Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors

نویسندگان

چکیده

In our paper, we study the vulnerability in cascading failures of real-world network (power grid) under intentional attacks. Here, use three indexes ( B , id="M2"> K id="M3"> k -shell) to measure importance nodes; that is, define attacks, respectively. Under these process cascade effect by number avalanche nodes, time steps, and speed propagation. Also, node’s bearing capacity as a tolerant parameter robustness Taking power grid an example, have obtained good regularity collapse when affordability is low. terms speed, betweenness-based collapses faster, but for degree-based attack, failed nodes highest. When nodes’ becomes large, network’s performances not obvious. The findings can be applied identify vulnerable real networks such wireless sensor improve their against different

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Power grid defense against malicious cascading failure

An adversary looking to disrupt a power grid may look to target certain substations and sources of power generation to initiate a cascading failure that maximizes the number of customers without electricity. This is particularly an important concern when the enemy has the capability to launch cyber-attacks as practical concerns (i.e. avoiding disruption of service, presence of legacy systems, e...

متن کامل

Cascading Network Failure in Power Grid Blackouts

Cascading failure consists of complicated sequences of dependent failures and can cause large blackouts. The emerging risk analysis, simulation, and modeling of cascading blackouts are briefly surveyed, and key references are suggested.

متن کامل

Measures of Impact Under Cascading Failure of Power Grid

A centrality measure has been proposed considering the directionality of power flow of future smart grid. Applicability of the proposed method has been evaluated in several standard IEEE test systems. Various comparisons are shown between impacts of removal of critical nodes found from two different models: nondirectional and bidirectional. Larger impact of removing critical nodes found from bi...

متن کامل

Cascade-based attack vulnerability on the US power grid

The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety. Applying the real data of the US power grid, we compare the effects of two different attacks for the network robustness against cascading failures, i.e., removal by either the descending or ascending orders of the loads. Adopting the initial load ...

متن کامل

Target Tracking Based on Virtual Grid in Wireless Sensor Networks

One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Sensors

سال: 2021

ISSN: ['1687-725X', '1687-7268']

DOI: https://doi.org/10.1155/2021/8820413