AU2020103195A4 - A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network - Google Patents

A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network Download PDF

Info

Publication number
AU2020103195A4
AU2020103195A4 AU2020103195A AU2020103195A AU2020103195A4 AU 2020103195 A4 AU2020103195 A4 AU 2020103195A4 AU 2020103195 A AU2020103195 A AU 2020103195A AU 2020103195 A AU2020103195 A AU 2020103195A AU 2020103195 A4 AU2020103195 A4 AU 2020103195A4
Authority
AU
Australia
Prior art keywords
power grid
model
topological model
vulnerability
grid topological
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2020103195A
Inventor
Chaoyang Chen
Li Ding
Cailun HUANG
Yanwu WANG
Huaicheng YAN
Xisheng Zhan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
East China University of Science and Technology
Huazhong University of Science and Technology
Wuhan University WHU
Hunan University of Science and Technology
Hubei Normal University
Original Assignee
East China University of Science and Technology
Huazhong University of Science and Technology
Wuhan University WHU
Hunan University of Science and Technology
Hubei Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by East China University of Science and Technology, Huazhong University of Science and Technology, Wuhan University WHU, Hunan University of Science and Technology, Hubei Normal University filed Critical East China University of Science and Technology
Priority to AU2020103195A priority Critical patent/AU2020103195A4/en
Application granted granted Critical
Publication of AU2020103195A4 publication Critical patent/AU2020103195A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00002Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by monitoring
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0428Safety, monitoring
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/048Monitoring; Safety
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J3/00Circuit arrangements for ac mains or ac distribution networks
    • H02J3/001Methods to deal with contingencies, e.g. abnormalities, faults or failures
    • H02J3/0012Contingency detection
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • G05B23/0243Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults model based detection method, e.g. first-principles knowledge model
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0259Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the response to fault detection
    • G05B23/0275Fault isolation and identification, e.g. classify fault; estimate cause or root of failure
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0259Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the response to fault detection
    • G05B23/0275Fault isolation and identification, e.g. classify fault; estimate cause or root of failure
    • G05B23/0281Quantitative, e.g. mathematical distance; Clustering; Neural networks; Statistical analysis
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J2203/00Indexing scheme relating to details of circuit arrangements for AC mains or AC distribution networks
    • H02J2203/10Power transmission or distribution systems management focussing at grid-level, e.g. load flow analysis, node profile computation, meshed network optimisation, active network management or spinning reserve management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02B90/20Smart grids as enabling technology in buildings sector
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S20/00Management or operation of end-user stationary applications or the last stages of power distribution; Controlling, monitoring or operating thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention discloses a large-scale power grid vulnerability monitoring method based on a complex network, which comprises the following steps of: establishing a power grid topological model, simplifying the model, analyzing the model, monitoring the vulnerability of the model and evaluating and processing the monitoring result; based on the complex network theory, the power grid topological model created by this invention can improve the evaluation capability of the model, represent the structural characteristics of the power grid through a group of model, draw a node degree distribution diagram and a median distribution diagram of the selected power grid through an artificial intelligence processing module in a graph module, enable the power grid topological model information and characteristic parameters to be easy to analyze and calculate through simplifying the topological model with low requirements on calculation performance, simultaneously, use four attack modes to attack the power grid model, which makes the monitoring data more comprehensive, ensures the monitoring accuracy of power grid vulnerability to a certain extent, realizes the reasonable quantification of electrical dynamic characteristics and static mechanism vulnerability response, and effectively monitors the vulnerable links in the power grid. -1/1 Establishment of Power Grid Topological Model Simplification of Power Grid Topological Model Analysis of Power Grid Topological Model Vulnerability Monitoring of Power Grid Topological Model Evaluation and Treatment of Monitoring Results Figure 1

