Loading [MathJax]/extensions/MathMenu.js
Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid | IEEE Journals & Magazine | IEEE Xplore

Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid


Abstract:

Power grids are often run near the operational limits because of increasing electricity demand, where even small disturbances could possibly trigger major blackouts. The ...Show More

Abstract:

Power grids are often run near the operational limits because of increasing electricity demand, where even small disturbances could possibly trigger major blackouts. The attacks are the potential threats to trigger large-scale cascading failures in the power grid. In particular, the attacks mean to make substations/transmission lines lose functionality by either physical sabotages or cyber attacks. Previously, the attacks were investigated from substation-only/transmission-line-only perspectives, assuming attacks can occur only on substations/transmission lines. In this paper, we introduce the joint substation-transmission line perspective, which assumes attacks can happen on substations, transmission lines, or both. The introduced perspective is a nature extension to substation-only and transmission-line-only perspectives. Such extension leads to discovering many joint substation-transmission line vulnerabilities. Furthermore, we investigate the joint substation-transmission line attack strategies. In particular, we design a new metric, the component interdependency graph (CIG), and propose the CIG-based attack strategy. In simulations, we adopt IEEE 30 bus system, IEEE 118 bus system, and Bay Area power grid as test benchmarks, and use the extended degree-based and load attack strategies as comparison schemes. Simulation results show the CIG-based attack strategy has stronger attack performance.
Page(s): 1010 - 1024
Date of Publication: 20 January 2015

ISSN Information:

Funding Agency:

Citations are not available for this document.

I. Introduction

The U.S. power grid has been developing over a century and becomes an extremely complicated system that has more than 55,000 substations and nearly 500,000 kilometers of transmission lines. Such a complex system likely experiences severe blackouts, which cause catastrophe to modern societies. For instance, Northeastern blackout of 2003 left more than 55 million people in dark for days and resulted in estimated 10 billion U.S. dollar economic loss [1], [2]. In addition, the emergence of the “Smart Grid”, the next-generation power transmission system [3], can significantly increase the risk of system failures caused by errors from computer software and hardware [4], cyber intrusions [5], [6], and so on.

Cites in Papers - |

Cites in Papers - IEEE (26)

