學術產出-Theses
Article View/Open
Publication Export
-
題名 透過網路效率探討電網連鎖性失效行為
Exploring the cascading failure of power grids by network efficiency作者 黃帥舞
Huang, Shuai Wu貢獻者 蕭又新
黃帥舞
Huang, Shuai Wu關鍵詞 電力網路
複雜網路
脆弱性分析
連鎖性失效
攻擊策略
Power grid
Complex network
Vulnerability
Cascading failure
Attack strategy日期 2014 上傳時間 3-Feb-2015 10:25:22 (UTC+8) 摘要 現實社會中,有時會發生大規模的停電事件,一經調查後才瞭解,只是因為一根電纜線、一根高壓電塔或是一個變電站故障導致,令人好奇電力系統的運作模式。因此藉由拓蹼網路的特性去研究電力系統的安全性及穩定性,一直受到人們的關注和討論。本篇論文利用動態負載去模擬現實中的電流,並藉由連鎖性失效的攻擊策略對於網路效率的影響,去判斷其網路的脆弱性分析。 本論文利用網路效率的(efficiency)影響來作為網路脆弱性(vulnerability)的分析,藉由在靜態負載中連鎖性失效的模型(static load cascading failure model)和動態負載中連鎖性失效的模型(dynamic load cascading failure model)來判斷及討論,其中動態負載為不同發電量及消耗量的狀況,藉此觀察台灣的電力網路系統在狀況下的結果。 此外以攻擊方來思考,單一攻擊、多重攻擊和策略性的多重攻擊的狀況底下,網路效率的變化,並將此運用在台灣電力網路系統上,發現台灣電力網路相當脆弱。
In the real world, sometimes there will be black out (power shortage) happening in large scale areas. After investigating, we found out that it was cause by either a broken transmission line, a high-voltage tower or a substation. We are very interesting to know how the operation scheme of power system works. Therefore, we study the safety and the stability in power system by the characteristics of topology network. This subject is always concerned and discussed by the society. The thesis use dynamic load to simulate current in real world. We foc us effect on network efficiency by the strategy of cascading failure, analyze the vulnerability of network.The thesis use the variation of network efficiency as index to analyze network. According to determining and discussing by static load cascading failure model and dynamic load cascading failure model, dynamic load is the situation in different amount of generating and consumption of electrical energy. We used the data to observe the result of Taiwan power system under the situation.In addition to, changing of internet efficiency by single attack, multi-attack and strategic multi-attack in attacker method of thinking. We found that Taiwan power system is weak after we used the statistics on it.參考文獻 Reference[1] Chen, Jie, J. Thorp, and Manu Parashar. "Analysis of electric power system disturbance data." 2013 46th Hawaii International Conference on System Sciences. Vol. 2. IEEE Computer Society, 2001.[2] U. S. C. p. s. o. t. force, "Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations," April 2004.[3] Glanz, J. and R. Perez-Pena (2003). That Left Tens of Millions of People in the Dark. New York Times. 26.[4] D. N. Kosterev, et al., "Model validation for the August 10, 1996 WSCC system outage," IEEE Transactions on Power Systems, vol. 14, pp. 967-974, Aug 1999[5] Wong, J. J. (2007). Study of Preventive and Remedial Strategies based on Simulations and Analyses of 729 Blackout in Taiwan Power System. Electrical Engineering, National Chung Cheng University.[6] Strogatz, S. H. (2001). "Exploring complex networks." Nature 410: 268-276.[7] M.E.J Newman, Networks : an introduction, Oxford University Press, Oxford; New York, 2010[8] Brandes, Ulrik. "A faster algorithm for betweenness centrality*." Journal of Mathematical Sociology 25.2 (2001): 163-177.[9] Erdős, P., and A. Rényi. "On the evolution of random graphs." Selected Papers of Alfréd Rényi, vol 2 (1976): 482-525.[10] Barabási, Albert-László, and Réka Albert. "Emergence of scaling in random networks." science 286.5439 (1999): 509-512.[11] Latora, V. and M. Marchiori (2001). "Efficient Behavior of Small-World Networks." Physical Review Letters 87.