學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 多種連鎖性失效的電網分析及有效率多重攻擊策略
Various cascading failure models on power grids and efficient multi-target attack strategy
作者 林丁順
貢獻者 蕭又新
Shiau, Yuo Hsien
林丁順
關鍵詞 電力網路
複雜網路
脆弱性分析
連鎖性失效
攻擊策略
日期 2013
上傳時間 6-Aug-2014 11:47:32 (UTC+8)
摘要 在真實網路中,一個節點或連結的損壞可能會造成網路大規模崩解,這現象亦出現在過去許多電力系統的大停電事件中。因此由網路的觀點對電力系統是否安全和穩定之研究一直是備受探討。在本論文中使用複雜網路方法對台灣電力網路進行脆弱性分析,並由攻擊者的角度使用多重攻擊策略探討網路脆弱性。
      本論文中使用了拓樸性效率脆弱性(efficiency vulnerability)和四種連鎖性失效模型針對台灣電力網路進行分析,其中包含三種靜態負載的連鎖性失效模型(static load cascading failure model)和一種動態負載的連鎖性失效模型(dynamic load cascading failure model),藉由這些不同觀點檢視台灣電力網路的脆弱性。
      以上模擬皆為攻擊單一連結,但若以攻擊者的觀點,其可以同時對多個連結進行破壞,因此最後部分為如何有效對網路造成傷害的多重攻擊策略,我們應用此攻擊策略於隨機網路(random network)以及無尺度網路(scale-free network)測試其有效性,最後將此攻擊策略應用於台灣電力網路,並從結果中透露出台灣電力網路相當脆弱。
參考文獻 Reference
     
     [1] Chen, Jie, J. Thorp, and Manu Parashar. "Analysis of electric power system disturbance data." 2013 46th Hawaii International Conference on System Sciences. Vol. 2. IEEE Computer Society, 2001.
     [2] U. S. C. p. s. o. t. force, "Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations," April 2004.
     [3] Glanz, J. and R. Perez-Pena (2003). That Left Tens of Millions of People in the Dark. New York Times. 26.
     [4] D. N. Kosterev, et al., "Model validation for the August 10, 1996 WSCC system outage," IEEE Transactions on Power Systems, vol. 14, pp. 967-974, Aug 1999
     [5] Wong, J. J. (2007). Study of Preventive and Remedial Strategies based on Simulations and Analyses of 729 Blackout in Taiwan Power System. Electrical Engineering, National Chung Cheng University.
     [6] Strogatz, S. H. (2001). "Exploring complex networks." Nature 410: 268-276.
     [7] M.E.J Newman, Networks : an introduction, Oxford University Press, Oxford; New York, 2010
     [8] Brandes, Ulrik. "A faster algorithm for betweenness centrality*." Journal of Mathematical Sociology 25.2 (2001): 163-177.
     [9] Erdős, P., and A. Rényi. "On the evolution of random graphs." Selected Papers of Alfréd Rényi, vol 2 (1976): 482-525.
     [10] Barabási, Albert-László, and Réka Albert. "Emergence of scaling in random networks." science 286.5439 (1999): 509-512.
     [11] Latora, V. and M. Marchiori (2001). "Efficient Behavior of Small-World Networks." Physical Review Letters 87.
     [12] Eusgeld, I., et al. (2009). "The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures." Reliability Engineering and System Safety 94: 954-963.
     [13] Motter, A. E. and Y.-C Lai (2002). "Cascade-based attacks on complex networks. " Physical Review E 66(065102)
     [14] Crucitti, Paolo, et al. "Error and attack tolerance of complex networks." Physica A: Statistical Mechanics and its Applications 340.1 (2004): 388-394.
     [15] Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol. 389, pp. 595–603. Elsevier, Amsterdam (2010)
     [16] S. Tamronglak, “Analysis of power system disturbances due to relay hidden failures,” Ph.D. dissertation, Virginia Polytechnic Institute State Univ., Blacksburg, 1994.
     [17] J. Chen, J. Thorp, I. Dobson, Electrical Power & Energy Systems 27 (2005) 318
     [18] Simonsen, I., et al. (2008). "Transient Dynamics Increasing Network Vulnerability to Cascading Failures." Physical Review Letters 100.
     [19] Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems", IEEE GLOBECOM 2012, Dec. 2012.
     [20] S. Arianos, E. Bompard, A. Carbone, F. Xue, Power grid vulnerability: a complex network approach, Chaos, 19(2009)013119.
     [21] Wang, Jiaoe, et al. "Exploring the network structure and nodal centrality of China’s air transport network: A complex network approach." Journal of Transport Geography 19.4 (2011): 712-721.
     [22] Crucitti, Paolo, Vito Latora, and Massimo Marchiori. "Model for cascading failures in complex networks." Physical Review E 69.4 (2004): 045104.
     [23] Kinney, Ryan, et al. "Modeling cascading failures in the North American power grid." The European Physical Journal B-Condensed Matter and Complex Systems 46.1 (2005): 101-107.