Description

-1/1
Establishment of Power Grid Topological Model
Simplification of Power Grid Topological Model
Analysis of Power Grid Topological Model
Vulnerability Monitoring of Power Grid Topological Model
Evaluation and Treatment of Monitoring Results
Figure 1
A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network
TECHNICAL FIELD
The invention relates to the technical field of power grid vulnerability monitoring, in particular
to a large-scale power grid vulnerability monitoring method based on a complex network.
BACKGROUND
The increasing scale of power grid and large-scale interconnection of power grid is a trend in
the development of modern power system. Large power grid has achieved a wide range of resource
optimization, with the continuous expansion of power grid scale and the increasing complexity of
new components, it not only optimizes the configuration of the power grid, but also presents a new
challenge to the reliability of the system. Power grid blackout is often a chain reaction caused by
local faults of the vulnerable parts in power grid topological structure, thereby causing the collapse
of the whole system. Effectively monitoring the vulnerable parts of the large power grid, searching
for vulnerable nodes and lines, and taking defensive measures in advance can effectively increase
the reliability of the power grid, reduce the occurrence probability of power outage accidents, and
improve the overall stability of the system;
The traditional method of power grid monitoring is to establish dynamic mathematical
equation based on the working characteristics of distributed power grid, and then get to know the
structure of system through the calculation and simulation of the equation, as well as the analysis of
mathematical model. However, because of the dynamic nature of the network structure, it is
difficult to be characterized by a set of fixed network equations and mathematical models. As
components or systems such as electric vehicles, energy storage, microgrid and the like with dual
characteristics of power supply and load are connected to the power grid on a large scale, the
change of power supply and load becomes the norm, which makes the system network modeling
relatively difficult. In addition, the huge and complex network dynamic mathematical model is
extremely difficult to calculate and analyze, and the calculation performance requirement is high,
which is difficult to meet the requirements of real-time and monitoring accuracy. Therefore, the invention proposes a large-scale power grid vulnerability monitoring method based on a complex network so as to solve the problems existing in the prior art.
SUMMARY
In response to the above problems, the invention aims to provide a large-scale power grid vulnerability monitoring method based on a complex network. This method bases on the complex
network theory, improves the evaluation ability of topological model, characterizes the structural
characteristics of the power grid by one set of model and reduces the difficulty of modeling. By
simplifying the topological model, the information and characteristic parameters of the power grid topological model can be easily analyzed and calculated. The requirement for calculation
performance is not high. At the same time, four groups of attack modes are adopted to attack the
power grid model, so that the monitoring data are more comprehensive, the monitoring accuracy of power grid vulnerability is ensured to a certain extent, the reasonable quantification of electrical
dynamic characteristics and static mechanism vulnerability response is realized, and the vulnerable
parts in the power grid are effectively monitored.
In order to realize the object of the invention, the invention is accomplished through the
following technical scheme: a large-scale power grid vulnerability monitoring method based on a complex network, which comprises the following steps:
Step 1, establish a power grid topological model
First, select the power grid to be monitored. Then, according to the complex network theory, the generator is abstracted as the injected power on the generator outlet bus. The substation is
modeled according to the equivalent circuit, and the power supply and load on the low voltage side
are abstracted as active injected power on the corresponding bus at the same time. Then the
generator, substation and load are abstracted as network nodes, and the transmission line is abstracted as edges between nodes in the power grid to obtain the power grid topological model;
Step 2, simplify the power grid topological model
According to step 1, all power grid lines in the power grid topological model are simplified as undirected weighted edges, and the weight of the edges is the efficiency of the lines, then the initial value of the efficiency is set to be 1, and then the transmission lines with the same pole and parallel frame are merged to simplify the model without counting parallel capacitor branches to obtain a simplified power grid topological model;
Step 3, analyze the power grid topological model
According to step 2, at first, carry out information analysis on the power grid topological
model according to the obtained simplified power grid topological model. Then, calculate the
characteristic parameters of the power grid topological model according to the simplified power grid topological model. And then, according to the analyzed power grid topological model
information and the calculated characteristic parameters of it, the node degree distribution diagram
and the median distribution diagram of the selected power grid are drawn through the artificial intelligence processing module in the graphics module;
Step 4: monitor the vulnerability of the model
According to step 3, firstly, four attack modes are adopted to attack the power grid topological
model according to the node degree distribution diagram and the median distribution diagram of the
power grid, and then the connectivity of the power grid topological model under the attack of
different modes is monitored and analyzed, and the area where the connectivity of the power grid decreases in the monitoring process is a vulnerable part in the selected power grid;
Step 5, evaluate and process the monitoring result
According to step 4, firstly, index evaluation is carried out on the vulnerable part in the monitored power grid, and then corresponding defense measures are made on the vulnerable part of
the power grid according to the index evaluation results.
Further improvement is that in step 1, the lines in the power grid topological model include all
lines except power plant and substation buses, and the network nodes in the power grid topological
model are divided into generator node sets, load node sets and substation node sets.
Further improvement is that in the step 2, when the model is simplified, the power grid system
is simplified to a sparse connected graph composed of different nodes and different edges, and a complex network is composed of different nodes and different edges.
The further improvement is that in the step 3, the analyzed power grid topological model
information includes the total number of nodes, the total number of edges, the number of power supply nodes, the number of terminal nodes and the number of contact nodes of the model.
The further improvement is that in the step 3, the calculated characteristic parameters of the power grid topological model include the network average degree of the model, the average
distance of the actual power grid, the clustering coefficient and the random network parameters.
Further improvement is that in the step 4, the four attack modes are common attack modes,
including random attack mode, attack mode based on node degree, attack mode based on node median and chain attack mode based on node median.
