Smart grid vulnerability under cascade-based sequential line-switching attacks
Date of Original Version
Recently, the sequential attack, where multiple malignant contingencies are launched by attackers sequentially, has revealed power grid vulnerability under cascading failures. This paper systematically analyzes properties and features of N-k cascaded- based sequential line-switching attacks using a DC power flow based cascading failure simulator (DC- CFS). This paper first explains the key factors behind cascade-based attacks, then compares three adopted metrics with an original line-margin metric to compute vulnerability indexes and design sequential attacks. Two target search schemes, i.e., offline and online target search in sequential attacks, are also presented. Simulation results of N-2 to N-4 line-switching attacks have suggested that the proposed line margin metric produces stronger sequential attacks, and online target search is more effective than offline search. Reasons behind counter-intuitive load loss resulting from different metrics are also analyzed to facilitate future study on the risk of sequential attacks.
2015 IEEE Global Communications Conference, GLOBECOM 2015
Yan, Jun, Yufei Tang, Yihai Zhu, Haibo He, and Yan Sun. "Smart grid vulnerability under cascade-based sequential line-switching attacks." 2015 IEEE Global Communications Conference, GLOBECOM 2015 , (2015). doi:10.1109/GLOCOM.2014.7417255.