Verifying Distribution Networks for Secure Restoration by Enumerating All Critical Failures
نویسندگان
چکیده
If several feeders are cut in a severe accident, distribution networks should be restored by reconfiguring switches automatically with smart grid technologies. Although there have been several restoration algorithms developed to find the new network configuration, they might fail to restore the whole network if the cut critically damaged the network. The networks design has to guarantee that it is restorable under any possible cut for secure power delivery, but it is computationally hard task to examine all possible cuts in a large-scale network with complex electrical constraints. This paper presents a novel method to find all the critical (unrestorable) cuts with great efficiency to verify the network design. Our method first runs a fast screening algorithm based on hitting set enumeration; the algorithm selects suspicious cuts without naively examining all possible cuts. Next, unrestorable cuts are identified from the suspicious ones with another algorithm, which strictly tests the restorability of the network under each suspicious cut without redundantly repeating heavy power flow calculations. Thorough experiments on two distribution networks reveal that our method can find thousands of unrestorable cuts from the trillions of possible cuts in a large 432-bus network with no significant false negatives. This is the first work to reveal the vulnerability of a large-scale distribution network extensively.
منابع مشابه
Active Distribution Networks Restoration after Extreme Events
After extreme events such as floods, thunderstorms, blizzards and hurricanes there will be devastating effects in the distribution networks which may cause a partial or complete blackout. Then, the major concern for the system operators is to restore the maximum critical loads as soon as possible by available generation units. In order to solve this problem, this paper provides a restoration s...
متن کاملA New Framework for Secure Routing in VANET
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
متن کاملComputing Secure Sets in Graphs using Answer Set Programming
Problems from the area of graph theory always served as fruitful benchmarks in order to explore the performance of Answer Set Programming (ASP) systems. A relatively new branch in graph theory is concerned with so-called secure sets. It is known that verifying whether a set is secure in a graph is already co-NP-hard. The problem of enumerating all secure sets thus is challenging for ASP and its...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملFast Restoration of Connectivity for Wireless Sensor Networks
Node failures represent a fundamental problem in wireless sensor networks. Such failures may result in partitioned networks and lose of sensed information. A network recovery approach is thus necessary in order to ensure continuous network operations. In this paper, we propose CoMN2 a scalable and distributed approach for network recovery from node failures in wireless sensor networks. CoMN2 re...
متن کامل