2004
DOI: 10.1109/tpwrs.2004.825888
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Electric Grid Security Under Terrorist Threat

Abstract: Abstract-We describe new analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks. New bilevel mathematical models and algorithms identify critical system components (e.g., transmission lines, generators, transformers) by creating maximally disruptive attack plans for terrorists assumed to have limited offensive resources. We report results for standard reliability test networks to show that the techniques identify critical components with modest computational … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
310
1
7

Year Published

2005
2005
2019
2019

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 453 publications
(334 citation statements)
references
References 3 publications
2
310
1
7
Order By: Relevance
“…We incorporate reconstitutability by modeling how system components are repaired over time and how a repaired component contributes to improved system value (Salmerón et al [36]). Unless strictly defended or hardened, every system component is assumed to be vulnerable.…”
Section: Criticalitymentioning
confidence: 99%
“…We incorporate reconstitutability by modeling how system components are repaired over time and how a repaired component contributes to improved system value (Salmerón et al [36]). Unless strictly defended or hardened, every system component is assumed to be vulnerable.…”
Section: Criticalitymentioning
confidence: 99%
“…Of specific relevance to our work is the literature on security-constrained optimal power flow in situations where large numbers of system components fail. This literature is mostly based on worstcase network interdiction analysis and includes solution methods based on bi-level and mixed-integer programming (see [24,25,1,8,33,32]) and graph algorithms (see [22,3,8,15,16]). …”
mentioning
confidence: 99%
“…Then, because of its special structure, we can convert our BLILP into a standard mixed-integer linear program (MILP) to actually solve it. With the roles of attacker and defender reversed, this general idea has been successfully used to model a number of networkinterdiction problems (Phillips 1993, Wood 1993, Israeli and Wood 2002; see Whiteman 2000 for details on an application; see Fulkerson andHarding 1977, Golden 1978 for earlier, bilevel linear-programming models involving continuous interdiction effort; and see Salmeron et al 2004 for an application of a bilevel optimization to interdicting electric power grids). In these network-interdiction problems, an interdictor uses limited offensive resources to attack and damage an adversary's network (e.g., road system, communications network) to minimize the maximum benefit his adversary can obtain from it.…”
Section: A New Two-sided Optimization For Tbmd Planningmentioning
confidence: 99%