     [24] Goh, K-I., B. Kahng, and D. Kim. "Universal behavior of load distribution in scale-free networks." Physical Review Letters 87.27 (2001): 278701.
     [25] Brandes, Ulrik. "On variants of shortest-path betweenness centrality and their generic computation." Social Networks 30.2 (2008): 136-145.
     [26] Liu, Y. H. (2012). Computational large-scale complex networks : competition network and power grid. Applied Physics, National Chengchi University.
     [27] Yi, C. K. (2013). Group-based vulnerability analyses on power grid and associated protection strategies against cascading failures. Applied Physics, National Chengchi University.
描述 碩士
國立政治大學
應用物理研究所
100755003
102
資料來源 http://thesis.lib.nccu.edu.tw/record/#G1007550031
資料類型 thesis
dc.contributor.advisor 蕭又新zh_TW
dc.contributor.advisor Shiau, Yuo Hsienen_US
dc.contributor.author (Authors) 林丁順zh_TW
dc.creator (作者) 林丁順zh_TW
dc.date (日期) 2013en_US
dc.date.accessioned 6-Aug-2014 11:47:32 (UTC+8)-
dc.date.available 6-Aug-2014 11:47:32 (UTC+8)-
dc.date.issued (上傳時間) 6-Aug-2014 11:47:32 (UTC+8)-
dc.identifier (Other Identifiers) G1007550031en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/68268-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 應用物理研究所zh_TW
dc.description (描述) 100755003zh_TW
dc.description (描述) 102zh_TW
dc.description.abstract (摘要) 在真實網路中,一個節點或連結的損壞可能會造成網路大規模崩解,這現象亦出現在過去許多電力系統的大停電事件中。因此由網路的觀點對電力系統是否安全和穩定之研究一直是備受探討。在本論文中使用複雜網路方法對台灣電力網路進行脆弱性分析,並由攻擊者的角度使用多重攻擊策略探討網路脆弱性。
      本論文中使用了拓樸性效率脆弱性(efficiency vulnerability)和四種連鎖性失效模型針對台灣電力網路進行分析,其中包含三種靜態負載的連鎖性失效模型(static load cascading failure model)和一種動態負載的連鎖性失效模型(dynamic load cascading failure model),藉由這些不同觀點檢視台灣電力網路的脆弱性。
      以上模擬皆為攻擊單一連結,但若以攻擊者的觀點,其可以同時對多個連結進行破壞,因此最後部分為如何有效對網路造成傷害的多重攻擊策略,我們應用此攻擊策略於隨機網路(random network)以及無尺度網路(scale-free network)測試其有效性,最後將此攻擊策略應用於台灣電力網路,並從結果中透露出台灣電力網路相當脆弱。
zh_TW
dc.description.tableofcontents CHAPTER 1 1
     INTRODUCTION 1
     CHAPTER 2 4
     THE CHARACTERISTIC OF NETWORKS 4
     2.1 NETWORK STRUCTURE MEASURES 4
     2.1.1 Structure 4
     2.1.2 Adjacency matrix 5
     2.1.3 Degree and degree distribution 5
     2.1.4 Shortest path 6
     2.1.5 Clustering coefficient 7
     2.1.6 Betweenness centrality 7
     2.2 THE NETWORK MODELS 8
     2.2.1 Random network 8
     2.2.2 Barabási–Albert model (BA model) 9
     CHAPTER 3 11
     VULNERABILITY AND CASCADING FAILURE 11
     3.1 EFFICIENCY 12
     3.1.1 Global efficiency 12
     3.1.2 Efficiency vulnerability 12
     3.2 CASCADING FAILURE 13
     3.2.1 Static loads and static load cascading failure model 13
     3.2.2 Motter-Lai model 13
     3.2.3 Crucitti-Latora-Marchiori model (CLM model) 15
     3.2.4 Hidden failure model 16
     3.3.1 Dynamic loads and dynamical flow model 18
     3.3.2 Dynamical load cascading failure model 20
     CHAPTER4 23
     MULTI-TARGET ATTACK STRATEGY 23
     4.1 THE PROBLEMS ON MULTI-TARGET ATTACK 24
     4.2 IDEAS FOR ESTABLISHING MULTI-TARGET ATTACK STRATEGY 24
     4.3 LOAD DISTRIBUTION VECTOR 25
     4.4 THE PROCESS OF MULTI-TARGET ATTACK STRATEGY BASED ON LOAD DISTRIBUTION VECTOR 26
     CHAPTER5 27
     VULNERABILITY ANALYSIS 27
     5.1 EFFICIENCY VULNERABILITY 30
     5.2 SIMULATION OF VARIOUS CASCADING FAILURE MODELS 31
     5.2.1 Motter-Lai model 32
     5.2.2 Crucitti-Latora-Marchiori model (CLM model) 35
     5.2.3 Hidden failure model 39
     5.2.4 Discussion of the static load cascading failure models 42
     5.2.5 Dynamical load cascading failure model 44
     5.2.6 Discussion of the dynamical load cascading failure model 46
     CHAPTER 6 47
     MULTI-TARGET ATTACK STRATEGY ON DIFFERENT NETWORKS 47
     6.1 APPLICATION ON SCALE-FREE NETWORK AND RANDOM NETWORK 47
     6.2 APPLICATION ON TAIWAN POWER GRID 53
     6.3 DISCUSSION 56
     CHAPTER 7 57
     CONCLUSION AND FUTURE WORKS 57
     REFERENCE 59
zh_TW
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G1007550031en_US
dc.subject (關鍵詞) 電力網路zh_TW
dc.subject (關鍵詞) 複雜網路zh_TW
dc.subject (關鍵詞) 脆弱性分析zh_TW
dc.subject (關鍵詞) 連鎖性失效zh_TW
dc.subject (關鍵詞) 攻擊策略zh_TW
dc.title (題名) 多種連鎖性失效的電網分析及有效率多重攻擊策略zh_TW
dc.title (題名) Various cascading failure models on power grids and efficient multi-target attack strategyen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) Reference
     
     [1] Chen, Jie, J. Thorp, and Manu Parashar. "Analysis of electric power system disturbance data." 2013 46th Hawaii International Conference on System Sciences. Vol. 2. IEEE Computer Society, 2001.
