Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
A specialized genetic algorithm applied to the solution of the electric grid interdiction problem is presented in this paper. This problem consists in the interaction of a disruptive agent who aims at maximizing damage of the power system (measured as load shed), and the system operator, who impleme...
- Autores:
-
Agudelo, Laura
López-Lezama, Jesús María
Muñoz Galeano, Nicolás
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2015
- Institución:
- Universidad Nacional de Colombia
- Repositorio:
- Universidad Nacional de Colombia
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.unal.edu.co:unal/60685
- Acceso en línea:
- https://repositorio.unal.edu.co/handle/unal/60685
http://bdigital.unal.edu.co/59017/
- Palabra clave:
- 62 Ingeniería y operaciones afines / Engineering
bilevel programming
power system vulnerability
genetic algorithms
intentional attacks
- Rights
- openAccess
- License
- Atribución-NoComercial 4.0 Internacional
id |
UNACIONAL2_4552b77685d196255bef5e6dd68bc117 |
---|---|
oai_identifier_str |
oai:repositorio.unal.edu.co:unal/60685 |
network_acronym_str |
UNACIONAL2 |
network_name_str |
Universidad Nacional de Colombia |
repository_id_str |
|
spelling |
Atribución-NoComercial 4.0 InternacionalDerechos reservados - Universidad Nacional de Colombiahttp://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Agudelo, Laura83a0f5f4-ff8c-4122-8530-1518e41fe102300López-Lezama, Jesús María349d6dd7-ac70-4c5c-b248-9a935b80bec4300Muñoz Galeano, Nicolás3d12f538-6a40-4a1f-bba6-2fefe9e6265f3002019-07-02T18:52:54Z2019-07-02T18:52:54Z2015-07-01ISSN: 2346-2183https://repositorio.unal.edu.co/handle/unal/60685http://bdigital.unal.edu.co/59017/A specialized genetic algorithm applied to the solution of the electric grid interdiction problem is presented in this paper. This problem consists in the interaction of a disruptive agent who aims at maximizing damage of the power system (measured as load shed), and the system operator, who implements corrective actions to minimize system load shed. This problem, also known as “the terrorist threat problem”, is formulated in a bilevel programming structure and solved by means of a genetic algorithm. The solution identifies the most vulnerable links of the network in terms of a terrorist attack, providing signals for future reinforcement of the network or more strict surveillance of critical elements. The proposed approach has been tested on three case studies: a didactic five-bus power system, a prototype of the Colombian power system and the IEEE Reliability Test System. Results show the robustness and applicability of the proposed approach.application/pdfspaUniversidad Nacional de Colombia (Sede Medellín). Facultad de Minas.https://revistas.unal.edu.co/index.php/dyna/article/view/48578Universidad Nacional de Colombia Revistas electrónicas UN DynaDynaAgudelo, Laura and López-Lezama, Jesús María and Muñoz Galeano, Nicolás (2015) Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm. DYNA, 82 (192). pp. 78-84. ISSN 2346-218362 Ingeniería y operaciones afines / Engineeringbilevel programmingpower system vulnerabilitygenetic algorithmsintentional attacksVulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic AlgorithmArtículo de revistainfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Texthttp://purl.org/redcol/resource_type/ARTORIGINAL48578-257442-1-PB.pdfapplication/pdf642735https://repositorio.unal.edu.co/bitstream/unal/60685/1/48578-257442-1-PB.pdfc63ac6e06e0c40761117490b577bfea7MD51THUMBNAIL48578-257442-1-PB.pdf.jpg48578-257442-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg9333https://repositorio.unal.edu.co/bitstream/unal/60685/2/48578-257442-1-PB.pdf.jpg296058eb184913de83ee69ba33a7aa94MD52unal/60685oai:repositorio.unal.edu.co:unal/606852024-04-14 23:11:32.511Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.co |
dc.title.spa.fl_str_mv |
Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm |
title |
Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm |
spellingShingle |
Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm 62 Ingeniería y operaciones afines / Engineering bilevel programming power system vulnerability genetic algorithms intentional attacks |
title_short |
Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm |
title_full |
Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm |
title_fullStr |
Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm |
title_full_unstemmed |
Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm |
title_sort |
Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm |
dc.creator.fl_str_mv |
Agudelo, Laura López-Lezama, Jesús María Muñoz Galeano, Nicolás |
dc.contributor.author.spa.fl_str_mv |
Agudelo, Laura López-Lezama, Jesús María Muñoz Galeano, Nicolás |
dc.subject.ddc.spa.fl_str_mv |
62 Ingeniería y operaciones afines / Engineering |
topic |
62 Ingeniería y operaciones afines / Engineering bilevel programming power system vulnerability genetic algorithms intentional attacks |
dc.subject.proposal.spa.fl_str_mv |
bilevel programming power system vulnerability genetic algorithms intentional attacks |
description |
A specialized genetic algorithm applied to the solution of the electric grid interdiction problem is presented in this paper. This problem consists in the interaction of a disruptive agent who aims at maximizing damage of the power system (measured as load shed), and the system operator, who implements corrective actions to minimize system load shed. This problem, also known as “the terrorist threat problem”, is formulated in a bilevel programming structure and solved by means of a genetic algorithm. The solution identifies the most vulnerable links of the network in terms of a terrorist attack, providing signals for future reinforcement of the network or more strict surveillance of critical elements. The proposed approach has been tested on three case studies: a didactic five-bus power system, a prototype of the Colombian power system and the IEEE Reliability Test System. Results show the robustness and applicability of the proposed approach. |
publishDate |
2015 |
dc.date.issued.spa.fl_str_mv |
2015-07-01 |
dc.date.accessioned.spa.fl_str_mv |
2019-07-02T18:52:54Z |
dc.date.available.spa.fl_str_mv |
2019-07-02T18:52:54Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
publishedVersion |
dc.identifier.issn.spa.fl_str_mv |
ISSN: 2346-2183 |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.unal.edu.co/handle/unal/60685 |
dc.identifier.eprints.spa.fl_str_mv |
http://bdigital.unal.edu.co/59017/ |
identifier_str_mv |
ISSN: 2346-2183 |
url |
https://repositorio.unal.edu.co/handle/unal/60685 http://bdigital.unal.edu.co/59017/ |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.spa.fl_str_mv |
https://revistas.unal.edu.co/index.php/dyna/article/view/48578 |
dc.relation.ispartof.spa.fl_str_mv |
Universidad Nacional de Colombia Revistas electrónicas UN Dyna Dyna |
dc.relation.references.spa.fl_str_mv |
Agudelo, Laura and López-Lezama, Jesús María and Muñoz Galeano, Nicolás (2015) Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm. DYNA, 82 (192). pp. 78-84. ISSN 2346-2183 |
dc.rights.spa.fl_str_mv |
Derechos reservados - Universidad Nacional de Colombia |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.license.spa.fl_str_mv |
Atribución-NoComercial 4.0 Internacional |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Atribución-NoComercial 4.0 Internacional Derechos reservados - Universidad Nacional de Colombia http://creativecommons.org/licenses/by-nc/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad Nacional de Colombia (Sede Medellín). Facultad de Minas. |
institution |
Universidad Nacional de Colombia |
bitstream.url.fl_str_mv |
https://repositorio.unal.edu.co/bitstream/unal/60685/1/48578-257442-1-PB.pdf https://repositorio.unal.edu.co/bitstream/unal/60685/2/48578-257442-1-PB.pdf.jpg |
bitstream.checksum.fl_str_mv |
c63ac6e06e0c40761117490b577bfea7 296058eb184913de83ee69ba33a7aa94 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad Nacional de Colombia |
repository.mail.fl_str_mv |
repositorio_nal@unal.edu.co |
_version_ |
1814089953852784640 |