Select All
1.
Sizhe He, Yuxun Zhou, Yadong Zhou, Jiang Wu, Ting Liu, Xiaohong Guan, "Data-Driven Identification Model of Vulnerable Set for Cascading Failure in Power Grid", IEEE Transactions on Automation Science and Engineering, vol.22, pp.3097-3112, 2025.
2.
Sizhe He, Yadong Zhou, Yujie Yang, Ting Liu, Yuxun Zhou, Jie Li, Tong Wu, Xiaohong Guan, "Cascading Failure in Cyber–Physical Systems: A Review on Failure Modeling and Vulnerability Analysis", IEEE Transactions on Cybernetics, vol.54, no.12, pp.7936-7954, 2024.
3.
Rachad Atat, Muhammad Ismail, Erchin Serpedin, "Graphon-based Synthetic Power System Model and its Application in System Risk Analysis", 2023 IEEE International Smart Cities Conference (ISC2), pp.1-6, 2023.
4.
Rachad Atat, Muhammad Ismail, Erchin Serpedin, "Joint Cascade Vulnerability Assessment of Interdependent Power–Water Infrastructures", IEEE Systems Journal, vol.17, no.4, pp.5931-5942, 2023.
5.
Zhenyong Zhang, Ruilong Deng, Youliang Tian, Peng Cheng, Jianfeng Ma, "SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid", IEEE Transactions on Information Forensics and Security, vol.18, pp.581-596, 2023.
6.
Rachad Atat, Muhammad Ismail, Erchin Serpedin, "Limiting the Failure Impact of Interdependent Power-Communication Networks via Optimal Partitioning", IEEE Transactions on Smart Grid, vol.14, no.1, pp.732-745, 2023.
7.
Divya Jyoti, Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel, "ALKAF: An Anonymous Lightweight Key Agreement Framework For Smart Grid Network", 2022 IEEE 19th India Council International Conference (INDICON), pp.1-6, 2022.
8.
Airin Rahman, Xue Gao, Jian Xie, Inalvis Alvarez-Fernandez, Hamed Haggi, Wei Sun, "Challenges and Opportunities in Cyber-Physical Security of Highly DER-Penetrated Power Systems", 2022 IEEE Power & Energy Society General Meeting (PESGM), pp.1-5, 2022.
9.
Rachad Atat, Muhammad Ismail, Erchin Serpedin, "Most Critical Nodes-Based Attack Strategies Comparison in Interdependent Power-Communication Networks", 2022 3rd International Conference on Smart Grid and Renewable Energy (SGRE), pp.1-6, 2022.
10.
Rachad Atat, Muhammad Ismail, Shady S. Refaat, Erchin Serpedin, Thomas Overbye, "Cascading Failure Vulnerability Analysis in Interdependent Power Communication Networks", IEEE Systems Journal, vol.16, no.3, pp.3500-3511, 2022.
11.
Rachad Atat, Muhammad Ismail, Shady S. Refaat, Erchin Serpedin, "On the Impact of Control Center Allocation on Power-Communication Network Vulnerability", 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), pp.1-6, 2021.
12.
Meng Zhang, Shan Fu, Jun Yan, Huiyan Zhang, Chenhao Ling, Chao Shen, Peng Shi, "An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks", 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp.921-926, 2021.
13.
Amir Gholami, Anurag K. Srivastava, "Comparative Analysis of ML Techniques for Data-Driven Anomaly Detection, Classification and Localization in Distribution System", 2020 52nd North American Power Symposium (NAPS), pp.1-6, 2021.
14.
Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Premkumar Manoharan, Lucian Mihet-Popa, "Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications", IEEE Access, vol.8, pp.151019-151064, 2020.
15.
Tao Ding, Ming Qu, Xiong Wu, Boyu Qin, Yongheng Yang, Frede Blaabjerg, "Defense Strategy for Resilient Shipboard Power Systems Considering Sequential Attacks", IEEE Transactions on Information Forensics and Security, vol.15, pp.3443-3453, 2020.
16.
Weizhe Zhang, Bin Zhang, Ying Zhou, Hui He, Zeyu Ding, "An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks", IEEE Internet of Things Journal, vol.7, no.5, pp.3991-3999, 2020.
17.
Li Changchao, Kang Zhongjian, Yu Hongguo, Ri Kihong, Zheng Shichao, "Identifying the Key Transmission Lines Considering the Power Flow Impact Force", IEEE Access, vol.7, pp.96297-96308, 2019.
18.
Jian Zhang, Huanran Jin, Liangyi Gong, Jing Cao, Zhaojun Gu, "Overview of IoT Security Architecture", 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), pp.338-345, 2019.
19.
A. B. M. Nasiruzzaman, M. N. Akter, M. A. Mahmud, H. R. Pota, "Network Theory Based Power Grid Criticality Assessment", 2018 IEEE International Conference on Power Electronics, Drives and Energy Systems (PEDES), pp.1-5, 2018.
20.
Yuxun Zhou, Reza Arghandeh, Costas J. Spanos, "Partial Knowledge Data-Driven Event Detection for Power Distribution Networks", IEEE Transactions on Smart Grid, vol.9, no.5, pp.5152-5162, 2018.
21.
Yingmeng Xiang, Lingfeng Wang, Nian Liu, "A Robustness-Oriented Power Grid Operation Strategy Considering Attacks", IEEE Transactions on Smart Grid, vol.9, no.5, pp.4248-4261, 2018.
22.
Hui Lin, Adam Slagell, Zbigniew T. Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer, "Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids", IEEE Transactions on Smart Grid, vol.9, no.1, pp.163-178, 2018.
23.
Weixian Liao, Sergio Salinas, Ming Li, Pan Li, Kenneth A. Loparo, "Cascading Failure Attacks in the Power System: A Stochastic Game Perspective", IEEE Internet of Things Journal, vol.4, no.6, pp.2247-2259, 2017.
24.
Rui Tan, Hoang Hai Nguyen, Eddy. Y. S. Foo, David K. Y. Yau, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Hoay Beng Gooi, "Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control", IEEE Transactions on Information Forensics and Security, vol.12, no.7, pp.1609-1624, 2017.
25.
Jun Yan, Haibo He, Xiangnan Zhong, Yufei Tang, "Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks", IEEE Transactions on Information Forensics and Security, vol.12, no.1, pp.200-210, 2017.
26.
Md Masud Rana, Li Li, Steven W. Su, "Microgrid protection and control through reliable smart grid communication systems", 2016 14th International Conference on Control, Automation, Robotics and Vision (ICARCV), pp.1-6, 2016.

Cites in Papers - Other Publishers (25)

