Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors
نویسندگان
چکیده
In our paper, we study the vulnerability in cascading failures of real-world network (power grid) under intentional attacks. Here, use three indexes ( B , id="M2"> K id="M3"> k -shell) to measure importance nodes; that is, define attacks, respectively. Under these process cascade effect by number avalanche nodes, time steps, and speed propagation. Also, node’s bearing capacity as a tolerant parameter robustness Taking power grid an example, have obtained good regularity collapse when affordability is low. terms speed, betweenness-based collapses faster, but for degree-based attack, failed nodes highest. When nodes’ becomes large, network’s performances not obvious. The findings can be applied identify vulnerable real networks such wireless sensor improve their against different
منابع مشابه
Power grid defense against malicious cascading failure
An adversary looking to disrupt a power grid may look to target certain substations and sources of power generation to initiate a cascading failure that maximizes the number of customers without electricity. This is particularly an important concern when the enemy has the capability to launch cyber-attacks as practical concerns (i.e. avoiding disruption of service, presence of legacy systems, e...
متن کاملCascading Network Failure in Power Grid Blackouts
Cascading failure consists of complicated sequences of dependent failures and can cause large blackouts. The emerging risk analysis, simulation, and modeling of cascading blackouts are briefly surveyed, and key references are suggested.
متن کاملMeasures of Impact Under Cascading Failure of Power Grid
A centrality measure has been proposed considering the directionality of power flow of future smart grid. Applicability of the proposed method has been evaluated in several standard IEEE test systems. Various comparisons are shown between impacts of removal of critical nodes found from two different models: nondirectional and bidirectional. Larger impact of removing critical nodes found from bi...
متن کاملCascade-based attack vulnerability on the US power grid
The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety. Applying the real data of the US power grid, we compare the effects of two different attacks for the network robustness against cascading failures, i.e., removal by either the descending or ascending orders of the loads. Adopting the initial load ...
متن کاملTarget Tracking Based on Virtual Grid in Wireless Sensor Networks
One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensors
سال: 2021
ISSN: ['1687-725X', '1687-7268']
DOI: https://doi.org/10.1155/2021/8820413