[12] Eusgeld, I., et al. (2009). "The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures." Reliability Engineering and System Safety 94: 954-963.[13] Motter, A. E. and Y.-C Lai (2002). "Cascade-based attacks on complex networks. " Physical Review E 66(065102)[14] Crucitti, Paolo, et al. "Error and attack tolerance of complex networks." Physica A: Statistical Mechanics and its Applications 340.1 (2004): 388-394.[15] Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol. 389, pp. 595–603. Elsevier, Amsterdam (2010)[16] S. Tamronglak, “Analysis of power system disturbances due to relay hidden failures,” Ph.D. dissertation, Virginia Polytechnic Institute State Univ., Blacksburg, 1994.[17] J. Chen, J. Thorp, I. Dobson, Electrical Power & Energy Systems 27 (2005) 318[18] Simonsen, I., et al. (2008). "Transient Dynamics Increasing Network Vulnerability to Cascading Failures." Physical Review Letters 100.[19] Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems", IEEE GLOBECOM 2012, Dec. 2012.[20] S. Arianos, E. Bompard, A. Carbone, F. Xue, Power grid vulnerability: a complex network approach, Chaos, 19(2009)013119.[21] Wang, Jiaoe, et al. "Exploring the network structure and nodal centrality of China’s air transport network: A complex network approach." Journal of Transport Geography 19.4 (2011): 712-721.[22] Crucitti, Paolo, Vito Latora, and Massimo Marchiori. "Model for cascading failures in complex networks." Physical Review E 69.4 (2004): 045104.[23] Kinney, Ryan, et al. "Modeling cascading failures in the North American power grid." The European Physical Journal B-Condensed Matter and Complex Systems 46.1 (2005): 101-107.[24] Goh, K-I., B. Kahng, and D. Kim. "Universal behavior of load distribution in scale-free networks." Physical Review Letters 87.27 (2001): 278701.[25] Brandes, Ulrik. "On variants of shortest-path betweenness centrality and their generic computation." Social Networks 30.2 (2008): 136-145.[26] Ding-Shun, Lin . "Various cascading failure models on power grids and efficient multi-target attack strategy. " 描述 碩士
國立政治大學
應用物理研究所
101755009
103資料來源 http://thesis.lib.nccu.edu.tw/record/#G1017550091 資料類型 thesis dc.contributor.advisor 蕭又新 zh_TW dc.contributor.author (Authors) 黃帥舞 zh_TW dc.contributor.author (Authors) Huang, Shuai Wu en_US dc.creator (作者) 黃帥舞 zh_TW dc.creator (作者) Huang, Shuai Wu en_US dc.date (日期) 2014 en_US dc.date.accessioned 3-Feb-2015 10:25:22 (UTC+8) - dc.date.available 3-Feb-2015 10:25:22 (UTC+8) - dc.date.issued (上傳時間) 3-Feb-2015 10:25:22 (UTC+8) - dc.identifier (Other Identifiers) G1017550091 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/73290 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 應用物理研究所 zh_TW dc.description (描述) 101755009 zh_TW dc.description (描述) 103 zh_TW dc.description.abstract (摘要) 現實社會中,有時會發生大規模的停電事件,一經調查後才瞭解,只是因為一根電纜線、一根高壓電塔或是一個變電站故障導致,令人好奇電力系統的運作模式。因此藉由拓蹼網路的特性去研究電力系統的安全性及穩定性,一直受到人們的關注和討論。本篇論文利用動態負載去模擬現實中的電流,並藉由連鎖性失效的攻擊策略對於網路效率的影響,去判斷其網路的脆弱性分析。 本論文利用網路效率的(efficiency)影響來作為網路脆弱性(vulnerability)的分析,藉由在靜態負載中連鎖性失效的模型(static load cascading failure model)和動態負載中連鎖性失效的模型(dynamic load cascading failure model)來判斷及討論,其中動態負載為不同發電量及消耗量的狀況,藉此觀察台灣的電力網路系統在狀況下的結果。 此外以攻擊方來思考,單一攻擊、多重攻擊和策略性的多重攻擊的狀況底下,網路效率的變化,並將此運用在台灣電力網路系統上,發現台灣電力網路相當脆弱。 