Further improvement is that in the step 5, the defense measures include optimizing the network
structure of the power grid and reasonably arranging the layout of the power supply, wherein the
optimization of the network structure reduces the load borne by key nodes and lines in the power grid, and reasonably arranging the layout of the power supply makes the distribution of power flow
in the power grid as reasonable as possible.
The invention has the beneficial effects of: based on the complex network theory, the power
grid topological model created by this invention can improve the evaluation capability of the model,
represent the structural characteristics of the power grid through a group of model, draw a node
degree distribution diagram and a median distribution diagram of the selected power grid through an artificial intelligence processing module in a graph module, enable the power grid topological
model information and characteristic parameters to be easy to analyze and calculate through
simplifying the topological model with low requirements on calculation performance, simultaneously, use four attack modes to attack the power grid model, which makes the monitoring data more comprehensive, ensures the monitoring accuracy of power grid vulnerability
to a certain extent, realizes the reasonable quantification of electrical dynamic characteristics and
static mechanism vulnerability response, and effectively monitors the vulnerable links in the power
grid, thus facilitating the protection of the vulnerable parts in the power grid, further ensuring the normal operation of the power grid, reducing the occurrence of power outages, and worthy of wide promotion.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 is a flowchart of a vulnerability monitoring method of the present invention.
DESCRIPTION OF THE INVENTION
In order to deepen the understanding of the invention, the invention will be described in further
detail below with reference to examples, which are merely illustrative of the present invention and
are not intended to limit the protection scope of the invention.
According to Figure 1, this example provides a large-scale power grid vulnerability monitoring
method based on a complex network, comprising the following steps:
Step 1, establish a power grid topological model
First, select the power grid to be monitored. Then according to the complex network theory,
the generator is abstracted as the injected power on the generator outlet bus. The substation is
modeled according to the equivalent circuit. At the same time, the power supply and load on the low
voltage side are abstracted as active injection power on the corresponding bus. Generators,
substations and loads are then abstracted into network nodes, and the transmission lines are
abstracted as edges between nodes in the power grid to obtain a power grid topological model. The
lines in the power grid topological model include all lines except power plant and substation buses.
The network nodes in the power grid topological model are divided into generator node set, load
node set and substation node set.
Step 2, simplify the power grid topological model
According to step one, Firstly, all lines in the network topological model are simplified as
undirected weighted edges, The weight of the edges is the efficiency, Set the initial performance
value of the line to be 1, and then merge the transmission lines with the same pole and parallel
frame, simplify the model without considering the parallel capacitor branches, and obtain a
simplified power grid topological model. When the model is simplified, the power grid system is
simplified as a sparse connected graph composed of different nodes and different edges, and the complex network is composed of different nodes and different edges.
Step 3, analyze the power grid topological model
According to step 2, at first, analyze the information of the network topological model according to the obtained simplified network topological model. The information includes the total number of nodes, the total number of sides, the number of power supply nodes, the number of
terminal nodes and the number of contact nodes of the model. Then the characteristic parameters of the power network topological model are calculated according to the simplified power network
topological model. The calculated parameters include the average power of the model, the average distance of the actual power grid, the clustering coefficient and the random network parameters.
Then, according to the analyzed information and the calculated parameters, the node degree
distribution diagram and the intermediary distribution diagram of the selected power grid are drawn through the artificial intelligence processing module in the graphics module;
Step 4: monitor the vulnerability of the model
According to step 3, firstly, four attack modes are used to attack the topological model of the
power grid according to the node degree distribution diagram and the median distribution diagram
of the power grid. Then monitoring and analyzing the connectivity of power network topological
model under different attacks. During the monitoring process, the area where the connectivity of the power grid decreases is the vulnerable part in the selected power grid. Four attack modes are
common attack modes, including random attack mode, attack mode based on node degree, attack
mode based on node median and chain attack mode based on node median.
Step 5, evaluate and process the monitoring result
According to step 4, at first, evaluating the index of the vulnerable parts in the power grid.
Then, according to the evaluation result of the index, corresponding defense measures are made for
the vulnerable parts of the power grid. The defense measures include the optimization of the power grid network structure and the reasonable arrangement and layout of the power supply. The
optimization of the network structure reduces the load borne by the key nodes and lines in the
power grid, and the reasonable arrangement of the power supply layout makes the distribution of
power flow in the power grid as reasonable as possible.
Based on the complex network-based large-scale power grid vulnerability monitoring method and the complex network theory, the power grid topological model can improve the evaluation
capability of the model, represent the structural characteristics of the power grid through a group of
model, draw a node degree distribution diagram and a median distribution diagram of the selected
power grid through an artificial intelligence processing module in a graph module, enable the power grid topological model information and characteristic parameters to be easy to analyze and calculate
through simplifying the topological model with low requirements on calculation performance,
simultaneously, use four attack modes to attack the power grid model, which makes the monitoring data more comprehensive, ensures the monitoring accuracy of power grid vulnerability
to a certain extent, realizes the reasonable quantification of electrical dynamic characteristics and
static mechanism vulnerability response, and effectively monitors the vulnerable links in the power
grid,
The basic principles, main features and advantages of the invention have been shown and described above. It shall be understood by those skilled in the art that the invention is not limited to
the above-described embodiments, and that the above-described embodiments and description are
merely illustrative of the principles of the invention, and that various changes and modifications
may be made therein without departing from the spirit and scope of it, which fall within the scope of the claimed invention. The scope of the invention is defined by the appended claims and their
equivalents.

