Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm

A specialized genetic algorithm applied to the solution of the electric grid interdiction problem is presented in this paper. This problem consists in the interaction of a disruptive agent who aims at maximizing damage of the power system (measured as load shed), and the system operator, who impleme...

Full description

Autores:
Agudelo, Laura
López-Lezama, Jesús María
Muñoz Galeano, Nicolás
Tipo de recurso:
Article of journal
Fecha de publicación:
2015
Institución:
Universidad Nacional de Colombia
Repositorio:
Universidad Nacional de Colombia
Idioma:
spa
OAI Identifier:
oai:repositorio.unal.edu.co:unal/60685
Acceso en línea:
https://repositorio.unal.edu.co/handle/unal/60685
http://bdigital.unal.edu.co/59017/
Palabra clave:
62 Ingeniería y operaciones afines / Engineering
bilevel programming
power system vulnerability
genetic algorithms
intentional attacks
Rights
openAccess
License
Atribución-NoComercial 4.0 Internacional
id UNACIONAL2_4552b77685d196255bef5e6dd68bc117
oai_identifier_str oai:repositorio.unal.edu.co:unal/60685
network_acronym_str UNACIONAL2
network_name_str Universidad Nacional de Colombia
repository_id_str
spelling Atribución-NoComercial 4.0 InternacionalDerechos reservados - Universidad Nacional de Colombiahttp://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Agudelo, Laura83a0f5f4-ff8c-4122-8530-1518e41fe102300López-Lezama, Jesús María349d6dd7-ac70-4c5c-b248-9a935b80bec4300Muñoz Galeano, Nicolás3d12f538-6a40-4a1f-bba6-2fefe9e6265f3002019-07-02T18:52:54Z2019-07-02T18:52:54Z2015-07-01ISSN: 2346-2183https://repositorio.unal.edu.co/handle/unal/60685http://bdigital.unal.edu.co/59017/A specialized genetic algorithm applied to the solution of the electric grid interdiction problem is presented in this paper. This problem consists in the interaction of a disruptive agent who aims at maximizing damage of the power system (measured as load shed), and the system operator, who implements corrective actions to minimize system load shed. This problem, also known as “the terrorist threat problem”, is formulated in a bilevel programming structure and solved by means of a genetic algorithm. The solution identifies the most vulnerable links of the network in terms of a terrorist attack, providing signals for future reinforcement of the network or more strict surveillance of critical elements. The proposed approach has been tested on three case studies: a didactic five-bus power system, a prototype of the Colombian power system and the IEEE Reliability Test System. Results show the robustness and applicability of the proposed approach.application/pdfspaUniversidad Nacional de Colombia (Sede Medellín). Facultad de Minas.https://revistas.unal.edu.co/index.php/dyna/article/view/48578Universidad Nacional de Colombia Revistas electrónicas UN DynaDynaAgudelo, Laura and López-Lezama, Jesús María and Muñoz Galeano, Nicolás (2015) Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm. DYNA, 82 (192). pp. 78-84. ISSN 2346-218362 Ingeniería y operaciones afines / Engineeringbilevel programmingpower system vulnerabilitygenetic algorithmsintentional attacksVulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic AlgorithmArtículo de revistainfo:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Texthttp://purl.org/redcol/resource_type/ARTORIGINAL48578-257442-1-PB.pdfapplication/pdf642735https://repositorio.unal.edu.co/bitstream/unal/60685/1/48578-257442-1-PB.pdfc63ac6e06e0c40761117490b577bfea7MD51THUMBNAIL48578-257442-1-PB.pdf.jpg48578-257442-1-PB.pdf.jpgGenerated Thumbnailimage/jpeg9333https://repositorio.unal.edu.co/bitstream/unal/60685/2/48578-257442-1-PB.pdf.jpg296058eb184913de83ee69ba33a7aa94MD52unal/60685oai:repositorio.unal.edu.co:unal/606852024-04-14 23:11:32.511Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.co
dc.title.spa.fl_str_mv Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
title Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
spellingShingle Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
