2010
DOI: 10.1137/070708275
|View full text |Cite
|
Sign up to set email alerts
|

Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

Abstract: Abstract. Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
110
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 124 publications
(111 citation statements)
references
References 22 publications
0
110
0
1
Order By: Relevance
“…A different line of research on vulnerability problems focuses on attacks with certain structural properties, see [7], [21]. An example of this approach is used in [21], where as an approximation to the N − k problem with AC power flows, a linear mixed-integer program to solve the following combinatorial problem: remove a minimum number of arcs, such that in the resulting network there is a partition of the nodes into two sets, N 1 and N 2 , such that…”
Section: Previous Work On Vulnerability Problemsmentioning
confidence: 99%
“…A different line of research on vulnerability problems focuses on attacks with certain structural properties, see [7], [21]. An example of this approach is used in [21], where as an approximation to the N − k problem with AC power flows, a linear mixed-integer program to solve the following combinatorial problem: remove a minimum number of arcs, such that in the resulting network there is a partition of the nodes into two sets, N 1 and N 2 , such that…”
Section: Previous Work On Vulnerability Problemsmentioning
confidence: 99%
“…Of specific relevance to our work is the literature on security-constrained optimal power flow in situations where large numbers of system components fail. This literature is mostly based on worstcase network interdiction analysis and includes solution methods based on bi-level and mixed-integer programming (see [24,25,1,8,33,32]) and graph algorithms (see [22,3,8,15,16]). …”
mentioning
confidence: 99%
“…Consequently, in the power systems area, except of few very recent works [10]- [12] mostly linear approximations of nonlinear BP optimization problems have been reported [2], [5], [13]- [17]. The survey paper [9] mentions several generic approaches for BP such as: implicit enumeration (e.g., branch-and-bound), complementary pivoting algorithms, penalty function methods, steepest descent methods, and mathematical programming with equilibrium constraints (MPEC), among others.…”
mentioning
confidence: 99%