures our analysis can then be complemented by dynamical tools that
provides a single metric to jointly analyze characteristics. can also incorporate other data characteristics of real-world power
We highlight that the network efficiency measure used in this grids, including measurement data of past cascading failures72 or the
work is a more appropriate choice to analyze the vulnerability of operation information37,38 (such as the system’s power flow, power
power grids under edge (and node) attacks, a novelty of the frame- demand, and synchronization dynamics).
work proposed in this paper. By replacing the geodesic distance
by the resistance distance, we implicitly model the current flow in
power grids through multiple paths between any two nodes, instead
of evaluating only the shortest distance between these nodes. Ana- ACKNOWLEDGMENTS
lyzing the numerical results on real-world and synthetic power grids, Jussara Dias acknowledges financial support from the Con-
we expect that the high vulnerability of power grids to edge attacks is selho Nacional de Desenvolvimento Científico e Tecnológico (Grant
related to the importance of an edge with respect to the power flow No. 140475/2018-4) and the Instituto de Pesquisas Eldorado, Brazil.

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-8


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

This research was also supported by the São Paulo Research Foun- 18
P. Crucitti, V. Latora, and M. Marchiori, “A topological analysis of the Italian
dation (FAPESP), Brazil (Grant Nos. 2015/50122-0, DFG-IRTG electric power grid,” Phys. A: Stat. Mech. Appl. 338, 92–97 (2004).
19
1740/2, and 2018/03211-6). M. Rosas-Casals, S. Valverde, and R. V. Solé, “Topological vulnerability of
the European power grid under errors and attacks,” Int. J. Bifurc. Chaos 17,
2465–2475 (2007).
AUTHOR DECLARATIONS 20
M. A. S. Monfared, M. Jalili, and Z. Alipour, “Topology and vulnerability of the
Iranian power grid,” Phys. A: Stat. Mech. Appl. 406, 24–33 (2014).
Conflict of Interest 21
S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang, “Complex
The authors have no conflicts to disclose. networks: Structure and dynamics,” Phys. Rep. 424, 175–308 (2006).
22
M. Ouyang, Z. Pan, L. Hong, and L. Zhao, “Correlation analysis of different
vulnerability metrics on power grids,” Phys. A: Stat. Mech. Appl. 396, 204–211
Author Contributions (2014).
23
Jussara Dias: Methodology (equal). Arthur N. Montanari: M. Ouyang and K. Yang, “Does topological information matter for power grid
vulnerability?,” Chaos 24, 043121 (2014).
Methodology (equal). Elbert E. N. Macau: Methodology (equal). 24
A. A. Tahirovic, D. Angeli, and G. Strbac, “A complex network approach to
power system vulnerability analysis based on rebalance based flow centrality,”
DATA AVAILABILITY in 2021 IEEE Power & Energy Society General Meeting (PESGM) (IEEE, 2021),
pp. 01–05.
Data sharing is not applicable to this article as no new data were 25
B. Xie, X. Tian, L. Kong, and W. Chen, “The vulnerability of the power grid
created or analyzed in this study. structure: A system analysis based on complex network theory,” Sensors 21, 7097
(2021).
26
R. Piccinelli and E. Krausmann, Space Weather and Power Grids: Vulnerability
REFERENCES Assessment (Publications Office of the European Union, 2014).
1 27
L. Bakule, “Decentralized control: An overview,” IFAC Proc. Vols. 40, 39–48 A. M. Karpachevskiy, O. G. Filippova, and P. E. Kargashin, “GIS-analysis of the
(2007). Ural power grid vulnerability to the impact of sleet and wind,” Geogr. Environ.
2
N. Xue and A. Chakrabortty, “Control inversion: A clustering-based method for Sustain. 15, 14–25 (2022).
28
distributed wide-area control of power systems,” IEEE Trans. Control Netw. Syst. I. Adebayo and Y. Sun, “New approaches for the identification of influential and
6, 937–949 (2018). critical nodes in an electric grid,” Arch. Electr. Eng. 71, 671–686 (2022).
3 29
M. Frasca and L. V. Gambuzza, “Control of cascading failures in dynamical F. Hu, L. Chen, and J. Chen, “Robustness evaluation of complex power grids
models of power grids,” Chaos, Solitons Fractals 153, 111460 (2021). containing renewable energy,” Int. J. Electr. Power Energy Syst. 132, 107187
4
P. Crucitti, V. Latora, and M. Marchiori, “Model for cascading failures in (2021).