zh_TW dc.description.abstract (摘要) In the real world, sometimes there will be black out (power shortage) happening in large scale areas. After investigating, we found out that it was cause by either a broken transmission line, a high-voltage tower or a substation. We are very interesting to know how the operation scheme of power system works. Therefore, we study the safety and the stability in power system by the characteristics of topology network. This subject is always concerned and discussed by the society. The thesis use dynamic load to simulate current in real world. We foc us effect on network efficiency by the strategy of cascading failure, analyze the vulnerability of network.The thesis use the variation of network efficiency as index to analyze network. According to determining and discussing by static load cascading failure model and dynamic load cascading failure model, dynamic load is the situation in different amount of generating and consumption of electrical energy. We used the data to observe the result of Taiwan power system under the situation.In addition to, changing of internet efficiency by single attack, multi-attack and strategic multi-attack in attacker method of thinking. We found that Taiwan power system is weak after we used the statistics on it. en_US dc.description.tableofcontents ContentCHAPTER 1 1INTRODUCTION 1CHAPTER 2 4THE CHARACTERISTIC OF NETWORKS 42.1 NETWORK STRUCTURE MEASURES 42.1.1 Structure 42.1.2 Adjacency matrix 52.1.3 Degree and degree distribution 52.1.4 Shortest path 62.1.5 Clustering coefficient 72.1.6 Betweenness centrality 7CHAPTER 3 9VULNERABILITY AND CASCADING FAILURE 93.1 EFFICIENCY 93.1.1 Global efficiency 93.1.2 Efficiency vulnerability 93.2 CASCADING FAILURE 103.2.1 Static loads and static load cascading failure model 103.2.2 Motter-Lai model 103.2.3 Crucitti-Latora-Marchiori model (CLM model) 123.2.4 Dynamic loads and dynamical flow model 133.2.5 Dynamical load cascading failure model 143.2.6 Dynamical load cascading failure model apply to CLM model 17CHAPTER4 20MULTI-TARGET ATTACK STRATEGY 204.1 THE PROBLEMS ON MULTI-TARGET ATTACK 214.2 IDEAS FOR ESTABLISHING MULTI-TARGET ATTACK STRATEGY 214.3 LOAD DISTRIBUTION VECTOR 224.4 THE PROCESS OF MULTI-TARGET ATTACK STRATEGY BASED ON LOAD DISTRIBUTION VECTOR 23CHAPTER5 24VULNERABILITY ANALYSIS 245.1 EFFICIENCY VULNERABILITY 265.2 SIMULATION OF VARIOUS CASCADING FAILURE MODELS 285.2.1 Motter-Lai model 325.2.2 The static load of Crucitti-Latora-Marchiori model (CLM model) 325.2.3 Discussion of the static load cascading failure model 355.2.4 Dynamical load cascading failure model 375.2.5 Discussion of the dynamical load cascading failure model 375.2.6 The dynamic load of Crucitti-Latora-Marchiori model I 375.2.7 The dynamic load of Crucitti-Latora-Marchiori model II 425.2.8 Discussion of the dynamical load of Crucitti-Latora-Marchiori model (CLM model) 45CHAPTER 6 48MULTI-TARGET ATTACK STRATEGY ON DIFFERENT NETWORKS 486.1 APPLICATION ON TAIWAN POWER GRID 486.1.1 Application on Taiwan power grid by the static load of CLM model 486.1 .2 Application on Taiwan power grid by the dynamic load of CLM model 486.2 DISCUSSION 54CHAPTER 7 55CONCLUSION AND FUTURE WORKS 55REFERENCE 57 zh_TW dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G1017550091 en_US dc.subject (關鍵詞) 電力網路 zh_TW dc.subject (關鍵詞) 複雜網路 zh_TW dc.subject (關鍵詞) 脆弱性分析 zh_TW dc.subject (關鍵詞) 連鎖性失效 zh_TW dc.subject (關鍵詞) 攻擊策略 zh_TW dc.subject (關鍵詞) Power grid en_US dc.subject (關鍵詞) Complex network en_US dc.subject (關鍵詞) Vulnerability en_US dc.subject (關鍵詞) Cascading failure en_US dc.subject (關鍵詞) Attack strategy en_US dc.title (題名) 透過網路效率探討電網連鎖性失效行為 zh_TW dc.title (題名) Exploring the cascading failure of power grids by network efficiency en_US dc.type (資料類型) thesis en dc.relation.reference (參考文獻) Reference[1] Chen, Jie, J. Thorp, and Manu Parashar. "Analysis of electric power system disturbance data." 2013 46th Hawaii International Conference on System Sciences. Vol. 2. IEEE Computer Society, 2001.