62 Ingeniería y operaciones afines / Engineering
bilevel programming
power system vulnerability
genetic algorithms
intentional attacks
title_short Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
title_full Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
title_fullStr Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
title_full_unstemmed Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
title_sort Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm
dc.creator.fl_str_mv Agudelo, Laura
López-Lezama, Jesús María
Muñoz Galeano, Nicolás
dc.contributor.author.spa.fl_str_mv Agudelo, Laura
López-Lezama, Jesús María
Muñoz Galeano, Nicolás
dc.subject.ddc.spa.fl_str_mv 62 Ingeniería y operaciones afines / Engineering
topic 62 Ingeniería y operaciones afines / Engineering
bilevel programming
power system vulnerability
genetic algorithms
intentional attacks
dc.subject.proposal.spa.fl_str_mv bilevel programming
power system vulnerability
genetic algorithms
intentional attacks
description A specialized genetic algorithm applied to the solution of the electric grid interdiction problem is presented in this paper. This problem consists in the interaction of a disruptive agent who aims at maximizing damage of the power system (measured as load shed), and the system operator, who implements corrective actions to minimize system load shed. This problem, also known as “the terrorist threat problem”, is formulated in a bilevel programming structure and solved by means of a genetic algorithm. The solution identifies the most vulnerable links of the network in terms of a terrorist attack, providing signals for future reinforcement of the network or more strict surveillance of critical elements. The proposed approach has been tested on three case studies: a didactic five-bus power system, a prototype of the Colombian power system and the IEEE Reliability Test System. Results show the robustness and applicability of the proposed approach.
publishDate 2015
dc.date.issued.spa.fl_str_mv 2015-07-01
dc.date.accessioned.spa.fl_str_mv 2019-07-02T18:52:54Z
dc.date.available.spa.fl_str_mv 2019-07-02T18:52:54Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.content.spa.fl_str_mv Text
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.issn.spa.fl_str_mv ISSN: 2346-2183
dc.identifier.uri.none.fl_str_mv https://repositorio.unal.edu.co/handle/unal/60685
dc.identifier.eprints.spa.fl_str_mv http://bdigital.unal.edu.co/59017/
identifier_str_mv ISSN: 2346-2183
url https://repositorio.unal.edu.co/handle/unal/60685
http://bdigital.unal.edu.co/59017/
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.spa.fl_str_mv https://revistas.unal.edu.co/index.php/dyna/article/view/48578
dc.relation.ispartof.spa.fl_str_mv Universidad Nacional de Colombia Revistas electrónicas UN Dyna
Dyna
dc.relation.references.spa.fl_str_mv Agudelo, Laura and López-Lezama, Jesús María and Muñoz Galeano, Nicolás (2015) Vulnerability Assessment of Power Systems to Intentional Attacks using a Specialized Genetic Algorithm. DYNA, 82 (192). pp. 78-84. ISSN 2346-2183
dc.rights.spa.fl_str_mv Derechos reservados - Universidad Nacional de Colombia
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.license.spa.fl_str_mv Atribución-NoComercial 4.0 Internacional
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
rights_invalid_str_mv Atribución-NoComercial 4.0 Internacional
Derechos reservados - Universidad Nacional de Colombia
http://creativecommons.org/licenses/by-nc/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad Nacional de Colombia (Sede Medellín). Facultad de Minas.
institution Universidad Nacional de Colombia
bitstream.url.fl_str_mv https://repositorio.unal.edu.co/bitstream/unal/60685/1/48578-257442-1-PB.pdf
https://repositorio.unal.edu.co/bitstream/unal/60685/2/48578-257442-1-PB.pdf.jpg
bitstream.checksum.fl_str_mv c63ac6e06e0c40761117490b577bfea7
296058eb184913de83ee69ba33a7aa94
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Nacional de Colombia
repository.mail.fl_str_mv repositorio_nal@unal.edu.co
_version_ 1806886515129712640