Claims (7)

1. A large-scale power grid vulnerability monitoring method based on a complex network,
characterized in that it comprises the following steps:
Step 1, establish a power grid topological model
First, select the power grid to be monitored. Then, according to the complex network theory,
the generator is abstracted as the injected power on the generator outlet bus. The substation is
modeled according to the equivalent circuit, and the power supply and load on the low voltage side
are abstracted as active injected power on the corresponding bus at the same time. Then the
generator, substation and load are abstracted as network nodes, and the transmission line is
abstracted as edges between nodes in the power grid to obtain the power grid topological model;
Step 2, simplify that power grid topological model
According to step 1, all power grid lines in the power grid topological model are simplified as
undirected weighted edges, and the weight of the edges is the efficiency of the lines, then the initial
value of the efficiency is set to be 1, and then the transmission lines with the same pole and parallel
frame are merged to simplify the model without counting parallel capacitor branches to obtain a
simplified power grid topological model;
Step 3, analyze the power grid topological model
According to step 2, at first, carry out information analysis on the power grid topological
model according to the obtained simplified power grid topological model. Then, calculate the
characteristic parameters of the power grid topological model according to the simplified power
grid topological model. And then, according to the analyzed power grid topological model
information and the calculated characteristic parameters of it, the node degree distribution diagram
and the median distribution diagram of the selected power grid are drawn through the artificial
intelligence processing module in the graphics module;
Step 4: monitor the vulnerability of the model
According to step 3, firstly, four attack modes are adopted to attack the power grid topological model according to the node degree distribution diagram and the median distribution diagram of the power grid, and then the connectivity of the power grid topological model under the attack of different modes is monitored and analyzed, and the area where the connectivity of the power grid decreases in the monitoring process is a vulnerable part in the selected power grid;
Step 5, evaluate and process the monitoring result
According to step 4, firstly, index evaluation is carried out on the vulnerable part in the
monitored power grid, and then corresponding defense measures are made on the vulnerable part of
the power grid according to the index evaluation results.
2. A large-scale power grid vulnerability monitoring method based on a complex network
according to claim 1, characterized in that: in the first step, the lines in the power grid topological
model include all lines except power plant and substation buses, and the network nodes in the
power grid topological model are divided into generator node set, load node set and substation node
set.
3. A large-scale power grid vulnerability monitoring method based on a complex network
according to claim 1, characterized in that: in the second step, when the model is simplified, the
power grid system is simplified into a sparse connection graph composed of different nodes and
different edges, and the complex network is composed of different nodes and different edges.
4. A large-scale power grid vulnerability monitoring method based on a complex network
according to claim 1, characterized in that: in the step 3, the analyzed power grid topological model
information comprises the total number of nodes, the total number of edges, the number of power
supply nodes, the number of terminal nodes and the number of contact nodes of the model.
5. A large-scale power grid vulnerability monitoring method based on a complex network
according to claim 1, characterized in that: in the step 3, the calculated power grid topological
model characteristic parameters include the network average degree of the model, the average
distance of the actual power grid, the clustering coefficient and the random network parameters.
6. A large-scale power grid vulnerability monitoring method based on a complex network
according to claim 1, characterized in that: in the step 4, the four attack modes are common attack modes, including random attack mode, attack mode based on node degree, attack mode based on node median and chain attack mode based on node median.
7. A large-scale grid vulnerability monitoring method based on a complex network according to claim 1, characterized in that in step 5, the defense measures include optimizing the network
structure of the power grid and reasonably arranging the layout of the power supply, wherein the
optimization of the network structure reduces the load borne by key nodes and lines in the power
grid, and reasonably arranging the layout of the power supply makes the distribution of power flow in the power grid as reasonable as possible.
-1/1-
Establishment of Power Grid Topological Model 2020103195
Simplification of Power Grid Topological Model
Analysis of Power Grid Topological Model
Vulnerability Monitoring of Power Grid Topological Model
Evaluation and Treatment of Monitoring Results
Figure 1
AU2020103195A 2020-11-03 2020-11-03 A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network Ceased AU2020103195A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2020103195A AU2020103195A4 (en) 2020-11-03 2020-11-03 A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2020103195A AU2020103195A4 (en) 2020-11-03 2020-11-03 A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network