[2] U. S. C. p. s. o. t. force, "Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations," April 2004.[3] Glanz, J. and R. Perez-Pena (2003). That Left Tens of Millions of People in the Dark. New York Times. 26.[4] D. N. Kosterev, et al., "Model validation for the August 10, 1996 WSCC system outage," IEEE Transactions on Power Systems, vol. 14, pp. 967-974, Aug 1999[5] Wong, J. J. (2007). Study of Preventive and Remedial Strategies based on Simulations and Analyses of 729 Blackout in Taiwan Power System. Electrical Engineering, National Chung Cheng University.[6] Strogatz, S. H. (2001). "Exploring complex networks." Nature 410: 268-276.[7] M.E.J Newman, Networks : an introduction, Oxford University Press, Oxford; New York, 2010[8] Brandes, Ulrik. "A faster algorithm for betweenness centrality*." Journal of Mathematical Sociology 25.2 (2001): 163-177.[9] Erdős, P., and A. Rényi. "On the evolution of random graphs." Selected Papers of Alfréd Rényi, vol 2 (1976): 482-525.[10] Barabási, Albert-László, and Réka Albert. "Emergence of scaling in random networks." science 286.5439 (1999): 509-512.[11] Latora, V. and M. Marchiori (2001). "Efficient Behavior of Small-World Networks." Physical Review Letters 87.[12] Eusgeld, I., et al. (2009). "The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures." Reliability Engineering and System Safety 94: 954-963.[13] Motter, A. E. and Y.-C Lai (2002). "Cascade-based attacks on complex networks. " Physical Review E 66(065102)[14] Crucitti, Paolo, et al. "Error and attack tolerance of complex networks." Physica A: Statistical Mechanics and its Applications 340.1 (2004): 388-394.[15] Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol. 389, pp. 595–603. Elsevier, Amsterdam (2010)[16] S. Tamronglak, “Analysis of power system disturbances due to relay hidden failures,” Ph.D. dissertation, Virginia Polytechnic Institute State Univ., Blacksburg, 1994.[17] J. Chen, J. Thorp, I. Dobson, Electrical Power & Energy Systems 27 (2005) 318[18] Simonsen, I., et al. (2008). "Transient Dynamics Increasing Network Vulnerability to Cascading Failures." Physical Review Letters 100.[19] Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems", IEEE GLOBECOM 2012, Dec. 2012.[20] S. Arianos, E. Bompard, A. Carbone, F. Xue, Power grid vulnerability: a complex network approach, Chaos, 19(2009)013119.[21] Wang, Jiaoe, et al. "Exploring the network structure and nodal centrality of China’s air transport network: A complex network approach." Journal of Transport Geography 19.4 (2011): 712-721.[22] Crucitti, Paolo, Vito Latora, and Massimo Marchiori. "Model for cascading failures in complex networks." Physical Review E 69.4 (2004): 045104.[23] Kinney, Ryan, et al. "Modeling cascading failures in the North American power grid." The European Physical Journal B-Condensed Matter and Complex Systems 46.1 (2005): 101-107.[24] Goh, K-I., B. Kahng, and D. Kim. "Universal behavior of load distribution in scale-free networks." Physical Review Letters 87.27 (2001): 278701.[25] Brandes, Ulrik. "On variants of shortest-path betweenness centrality and their generic computation." Social Networks 30.2 (2008): 136-145.[26] Ding-Shun, Lin . "Various cascading failure models on power grids and efficient multi-target attack strategy. " zh_TW