Next Article in Journal
Development of Manganese-Coated Graphite Electrode in a Dual-Chambered Fuel Cell for Selenite Removal and Bio-Electricity Generation from Wastewater Effluent by Bacillus cereus
Previous Article in Journal
Salt Ion Diffusion Behavior and Adsorption Characteristics of Fracturing Fluid in Tight Sandstone Gas Reservoir
Previous Article in Special Issue
Improving the Efficiency of Environmental Temperature Control in Homes and Buildings
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Electrical Power System Reconfiguration Model Based on Optimal Transmission Switching under Scenarios of Intentional Attacks

1
Master’s Program in Electricity, Salesian Polytechnic University, Quito EC170702, Ecuador
2
Smart Grid Research Group—GIREI (Spanish Acronym), Salesian Polytechnic University, Quito EC170702, Ecuador
*
Author to whom correspondence should be addressed.
Energies 2023, 16(6), 2879; https://doi.org/10.3390/en16062879
Submission received: 10 January 2023 / Revised: 8 March 2023 / Accepted: 10 March 2023 / Published: 21 March 2023
(This article belongs to the Special Issue Smart Grid Control and Optimization)

Abstract

:
Currently, operating electrical power systems (EPS) is a complex task that relies on the experience of the operators or the strength of algorithms developed for autonomous operation. The continuous operation of EPS is vulnerable to intentional cybernetic and physical attacks. With the most significant extension and distribution in the EPS, the transmission lines are most exposed to potential attacks. Before this, the entire behavior of the EPS changes, and, on occasions, a blackout can even be generated. The present investigation focused on developing a methodology for reconfiguring the power system against intentional attacks, considering the topology change through optimal switching of transmission lines (OTS) based on optimal DC flows and quantifying the contingency index, which allows for the identification of the weaknesses of the EPS. The methodology was applied to the IEEE 30−bus system, and contingencies were randomly generated, as is typical with intentional attacks. The study successfully identified the reconfiguration strategy of EPS based on OTS-DC, mitigating potential problems such as line loadability and voltage angle deviation in the nodes.