Publications (1)

Publication Number Publication Date
AU2020103195A4 true AU2020103195A4 (en) 2021-01-14

Family

ID=74103460

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2020103195A Ceased AU2020103195A4 (en) 2020-11-03 2020-11-03 A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network

Country Status (1)

Country Link
AU (1) AU2020103195A4 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113094975A (en) * 2021-03-22 2021-07-09 西安交通大学 Method, system, equipment and storage medium for evaluating vulnerability of smart grid node
CN113220449A (en) * 2021-04-27 2021-08-06 武汉大学 Vulnerable line identification method and system based on edge calculation
CN113722868A (en) * 2021-09-03 2021-11-30 湘潭大学 Multi-index power grid node vulnerability assessment method fusing structure hole characteristics
CN113904786A (en) * 2021-06-29 2022-01-07 重庆大学 False data injection attack identification method based on line topology analysis and power flow characteristics
CN114169118A (en) * 2021-12-17 2022-03-11 国网上海市电力公司 Power distribution network topological structure identification method considering distributed power supply output correlation
CN114513442A (en) * 2022-01-06 2022-05-17 国网山东省电力公司泰安供电公司 Network security testing device and method based on power Internet of things
CN114793200A (en) * 2021-01-25 2022-07-26 中国科学院沈阳自动化研究所 Important Internet of things node identification method based on power Internet of things network structure
CN115099662A (en) * 2022-07-07 2022-09-23 国网经济技术研究院有限公司 Direct current transmission end power grid vulnerability evaluation method, system, medium and computing equipment
CN115173413A (en) * 2022-08-10 2022-10-11 湖南科技大学 Power grid fragile line identification method based on novel electrical betweenness
CN115801591A (en) * 2023-02-15 2023-03-14 聊城金恒智慧城市运营有限公司 Quantitative calculation method for network security vulnerability assessment
CN116976154A (en) * 2023-09-25 2023-10-31 国网北京市电力公司 Electric power system vulnerability testing method based on induction factors
CN117390233A (en) * 2023-12-11 2024-01-12 中国建筑西南设计研究院有限公司 Load capacity transfer method and system of power supply network system in building engineering