     [2] U. S. C. p. s. o. t. force, "Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations," April 2004.
     [3] Glanz, J. and R. Perez-Pena (2003). That Left Tens of Millions of People in the Dark. New York Times. 26.
     [4] D. N. Kosterev, et al., "Model validation for the August 10, 1996 WSCC system outage," IEEE Transactions on Power Systems, vol. 14, pp. 967-974, Aug 1999
     [5] Wong, J. J. (2007). Study of Preventive and Remedial Strategies based on Simulations and Analyses of 729 Blackout in Taiwan Power System. Electrical Engineering, National Chung Cheng University.
     [6] Strogatz, S. H. (2001). "Exploring complex networks." Nature 410: 268-276.
     [7] M.E.J Newman, Networks : an introduction, Oxford University Press, Oxford; New York, 2010
     [8] Brandes, Ulrik. "A faster algorithm for betweenness centrality*." Journal of Mathematical Sociology 25.2 (2001): 163-177.
     [9] Erdős, P., and A. Rényi. "On the evolution of random graphs." Selected Papers of Alfréd Rényi, vol 2 (1976): 482-525.
     [10] Barabási, Albert-László, and Réka Albert. "Emergence of scaling in random networks." science 286.5439 (1999): 509-512.
     [11] Latora, V. and M. Marchiori (2001). "Efficient Behavior of Small-World Networks." Physical Review Letters 87.
     [12] Eusgeld, I., et al. (2009). "The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures." Reliability Engineering and System Safety 94: 954-963.
     [13] Motter, A. E. and Y.-C Lai (2002). "Cascade-based attacks on complex networks. " Physical Review E 66(065102)
     [14] Crucitti, Paolo, et al. "Error and attack tolerance of complex networks." Physica A: Statistical Mechanics and its Applications 340.1 (2004): 388-394.
     [15] Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol. 389, pp. 595–603. Elsevier, Amsterdam (2010)
     [16] S. Tamronglak, “Analysis of power system disturbances due to relay hidden failures,” Ph.D. dissertation, Virginia Polytechnic Institute State Univ., Blacksburg, 1994.
     [17] J. Chen, J. Thorp, I. Dobson, Electrical Power & Energy Systems 27 (2005) 318
     [18] Simonsen, I., et al. (2008). "Transient Dynamics Increasing Network Vulnerability to Cascading Failures." Physical Review Letters 100.
     [19] Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems", IEEE GLOBECOM 2012, Dec. 2012.
     [20] S. Arianos, E. Bompard, A. Carbone, F. Xue, Power grid vulnerability: a complex network approach, Chaos, 19(2009)013119.
     [21] Wang, Jiaoe, et al. "Exploring the network structure and nodal centrality of China’s air transport network: A complex network approach." Journal of Transport Geography 19.4 (2011): 712-721.
     [22] Crucitti, Paolo, Vito Latora, and Massimo Marchiori. "Model for cascading failures in complex networks." Physical Review E 69.4 (2004): 045104.
     [23] Kinney, Ryan, et al. "Modeling cascading failures in the North American power grid." The European Physical Journal B-Condensed Matter and Complex Systems 46.1 (2005): 101-107.
     [24] Goh, K-I., B. Kahng, and D. Kim. "Universal behavior of load distribution in scale-free networks." Physical Review Letters 87.27 (2001): 278701.
     [25] Brandes, Ulrik. "On variants of shortest-path betweenness centrality and their generic computation." Social Networks 30.2 (2008): 136-145.
     [26] Liu, Y. H. (2012). Computational large-scale complex networks : competition network and power grid. Applied Physics, National Chengchi University.
     [27] Yi, C. K. (2013). Group-based vulnerability analyses on power grid and associated protection strategies against cascading failures. Applied Physics, National Chengchi University.
zh_TW