1. Introduction

Advancements in technology have had a significant impact on the development of electrical power systems (EPS) management [1]. Thanks to these advances, it is possible to monitor electrical networks with less effort [2], as well as control the network through the transmission, reception, and processing of signals. However, finding a strategy that solves most of the planning problems seems to be an unattainable goal. One of the reasons for this problem is the static consideration of transmission elements.
Optimal switching of transmission lines (known as OTS) is a dynamic strategy that manages to optimize the power transmission and network design, reconfiguring the EPS topology [3,4]; a large part of the research carried out in relation to OTS is based on cost restrictions, congestion, and electrical losses [5]. In previous works, OTS has been used to restore the operation of the EPS in the presence of contingencies and to generate the route for the re-entry of elements that go out of operation in an optimized order [6,7].
The importance of OTS in the study of resilient electrical systems [8] should be noted; in other words, in systems that exhibit disconnections. After a contingency, the network topology is modified, therefore, the flows in the transmission lines change, which can cause damage to several of the elements. For this reason, the EPS must be able to overcome this eventuality and any subsequent contingency, otherwise, an “electrical blackout” could occur [9]. Moreover, failures in the elements of a network can be caused by other instances, such as natural phenomena and errors in control devices [10], which are also due to line overloads, and in exceptional cases, malicious attacks [11].
In this framework, the algorithm proposed in [12] collects loadability information on lines and bus voltage angles and allows economic dispatch (ED), which is developed through the optimal DC power flow strategy (OPF−DC). Subsequently, the impacts to the system caused by lines under contingencies N−1 were analyzed, combining OTS with OPF.
On the other hand, the research carried out in [13] proposes an optimization model that aims to minimize the cost of operation and maximize the safety margin of the system. Similarly, the authors of [14] propose a complex optimization algorithm known as MISOCP.
Thus, transmission lines are fundamental elements in an EPS [15]. Currently, they are the main objectives of the study, especially lines that cover long distances and have a high power transfer capacity. In addition, there is a probability that they present unexpected emergencies; due to overload or low voltage levels, this condition increases the risk of failures and makes them vulnerable to intentional attacks.
Based on the above, the study presented in [16] describes a corrective switching method as a control tool for a line. The research proposes a multi-objective optimization algorithm with six opposing objective functions, which cover aspects, such as economy, security, and reliability. Indeed, the authors recommend establishing emergency operation plans and, thus, counteract possible eventualities in the electrical system. The same approach is presented in [17]. On the other hand, some authors propose optimization models based on mixed-integer linear programming (MILP) and others use methods to accelerate the exploration of ideal solutions, such as the Benders decomposition used in [18,19], to analyze the use of multi-circuits in transmission lines with different voltage levels, allowing the same route to establish other energy uses. Still, it must be considered that if something happens in the said link, the EPS will be seriously affected.
Moreover, transmission lines that cover large distances are exposed to malicious attacks [20]. The vulnerability of EPS to deliberate disconnections was assessed using a methodology that analyzes security. Implementing appropriate energy management in electricity distribution companies has significantly improved the quality of service provided to customers. Implementing such strategies can result in a loss of security due to malicious attacks. Research, such as [21], has focused on simulating and studying cyber-physical attacks against power grids.
Cybernetic infrastructure integration into smart grids increases the attack capacity due to the diversity and quantity of available tools [22]. Generation adjustment, load shedding, and optimal switching of lines are alternatives to facing intentional attacks that put demand at risk.
In this sense, the information provided in [2] is based on results obtained in the face of alterations caused by cyber-attacks in different countries; these not only affect the operation of the system, but there are also cases in which the infrastructure suffers considerable damage; in other cases, energy theft is identified despite having AMI. For this reason, it is of the utmost importance to analyze the cybernetic vulnerability of the network in its entire context and, thus, propose solutions to protect it against cybernetic adversaries.
In this topic, in [23], the researchers propose a multi-agent system capable of evaluating the energy system’s vulnerability while monitoring the protection device’s hidden errors and providing control actions to avoid events of cascading sequences. In addition, in [24], the authors determine that the security of critical system components must be observed to deal with infrastructure damage, whether due to natural damage or intentional attacks. The problem–solution approach is based on multi-objective optimization with multi-decision criteria.
Even more, in [21], criteria for coordinated cyber-physical attacks against electrical power systems are formulated; in addition, they detailed that an attack is produced by the injection of false data—known as FDIA—against the corrective action schemes available for the EPS, which can lead to power outages. It also appears that the attack may be aimed at manipulating PMU data. To simulate the problem, the author proposes the placement of a process called semi-Markov that allows the integration of exponential and non-exponential probability distributions with the aim of discovering the nature of possible intentional attacks.
Likewise, the research in [25] proposes the intentional attack as a maximum–minimum problem, where the terrorist maximizes the damage he will cause. At the same time, the system operator seeks to minimize it. In [11], the analysis described above is deepened, transforming existing nonlinear expressions into linear constraints. Thus, the researchers manage to convert a maximum–minimum problem into a single-level maximum–maximum problem, which is solved by applying the Bender’s decomposition and mixed-integer linear programming.
In this exact order of ideas, the research presented in [26] addresses the vulnerability analysis of the electrical network under terrorist threats. In this problem, a bi-level nonlinear program is formulated. At the higher level, the terrorist attacker will always maximize the damage he can cause; that is, a terrorist will seek to maximize the loss of the load on the system. Subsequently, the model at a lower level states that the operations of the systems should minimize the possible damage to the system and what could occur in the network; the objective is to maintain the optimal functioning of the EPS. The study’s primary objective focuses on analyzing the possible corrective actions that can be applied in the face of an attack. One of them is the possibility that the system operator can modify the topology of the EPS, keeping the power supply on the load. It also clarifies that the model has non-convex or linear results that can be interpreted; for this reason, two-level programming cannot be interpreted in an equivalent result of optimization at one level, the author proposes another model related to Bender’s decomposition.
For their part, the authors in [27] focused on developing a novel key pre-distribution scheme to reduce the severity of cyber-attacks on SCADA systems by proposing a matrix that supports device connections and key upgrades with low communication costs.
Moreover, the authors in [22] focus on real-time security, consisting of two main parts: contingency analysis and network monitoring. The system’s physical characteristics are considered in greater depth than the cryptographic details. In addition, malicious behavior and component errors are simulated; then, possible effects that may occur in the system are analyzed; finally, algorithms are proposed to allow against subtracting the attacks.
In [28], a cascade interrupt model is used to simulate the behavior of the system before contingencies, where the attacker uses Q-learning models to improve the damage of the attack and, thus, produce errors in the system with less effort, The algorithm is tested on three IEEE systems, demonstrating the learning capacity and the effectiveness of the vulnerability analysis achieved by the Q-learning model, thanks to the identification of critical components in a potential sequential attack scheme.
The purpose of this research is to vary the grid’s topology in the face of N−1 contingencies and, thus, maintain the quality and reliability of the system. To achieve this, an algorithm based on OTS is developed to determine which lines must be switched in the event of scheduled or unexpected disconnections. From the literature review and according to the needs of the present research, only OPF−DC will be used as a basis, thus reducing the complexity of the optimization problem and the execution time of the solution.
This research is organized into five sections that are described below: the first section deals with the research works that are concurrent among the authors who focused their analyses on topics related to this article; in the second section, the methods and mathematical models for solving the problem of intentional attacks are presented; in the third section, the problem statement is presented in detail; in the fourth section, we present the analysis of results achieved after the simulations; and finally, in the fifth section, the conclusions reached in this study are stated.