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114793200A (en) * 2021-01-25 2022-07-26 中国科学院沈阳自动化研究所 Important Internet of things node identification method based on power Internet of things network structure
CN114793200B (en) * 2021-01-25 2023-09-26 中国科学院沈阳自动化研究所 Important internet of things node identification method based on electric power internet of things network structure
CN113094975B (en) * 2021-03-22 2024-04-05 西安交通大学 Smart grid node vulnerability assessment method, smart grid node vulnerability assessment system, smart grid node vulnerability assessment device and storage medium
CN113094975A (en) * 2021-03-22 2021-07-09 西安交通大学 Method, system, equipment and storage medium for evaluating vulnerability of smart grid node
CN113220449A (en) * 2021-04-27 2021-08-06 武汉大学 Vulnerable line identification method and system based on edge calculation
CN113220449B (en) * 2021-04-27 2023-11-14 武汉大学 Vulnerable line identification method and structure based on edge calculation
CN113904786A (en) * 2021-06-29 2022-01-07 重庆大学 False data injection attack identification method based on line topology analysis and power flow characteristics
CN113722868B (en) * 2021-09-03 2024-03-26 湘潭大学 Multi-index power grid node vulnerability assessment method integrating structural hole characteristics
CN113722868A (en) * 2021-09-03 2021-11-30 湘潭大学 Multi-index power grid node vulnerability assessment method fusing structure hole characteristics
CN114169118A (en) * 2021-12-17 2022-03-11 国网上海市电力公司 Power distribution network topological structure identification method considering distributed power supply output correlation
CN114513442A (en) * 2022-01-06 2022-05-17 国网山东省电力公司泰安供电公司 Network security testing device and method based on power Internet of things
CN115099662A (en) * 2022-07-07 2022-09-23 国网经济技术研究院有限公司 Direct current transmission end power grid vulnerability evaluation method, system, medium and computing equipment
CN115173413A (en) * 2022-08-10 2022-10-11 湖南科技大学 Power grid fragile line identification method based on novel electrical betweenness
US11983472B2 (en) 2022-08-10 2024-05-14 Hunan University Of Science And Technology Method for identifying fragile lines in power grids based on electrical betweenness
CN115801591B (en) * 2023-02-15 2023-04-18 聊城金恒智慧城市运营有限公司 Quantitative calculation method for network security vulnerability assessment
CN115801591A (en) * 2023-02-15 2023-03-14 聊城金恒智慧城市运营有限公司 Quantitative calculation method for network security vulnerability assessment
CN116976154B (en) * 2023-09-25 2023-12-22 国网北京市电力公司 Electric power system vulnerability testing method based on induction factors
CN116976154A (en) * 2023-09-25 2023-10-31 国网北京市电力公司 Electric power system vulnerability testing method based on induction factors
CN117390233A (en) * 2023-12-11 2024-01-12 中国建筑西南设计研究院有限公司 Load capacity transfer method and system of power supply network system in building engineering
CN117390233B (en) * 2023-12-11 2024-02-13 中国建筑西南设计研究院有限公司 Load capacity transfer method and system of power supply network system in building engineering

Similar Documents

Publication Publication Date Title
AU2020103195A4 (en) A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network
CN100438251C (en) A large electric system vulnerable line identifying method
CN110034581A (en) The electrical betweenness vulnerability assessment method in the section of electric system under wind-electricity integration
Fu et al. Vulnerability assessment for power grid based on small-world topological model
CN104077393A (en) Optimal splitting section search method based on semi-supervised spectral clustering
Zhao et al. Condition monitoring of power transmission and transformation equipment based on industrial internet of things technology
CN111160716A (en) Large power grid vulnerability assessment method based on tidal current betweenness
CN112329376A (en) Monte Carlo simulation-based substation system shock resistance toughness quantitative evaluation algorithm
Liu et al. Evolving graph based power system EMS real time analysis framework
CN114336628A (en) Photovoltaic power supply access distribution network safety evaluation method based on random power flow
Chen et al. Cyber-physical power system vulnerability analysis based on complex network theory
CN112103950B (en) Power grid partitioning method based on improved GN splitting algorithm
CN111191867B (en) Reliability evaluation method for complex network of power system
CN104283208A (en) Decomposition coordination calculating method for probabilistic available power transmission capability of large-scale electric network
CN115859627A (en) Dynamic simulation model, screening method, equipment and medium for cascading failure of power system
CN115293454A (en) Power system reliability rapid optimization method considering topological change
Sun et al. Weighted power network node importance evaluation based on node deletion method
Zhang et al. Computation of nodal electricity carbon intensity based on graph parallel aggregation and recursion
Wei et al. Resilience Assessment Using Simulation System of Distribution Network under Extreme Weather
Wang et al. Vulnerability assessment method of electrical cyber–physical interdependent network considering node heterogeneity
Peng et al. Stochastic Vulnerability Analysis methodology for Power Transmission Network Considering Wind Generation
US11983472B2 (en) Method for identifying fragile lines in power grids based on electrical betweenness
Ma et al. Application of multi-factor dynamic interaction graph in vulnerability assessment and online monitoring of transmission lines
CN115714377A (en) Online identification method and system for key power transmission section of power grid and storage medium
Zhangkai et al. Research on edge importance measure in double-layer small-word networks

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry