Advertisement

Stochastic Simulation of Critical Infrastructures for Electric Power Transmission

  • Enrico ZioEmail author
Conference paper
  • 1.7k Downloads
Part of the NATO Science for Peace and Security Series C: Environmental Security book series (NAPSC)

Abstract

Critical infrastructures of electric power transmission are considered. Their distributed dynamic characteristics, common to other critical infrastructures e.g. of transportation and communication, demand innovative approaches of analysis in order to identify vulnerabilities, for effective protection against extensive failures. The uncertainties associated to the system behavior which emerges from initially local failures call for appropriate models and methods of stochastic simulation.

Keywords

Stochastic Simulation Critical Infrastructure Infrastructure System Optimal Power Flow Interdependent Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [Adachi and Ellingwood, 2008]
    T. Adachi and B. R. Ellingwood, “Serviceability of earthquake527 damaged water systems: effects of electrical power availability and power backup systems on system vulnerability”, Reliability Engineering and System Safety, 93(1), pp. 78–88, 2008.CrossRefGoogle Scholar
  2. [Albert et al., 2000]
    Albert R., Jeong H. and Barabasi A.-L., Error and Attack Tolerance of Complex Networks, Nature, Vol. 406, 2000, pp. 378–382.CrossRefGoogle Scholar
  3. [Apostolakis and Lemon, 2005]
    Apostolakis, G.E., Lemon, M.D., “A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism”, Risk Analysis, Vol. 25, No. 2, 2005.Google Scholar
  4. [Barton and Stamber, 2000]
    D. C. Barton and K. L. Stamber, “An agent-based microsimulation of critical infrastructure systems”, Conference: International Energy Foundation’s ENERGEX 2000 - 8th International Energy Forum, Las Vegas, NV (US), 07/23/2000-07/28/2000, SANDIA REPORT SAND2000-0808C, 2000.Google Scholar
  5. [Borkowska, 1974]
    Borkowska, B. “Probabilistic Load flow”, IEEE Trans.,1974., PAS-93, pp 752–759.Google Scholar
  6. [Bouchon, 2006]
    S. Bouchon, The Vulnerability of Interdependent Critical Infrastructures Systems: Epistemological and Conceptual State-of-the Art, EUR-report, 2006Google Scholar
  7. [Cagno et al., 2009]
    E. Cagno, M. De Ambroggi, O. Grande and P. Trucco, “Risk analysis of underground infrastructures in urban area: time-dependent interoperability analysis”, Reliability, Risk and Safety: Theory and Applications – Briš, Guedes Soares & Martorell (eds), Proceedings of ESREL 2009 Europe Annual Conference, 6–11 September 2009, Prague, Czech Republic, Taylor & Francis Group, London, pp. 1899-1906, 2009.Google Scholar
  8. [Carreras et al., 2007]
    B. A. Carreras, D. E. Newman, P. Gradney, V. E. Lynch and I. Dobson, Interdependent risk in interacting infrastructure systems, Fortieth Hawaii International Conference on System Sciences, Hawaii, January 2007.Google Scholar
  9. [Casalicchio et al., 2007]
    E. Casalicchio, E. Galli and S. Tucci, Federated Agent-based Modeling and Simulation Approach to Study Interdependencies in IT Critical Infrastructures, 11th IEEE Symposium on Distributed Simulation and Real-Time Applications, 2007.Google Scholar
  10. [Casalicchio et al., 2009]
    E. Casalicchio, E. Galli and V. Ottaviani, “MobileOnRealEnvironment-GIS: A Federated Mobile Network Simulator of Mobile Nodes on Real Geographic Data”, Proceedings of the 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, pp. 255–258, 2009.Google Scholar
  11. [Chen and McCalley, 2005]
    Q. Chen and J. D. McCalley, “Identifying high risk N-k contingencies for online security assessment”, IEEE Transactions on Power Systems, vol. 20, no. 2, 2005.Google Scholar
  12. [Dekker, 2005]
    Dekker A. H., “Simulating Network Robustness for Critical Infrastructure Networks”, Conferences in Research and Practice in Information Technology, Proceedings of the 28th Australasian Computer Science Conference, The University of Newcastle, Newcastle, Australia, vol. 38, V. Estivill-Castro, Ed., 2005.Google Scholar
  13. [Dobson et al., 2005]
    I. Dobson, B. A. Carreras and D. E. Newman, “A loading-dependent model of probabilistic cascading failure”, Probability in the Engineering and Informational Sciences, vol. 19, no. 1, pp. 15–32, 2005.CrossRefGoogle Scholar
  14. [Dopazo et al., 1975]
    Dopazo, J.F., Klitin, O.A. and Sasson, A.M., “Stochastic load flow method”, IEEE Trans., 1975, PAS-94, pp. 1551–1556.Google Scholar
  15. [Duenas-Osorio et al, 2007]
    L. Duenas-Osorio, J. I. Craig, and B. J. Goodno, “Seismic response of critical interdependent networks”, Earthquake Engineering and Structural Dynamics, 2007. 36(2): p. 285–306.CrossRefGoogle Scholar
  16. [Duenas-Osorio and Vemuru, 2009]
    L. Dueñas-Osorio and S. M. Vemuru, “Cascading failures in complex infrastructure systems”, Structural Safety, vol. 31, pp. 157–167, March 2009.CrossRefGoogle Scholar
  17. [Ellis et al., 1997]
    Ellis, J, Fisher D, et al. Report to the President’s Commission on Critical Infrastructure Protection, S.E. Institute. Editor Carnegie Mellon University, 1997.Google Scholar
  18. [Germann et al., 2006]
    T. C. Germann, K. Kadau, I. M. Longini, Jr. and C. A. Macken, “Mitigation strategies for pandemic influenza in the United States”, Proc. The National Academy of Sciences of the USA, vol. 103, no. 15, pp. 5935–5940, April 2006.Google Scholar
  19. [Guckenheimer and Ottino, 2008]
    Guckenheimer J. and Ottino, J. M. Foundations for Complex Systems Research in the Physical Sciences and Engineering, Report from a NSF Workshop, September 2008 http://www.math.cornell.edu/~gucken/PDF/nsf_complex_systems.pdf.
  20. [Haimes and Jiang, 2001]
    Y. Haimes and P. Jiang, “Leontief-based model of risk in complex interconnected infrastructures”, Journal of Infrastructure Systems, vol. 7, no. 1, pp. 1–12, March 2001.CrossRefGoogle Scholar
  21. [Haimes et al., 2005a]
    Y. Y. Haimes, B. M. Horowitz, J. H. Lambert, J. R. Santos, C. Lian and K. G. Crowther, “Inoperability Input-Output model for interdependent infrastructure sectors. I: theory and methodology”, Journal of Infrastructures Systems, vol. 11, no. 2, pp. 67–79, 2005.CrossRefGoogle Scholar
  22. [Haimes et al., 2005b]
    Y. Y. Haimes, B. M. Horowitz, J. H. Lambert, J. R. Santos, C. Lian and K. G. Crowther, “Inoperability Input-Output model for interdependent infrastructure sectors. I: case studies”, Journal of Infrastructures Systems, vol. 11, no. 2, pp. 80–92, 2005.CrossRefGoogle Scholar
  23. [Helseth and Holen, 2009]
    A. Helseth and A. T. Holen, “Structural vulnerability of energy distribution systems: incorporating infrastructural dependencies”, Electrical Power and Energy Systems, vol. 31, pp. 531–537, 2009.CrossRefGoogle Scholar
  24. [Hong et al, 1999]
    X. Hong, M. Gerla, G. Pei and C.-C. Chiang, “A group mobility model for ad hoc wireless networks”, Proceedings of the 2nd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems, Seattle, Washington, United States, pp. 53–60, 1999.Google Scholar
  25. [IRGC, 2006]
    White Paper on Managing and Reducing Social Vulnerabilities from Coupled Critical Infrastructures, IRGC, 2006.Google Scholar
  26. [IRRIIS, 2007]
    EU project IRRIIS, Deliverable D222, “Tools and techniques for interdependency analysis”, pp. 45–51, June 2007. Available: http://www.irriis.org/File.aspx?lang=2&oiid=9138&pid=572.
  27. [Jiang and Haimes, 2004]
    P. Jiang and Y. Y. Haimes, “Risk management for Leontief-based interdependency systems”, Risk Analysis, vol. 24, no. 5, pp. 1215–1229, 2004.CrossRefGoogle Scholar
  28. [Johansson and Jönsson, 2009]
    J. Johansson and H. Jönsson, “A model for vulnerability analysis of interdependent infrastructure networks”, in Safety, Reliability and Risk Analysis: Theory, Methods and Applications, Proc. ESREL 2008 and 17th SRA-Europe Conf., Valencia, September 2008, Taylor & Francis Group, London, pp. 2491–2499, 2009.Google Scholar
  29. [Kodsi and Canizares, 2007]
    S. K. M. Kodsi and C. A. Canizares, “Application of a Stability611 constrained Optimal Power Flow to Tuning of Oscillation Controls in Competitive Electricity Markets”, IEEE TRANSACTIONS ON POWER SYSTEMS, 22(4), pp. 1944, 2007.CrossRefGoogle Scholar
  30. [Lee et al., 2007]
    E. E. Lee, J. E. Mitchell and W. A. Wallace, “Restoration of services in interdependent infrastructure systems: a network flows approach”, IEEE Transactions on Systems, Man, and Cybernetics-Part C (Applications and Reviews), 37(6): p. 1303–17, 2007.CrossRefGoogle Scholar
  31. [Luijf et al., 2009]
    E. Luiijf, A. Nieuwenhuijs, M. Klaver, M. van Eeten and E. Cruz, “Empirical Findings on Critical Infrastructure Dependencies in Europe”, in Critical Information Infrastructure Security, Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2009.Google Scholar
  32. [Min et al., 2007]
    H.-S. J. Min, W. Beyeler, T. Brown, Y. J. Son and A. T. Jones, “Toward modeling and simulation of critical national infrastructure interdependencies”, IIE Transactions, vol. 39, no. 1, pp. 57–71, January 2007.CrossRefGoogle Scholar
  33. [Motter and Lai, 2002]
    A. E. Motter and Y.-C. Lai, “Cascade-based attacks on complex networks”, Physical Review E, vol. 66, no. 6, p. 065-102, December 2002.Google Scholar
  34. [Newman et al., 2005]
    D. E. Newman, B. Nkei, B. A. Carreras, I. Dobson, V. E. Lynch and P. Gradney, “Risk Assessment in Complex Interacting Infrastructure Systems”, Proc. Thirty-Eight Annu. Hawaii International Conf. on System Sciences, January 3–6, 2005, Computer Society Press, 2005.Google Scholar
  35. [Oyuang et al., 2009]
    M. Ouyang, L. Hong, Z.-J. Mao, M.-H. Yu and F. Qi, “A methodological approach to analyze vulnerability of interdependent infrastructures”, Simulation Modeling Practice and Theory, 17(5), p. 817–828, 2009.CrossRefGoogle Scholar
  36. [Panzieri et al., 2004]
    S. Panzieri, R. Setola and G. Ulivi, “An agent based simulator for critical interdependent infrastructures”, Securing Critical Infrastructures, CRIS2004 : Conference on Critical Infrastructures, October 25 - 27, 2004, Grenoble, FRANCE, 2004.Google Scholar
  37. [Piwowar et al., 2009]
    Piwowar, J., Chatelet, E. and Laclemence, P., “An efficient process to reduce infrastructure vulnerabilities facing malevolence”, Reliability Engineering and System Safety, vol. 94, pp. 1869–1877, 2009.CrossRefGoogle Scholar
  38. [Reed et al., 2009]
    D. A. Reed, K. C. Kapur and R. D. Christie, “Methodology for assessing the resilience of networked infrastructure”, IEEE Systems Journal, vol. 3, no. 2, pp. 174–180, 2009.CrossRefGoogle Scholar
  39. [Rinaldi et al., 2001]
    S. M. Rinaldi, J. P. Peerenboom and T. K. Kelly, “Identifying, understanding and analyzing critical infrastructures interdependencies”, IEEE Control System Magazine, vol. 21, no. 6, pp. 11–25, December 2001.CrossRefGoogle Scholar
  40. [Rinaldi, 2004]
    S. M. Rinaldi, “Modeling and simulating critical infrastructures and their interdependencies”, Proc. Thirty-Seventh Annual Hawaii International Conf. on System Sciences, January 5-8, 2004, Computer Society Press, 2004.Google Scholar
  41. [Schläpfer et al., 2008]
    M. Schläpfer, T. Kessler and W. Kröger, “Reliability Analysis of Electric Power Systems Using an Object-oriented Hybrid Modeling Approach“in Proc. 16th Power Systems Computation Conf., 14-18 July, Glasgow, 2008.Google Scholar
  42. [Sobjerajski, 1978]
    Sobjerajski, M., “A method of stochastic load flow calculation”,Archiv für Elektrotecnik (1978), pp. 37–40.Google Scholar
  43. [Svendsen and Wolthusen, 2007]
    N. K. Svendsen and S. D. Wolthusen, “Connectivity models of interdependency in mixed-type critical infrastructure networks”, Information Security Technical Report, 12(1): p. 44-55, 2007.CrossRefGoogle Scholar
  44. [Zimmermann, 2001]
    Zimmerman R., “Social Implications of Infrastructure Network Interactions”, Journal of Urban Technology, vol. 8, no. 3, pp 97–119, December 2001.CrossRefGoogle Scholar
  45. [Zio and Piccinelli, 2010]
    Zio, E., Piccinelli, R., “Randomized flow model and centrality measure for electrical power transmission network analysis”, Reliability Engineering and System Safety, 95 (2010) 379–385.CrossRefGoogle Scholar
  46. [Zio and Sansavini, 2008]
    E. Zio and G. Sansavini, “Modeling Failure Cascades in Network systems due to Distributed Random Disturbances”, ESREL 2008, European Safety and Reliability Conference, September 22–25, 2008, Valencia, Spain, pp. 1861–1866.Google Scholar
  47. [Zio and Sansavini, 2010]
    E. Zio and G. Sansavini, “Modeling Interdependent Network Systems for Identifying Cascade-Safe Operating Margins” submitted to IEEE Transactions on Reliability Special Issue on Complex Systems, 2010Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2011

Authors and Affiliations

  1. 1.Ecole Centrale Paris-SupelecParisFrance
  2. 2.Politecnico di MilanoMilanoItaly

Personalised recommendations