2. Optimal Transmission Switching (OTS)

The OTS control method for transmission line disconnections due to voltage variations or flow overloads consists of optimizing network resources and topology. This strategy is applied in various investigations, such as [15,29,30], obtaining good results. The fundamental objective of reconfiguring the network is to minimize generation costs and, thus, maintain the system’s economic efficiency. Next, the mathematical models used in each of the threads in the optimal switching of transmission lines are presented.

2.1. Optimal Power Flow

This strategy was first implemented in Carpentier’s studies [31]; its objective is to establish the ideal operating parameters for an electrical network, subject to design restrictions; the strategy allows for optimizing operating costs and minimizing active power losses in an EPS. It should be emphasized that due to the estimated time it takes to solve the complete algorithm, linear approximations have been developed, obtaining results very similar to the usual procedure; this technique is known as OPF−DC for its acronym in English. In [32], the cost minimization problem is described as a linear integer as can be seen in Equation (1); as restrictions of the OPF−DC problem, there are factors that can be listed, such as the power flow through the lines (2), the power balance in the nodes (3), the limits of power that can be transported by each line (4), the generation limits (5) and (6), and the limits of the voltage angle, as shown in Equation (7).
Minimize:
F O = g Ω G C g P g
Subject to:
P i j = δ i δ j X i j i j Ω l
g Ω G i P g L i = j Ω l i P i j : λ i i Ω B
P i j m a x P i j P i j m a x i j Ω l
P g m i n P g P g m a x
P g 0
δ m i n δ i j δ m a x