1.
Swati Goel, "A systematic literature review on past attack analysis on industrial control systems", Transactions on Emerging Telecommunications Technologies, vol.35, no.6, 2024.
2.
Yu Cao, HaoDi Song, Tao Zhang, PuFan Lu, "Research on location detection method of power network false data injection based on FCN-GRU", 2nd International Conference on Mechanical, Electronics, and Electrical and Automation Control (METMS 2022), pp.217, 2022.
3.
Xiaopeng Li, Liyan Ji, Hanyu Zhu, Peng Li, Xuefeng Jia, Cunbin Li, "Cellular automata-based simulation of cross-space transmission of Energy Local Area Network risks: A case study of a power supply station in Beijing", Sustainable Energy, Grids and Networks, vol.27, pp.100521, 2021.
4.
Maosheng Sang, Yi Ding, Ming Ding, Minglei Bao, Peng Wang, Lei Sun, "Metrics and quantification of power‐line and pipeline resiliency in integrated gas and power systems", IET Generation, Transmission & Distribution, vol.15, no.21, pp.3001, 2021.
5.
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Saurabh Rana, "LAKAF: Lightweight authentication and key agreement framework for smart grid network", Journal of Systems Architecture, vol.116, pp.102053, 2021.
6.
Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, "Security aspects of Internet of Things aided smart grids: A bibliometric survey", Internet of Things, vol.14, pp.100111, 2021.
7.
Peng Jiang, Shengjun Huang, Tao Zhang, "Asymmetric Information in Military Microgrid Confrontations?Evaluation Metric and Influence Analysis", Energies, vol.13, no.8, pp.1954, 2020.
8.
Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu, "Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links", Security and Privacy in Social Networks and Big Data, vol.1298, pp.369, 2020.
9.
Weixian Liao, Pan Li, "Cascading Failure Attacks in the Power System", Security of Cyber-Physical Systems, pp.53, 2020.
10.
Saqib Hasan, Abhishek Dubey, Gabor Karsai, Xenofon Koutsoukos, "A game-theoretic approach for power systems defense against dynamic cyber-attacks", International Journal of Electrical Power & Energy Systems, vol.115, pp.105432, 2020.
11.
Abhishek Gupta, Alagan Anpalagan, Glaucio H.S. Carvalho, Ahmed S. Khwaja, Ling Guan, Isaac Woungang, "RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey", Journal of Network and Computer Applications, vol.132, pp.118, 2019.
12.
Peng Jiang, Shengjun Huang, Tao Zhang, "Optimal Deception Strategies in Power System Fortification against Deliberate Attacks", Energies, vol.12, no.3, pp.342, 2019.
13.
Oswaldo Menéndez, Marcelo Pérez, Fernando Auat Cheein, "Visual-Based Positioning of Aerial Maintenance Platforms on Overhead Transmission Lines", Applied Sciences, vol.9, no.1, pp.165, 2019.
14.
Tao Ding, Cheng Li, Chen Chen, Bo Chen, Yongheng Yang, "Risk assessment-based long-term transmission system hardening under prior probabilistic information", IET Generation, Transmission & Distribution, vol.13, no.1, pp.108-115, 2019.
15.
Pengshuai Cui, Peidong Zhu, Peng Xun, Chengcheng Shao, "Robustness of Cyber-Physical Systems against Simultaneous, Sequential and Composite Attack", Electronics, vol.7, no.9, pp.196, 2018.
16.
Dariush Abbasinezhad?Mood, Morteza Nikooghadam, "Design and extensive hardware performance analysis of an efficient pairwise key generation scheme for Smart Grid", International Journal of Communication Systems, vol.31, no.5, 2018.
17.
Libao Shi, Qiangsheng Dai, Yixin Ni, "Cyber–physical interactions in power systems: A review of models, methods, and applications", Electric Power Systems Research, vol.163, pp.396, 2018.
18.
Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Jianfeng Lu, Zhaolong Hu, "Reliability analysis in interdependent smart grid systems", Physica A: Statistical Mechanics and its Applications, vol.500, pp.50, 2018.
19.
Fan Wenli, Zhang Xuemin, Mei Shengwei, Huang Shaowei, Wei Wei, Ding Lijie, "Vulnerable transmission line identification using ISH theory in power grids", IET Generation, Transmission & Distribution, vol.12, no.4, pp.1014-1020, 2018.
20.
Tao Ding, Li Yao, Fangxing Li, "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection", Reliability Engineering & System Safety, vol.169, pp.179, 2018.
21.
Hengdao Guo, Ciyan Zheng, Herbert Ho-Ching Iu, Tyrone Fernando, "A critical review of cascading failure analysis and modeling of power system", Renewable and Sustainable Energy Reviews, vol.80, pp.9, 2017.
22.
Yingmeng Xiang, Lingfeng Wang, Nian Liu, "Coordinated attacks on electric power systems in a cyber-physical environment", Electric Power Systems Research, vol.149, pp.156, 2017.
23.
Ye Cai, Yong Li, Yijia Cao, Wenguo Li, Xiangjun Zeng, "Modeling and impact analysis of interdependent characteristics on cascading failures in smart grids", International Journal of Electrical Power & Energy Systems, vol.89, pp.106, 2017.
24.
Haibo He, Jun Yan, "Cyber-physical attacks and defences in the smart grid: a survey", IET Cyber-Physical Systems: Theory & Applications, vol.1, no.1, pp.13-27, 2016.
25.
Fan Wenli, Liu Zhigang, Hu Ping, Mei Shengwei, "Cascading failure model in power grids using the complex network theory", IET Generation, Transmission & Distribution, vol.10, no.15, pp.3940-3949, 2016.
Contact IEEE to Subscribe

References

References is not available for this document.