Smart grid vulnerability under cascade-based sequential line-switching attacks
Document Type
Conference Proceeding
Date of Original Version
1-1-2015
Abstract
Recently, the sequential attack, where multiple malignant contingencies are launched by attackers sequentially, has revealed power grid vulnerability under cascading failures. This paper systematically analyzes properties and features of N-k cascaded- based sequential line-switching attacks using a DC power flow based cascading failure simulator (DC- CFS). This paper first explains the key factors behind cascade-based attacks, then compares three adopted metrics with an original line-margin metric to compute vulnerability indexes and design sequential attacks. Two target search schemes, i.e., offline and online target search in sequential attacks, are also presented. Simulation results of N-2 to N-4 line-switching attacks have suggested that the proposed line margin metric produces stronger sequential attacks, and online target search is more effective than offline search. Reasons behind counter-intuitive load loss resulting from different metrics are also analyzed to facilitate future study on the risk of sequential attacks.
Publication Title, e.g., Journal
2015 IEEE Global Communications Conference, GLOBECOM 2015
Citation/Publisher Attribution
Yan, Jun, Yufei Tang, Yihai Zhu, Haibo He, and Yan Sun. "Smart grid vulnerability under cascade-based sequential line-switching attacks." 2015 IEEE Global Communications Conference, GLOBECOM 2015 (2015). doi: 10.1109/GLOCOM.2014.7417255.