24 November 2023 14:25:46


30
complex networks,” Phys. Rev. E 69, 045104 (2004). C. J. Kim and O. B. Obah, “Vulnerability assessment of power grid using graph
5
M. Sachtjen, B. Carreras, and V. Lynch, “Disturbances in a power transmission topological indices,” Int. J. Emerg. Electr. Power Syst. 8 (2007).
31
system,” Phys. Rev. E 61, 4877 (2000). A.-L. Barabási and E. Bonabeau, “Scale-free networks,” Sci. Am. 288, 60–69
6
D. Zhou, F. Hu, S. Wang, and J. Chen, “Power network robustness analysis based (2003).
32
on electrical engineering and complex network theory,” Phys. A: Stat. Mech. Appl. L. Zhao, K. Park, Y.-C. Lai, and N. Ye, “Tolerance of scale-free networks against
564, 125540 (2021). attack-induced cascades,” Phys. Rev. E 72, 025104 (2005).
7 33
S. Xu, H. Zhou, C. Li, and X. Yang, “Vulnerability assessment of power grid based P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han, “Attack vulnerability of complex
on complex network theory,” in 2009 Asia-Pacific Power and Energy Engineering networks,” Phys. Rev. E 65, 056109 (2002).
34
Conference (IEEE, 2009), pp. 1–4. P. Chopade and M. Bikdash, “New centrality measures for assessing smart grid
8
F. Gutierrez, E. Barocio, F. Uribe, and P. Zuniga, “Vulnerability analysis of power vulnerabilities and predicting brownouts and blackouts,” Int. J. Crit. Infrastruct.
grids using modified centrality measures,” Discrete Dyn. Nat. Soc. 2013, 135731. Prot. 12, 29–45 (2016).
9 35
L. Cuadra, S. Salcedo-Sanz, J. Del Ser, S. Jiménez-Fernández, and Z. Geem, “A M. Newman, Networks (Oxford University Press, 2018).
36
critical review of robustness in power grids using complex networks concepts,” P. Schultz, J. Heitzig, and J. Kurths, “A random growth model for power grids
Energies 8, 9211–9265 (2015). and other spatially embedded infrastructure networks,” Eur. Phys. J. Spec. Top.
10
C. D. Brummitt, R. M. D’Souza, and E. A. Leicht, “Suppressing cascades of 223, 2593–2610 (2014).
37
load in interdependent networks,” Proc. Natl. Acad. Sci. U.S.A. 109, E680–E689 P. J. Menck, J. Heitzig, J. Kurths, and H. J. Schellnhuber, “How dead ends
(2012). undermine power grid stability,” Nat. Commun. 5, 3969 (2014).
11 38
B. Schäfer, D. Witthaut, M. Timme, and V. Latora, “Dynamically induced A. N. Montanari, E. I. Moreira, and L. A. Aguirre, “Effects of network het-
cascading failures in power grids,” Nat. Commun. 9, 1975 (2018). erogeneity and tripping time on the basin stability of power systems,” Commun.
12
J. C. Lacerda, J. Dias, C. Freitas, and E. Macau, “Vulnerability and stability of Nonlinear Sci. Numer. Simul. 89, 105296 (2020).
39
power grids modeled by second-order Kuramoto model: A mini review,” Eur. C. Nauck, M. Lindner, K. Schürholt, H. Zhang, P. Schultz, J. Kurths, I. Isenhardt,
Phys. J. Spec. Top. 230, 3509–3517 (2021). and F. Hellmann, “Predicting dynamic stability of power grids using graph neural
13
S. Y. Caliskan and P. Tabuada, “Compositional transient stability analysis of networks,” arXiv:2108.08230 (2021).
40
multimachine power networks,” IEEE Trans. Control Netw. Syst. 1, 4–14 (2014). C. C. Galindo-González, D. Angulo-García, and G. Osorio, “Decreased
14
S. Auer, K. Kleis, P. Schultz, J. Kurths, and F. Hellmann, “The impact of model resilience in power grids under dynamically induced vulnerabilities,” New J. Phys.
detail on power grid resilience measures,” Eur. Phys. J. Spec. Top. 225, 609–625 22, 103033 (2020).
41
(2016). E. Evans and A. Francis, “Algorithmic techniques for finding resistance dis-
15
X. Fan, E. Dudkina, L. V. Gambuzza, M. Frasca, and E. Crisostomi, “A network- tances on structured graphs,” Discrete Appl. Math. 320, 387–407 (2022).
42
based structure-preserving dynamical model for the study of cascading failures in X. F. Wang and G. Chen, “Complex networks: Small-world, scale-free and
power grids,” Electr. Power Syst. Res. 209, 107987 (2022). beyond,” IEEE Circ. Syst. Mag. 3, 6–20 (2003).
16 43
A. B. Birchfield, T. Xu, K. M. Gegner, K. S. Shetye, and T. J. Overbye, “Grid R. Merris, “Laplacian matrices of graphs: A survey,” Linear Algebra Appl. 197,
structural characteristics as validation criteria for synthetic networks,” IEEE 143–176 (1994).
44
Trans. Power Syst. 32, 3258–3265 (2016). G. P. Clemente and A. Cornaro, “A novel measure of edge and vertex centrality
17
M. Oehlers and B. Fabian, “Graph metrics for network robustness—A survey,” for assessing robustness in complex networks,” Soft Comput. 24, 13687–13704
Mathematics 9, 895 (2021). (2020).

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-9


Published under an exclusive license by AIP Publishing
Chaos ARTICLE scitation.org/journal/cha

45 59
A. Landherr, B. Friedl, and J. Heidemann, “A critical review of centrality V. Latora and M. Marchiori, “Vulnerability and protection of infrastructure
measures in social networks,” Bus. Inf. Syst. Eng. 2, 371–385 (2010). networks,” Phys. Rev. E 71, 015103 (2005).
46 60
L. F. Bringmann, T. Elmer, S. Epskamp, R. W. Krause, D. Schoch, M. Wich- V. Gol’dshtein, G. Koganov, and G. I. Surdutovich, “Vulnerability and hierarchy
ers, J. T. Wigman, and E. Snippe, “What do centrality measures measure in of complex networks,” arXiv:cond-mat/0409298 (2004).
61
psychological networks?,” J. Abnorm. Psychol. 128, 892 (2019). R. Baldick, B. Chowdhury, I. Dobson, Z. Dong, B. Gou, D. Hawkins, Z. Huang,
47
D. Vukičević, R. Škrekovski, and A. Tepeh, “Relative edge betweenness central- M. Joung, J. Kim, D. Kirschen, and S. Lee, “Vulnerability assessment for cascading
ity,” Ars Math. Contemp. 12, 261–270 (2016). failures in electric power systems,” in 2009 IEEE/PES Power Systems Conference
48
J. Lee, Y. Lee, S. M. Oh, and B. Kahng, “Betweenness centrality of teams in social and Exposition (IEEE, 2009), pp. 1–9.
62
networks,” Chaos 31, 061108 (2021). E. Bompard, R. Napoli, and F. Xue, “Analysis of structural vulnerabilities in
49
A. Umunnakwe, A. Sahu, M. R. Narimani, K. Davis, and S. Zonouz, “Cyber- power transmission grids,” Int. J. Crit. Infrastruct. Prot. 2, 5–12 (2009).
63
physical component ranking for risk sensitivity analysis using betweenness cen- P. Crucitti, V. Latora, and M. Marchiori, “Locating critical lines in high-voltage
trality,” IET Cyber-Phys. Syst.: Theory Appl. 6, 139–150 (2021). electrical power grids,” Fluct. Noise Lett. 5, L201–L208 (2005).
50 64
A. Nasiruzzaman, H. Pota, and M. Mahmud, “Application of centrality mea- A. Dwivedi, X. Yu, and P. Sokolowski, “Identifying vulnerable lines in a power
sures of complex network framework in power grid,” in IECON 2011—37th network using complex network theory,” in 2009 IEEE International Symposium
Annual Conference of the IEEE Industrial Electronics Society (IEEE, 2011), pp. on Industrial Electronics (IEEE, 2009), pp. 18–23.
65
4660–4665. S. Arianos, E. Bompard, A. Carbone, and F. Xue, “Power grid vulnerability: A
51
A. Albarakati and M. Bikdash, “Vulnerabilities of power grid due to line failures complex network approach,” Chaos 19, 013119 (2009).
66
based on power traffic centrality of the line graph,” in SoutheastCon 2018 (IEEE, Y. Guo, J. Cao, R. Duan, and S. Li, “Power grid vulnerability identifying based
2018), pp. 1–7. on complex network theory,” in 2012 Second International Conference on Instru-
52
E. Bozzo and M. Franceschet, “Resistance distance, closeness, and between- mentation, Measurement, Computer, Communication and Control (IEEE, 2012),
ness,” Soc. Netw. 35, 460–469 (2013). pp. 474–477.
53 67
U. Brandes and D. Fleischer, “Centrality measures based on current flow,” in R. Kinney, P. Crucitti, R. Albert, and V. Latora, “Modeling cascading failures in
Annual Symposium on Theoretical Aspects of Computer Science (Springer, 2005), the North American power grid,” Eur. Phys. J. B-Condens. Matter Complex Syst.
pp. 533–544. 46, 101–107 (2005).
54 68
If other power grid specifications are available, such as the admittance of the M. Li, S. Zhou, G. Chen, W. Lin, and Q. Zhou, “Novel resistive dis-
transmission line, the current-flow betweenness centrality can be extended to tance descriptors on complex network,” IEEE Access 10, 14548–14563
accommodate these data. (2022).
55 69
M. E. Newman, “A measure of betweenness centrality based on random walks,” V. S. S. Vos, “Methods for determining the effective resistance,” master’s thesis
Soc. Netw. 27, 39–54 (2005). (Mathematisch Instituut Universiteit Leiden, 2016).
56 70
A. S. Teixeira, P. T. Monteiro, J. A. Carriço, M. Ramirez, and A. P. Francisco, B. Schäfer, T. Pesch, D. Manik, J. Gollenstede, G. Lin, H.-P. Beck, D. Witthaut,
“Not seeing the forest for the trees: Size of the minimum spanning trees (MSTs) and M. Timme, “Understanding Braess’ paradox in power grids,” Nat. Commun.

24 November 2023 14:25:46


forest and branch significance in MST-based phylogenetic analysis,” PLoS One 13, 5396 (2022).
71
10, e0119315 (2015). A. M. Amani and M. Jalili, “Power grids as complex networks: Resilience and
57
J. M. Harris, Combinatorics and Graph Theory (Springer, 2008). reliability analysis,” IEEE Access 9, 119010–119031 (2021).
58 72
R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas, “MATPOWER: A. Corso, L. V. Gambuzza, F. Malizia, G. Russo, V. Latora, and M. Frasca,
Steady-state operations, planning, and analysis tools for power systems research “Reconstruction of cascading failures in dynamical models of power grids,” J.
and education,” IEEE Trans. Power Syst. 26, 12–19 (2010). Complex Netw. 10, cnac035 (2022).

Chaos 33, 033122 (2023); doi: 10.1063/5.0137919 33, 033122-10


Published under an exclusive license by AIP Publishing

You might also like