2.2. Switching of Transmission Lines

This technique aims to optimize system resources through topology change. It is based on mixed integer programming (MIP) and aims to solve the traditional problem of optimal power dispatch. As mentioned above, the objective of this methodology is to minimize electricity generation costs over some time. In [15,33], the authors present the mathematical model for OTS. Now, due to the use of OPF−DC in the OTS strategy, their mathematical models are similar, the objective function is shown in Equation (8). However, there are several differences; the OTS variables that are introduced in the constraints (9) to (12) for the limitations of OPF−DC.
Minimize:
F O p = g Ω G C g P g
Subject to:
P i j B i j ( δ i δ j ) ( 1 ζ i j ) M
P i j B i j ( δ i δ j ) ( 1 ζ i j ) M
g Ω G l P g L S i L i = j Ω l i P i j : λ i i Ω B
ζ i j P i j m a x P i j ζ i j P i j m a x i j Ω l
P g m i n P g P g m a x
P g 0
δ m i n δ i j δ m a x
i j ( 1 ζ i j ) N S W i j Ω l
B i j = 1 X i j
ζ i j { 0 , 1 }
The objective function in (8) minimizes the total costs of electricity generation. On the other hand, the restriction of Equation (11) maintains the electrical balance in each bus, i.e., it ensures that the input and output power flow are equal. Likewise, it ensures that the values of the voltage angles in the bars and the power flow in the lines are congruent; these are represented through inequalities (9) and (10). Similarly, the thermal limits of the transmission lines are represented in (11). Next, the production capacity of the generators is determined in (13) and (14), and the angular limits of the voltage in (15). Finally, inequality (16) limits the number of lines that can be switched.
It should be noted that the binary variable  ζ i j  represents two operating states: line l in service ( ζ i j = 1 ) or out of service ( ζ i j = 0 ). Both members of the inequality (12) must be multiplied by the binary variables  ζ i j  to ensure that there is no energy flow when the lines are without service.

2.3. Intentional Attacks and Ranking of Contingencies

EPS security is related to its ability to withstand disturbances. For this purpose, the type and level of contingency must be considered, normally the N−1 criterion is used, where it is established that the system is capable of overcoming the presence of a contingency and, thus, avoiding severe instability.
However, analyzing the disconnection of all the elements of an EPS requires considerable time, for this reason, the authors of [34] establish a method to determine which disturbances will cause more damage and, thus, establish a list of contingencies ordered by the degree of severity. For this purpose, the model of Equation (19) is used. This mathematical expression determines the performance index for each disconnection in the system; in the face of a i contingency, it calculates the power flow in l and compares this value with the line’s operating limit. Once the iterative process is finished, the results of  P I  must be sorted in descending order.
P I = i = 1 N l W f i 2 n P i j P i j m a x 2 n
In this model,  N l  is the set of transmission lines;  P i j  represents the active power flow of each line, and  P i j m a x  is the maximum active power of each line. In addition, ideally, a high value should be given to n; however, the unit is assigned, obtaining satisfactory results, in this way, the search process is accelerated. Likewise, the value of one is set to the variable  W f i , which represents the degree of importance that each line has in the system; several authors recommend that  W f i  take the value of one in the transmission lines, such as in transformers.
Now, applying OTS OPFDC, N1 leads to the modification of optimal commutation restrictions; for this reason, the new mathematical model will be:
Minimize:
F O p = g Ω G C g P g
Subject to:
P i j c B i j ( δ i c δ j c ) ( 2 ψ i j ζ i j ) M
P i j c B i j ( δ i c δ j c ) ( 2 ψ i j ζ i j ) M
g Ω G l P g L S i L i = j Ω l i P i j c : λ i i Ω B
ζ i j ψ i j P i j m a x P i j ζ i j ψ i j P i j m a x i j Ω l
P g m i n P g P g m a x
P g 0
δ m i n δ i j δ m a x
i j ( 1 ζ i j ) N S W i j Ω l
B i j = 1 X i j
ζ i j { 0 , 1 }
ψ i j { 0 , 1 }
Thus, all variables with subscript c indicate the variable in the presence of N−1 contingencies. Additionally, the binary variable  ψ i j  represents the state of each transmission line; if  ψ i j = 1 , the line is in contingency, and if  ψ i j = 0 , it is in operation.

3. Problem Formulation

This research proposes an optimal operation model after intentional attacks where switching of transmission systems is considered, which will allow analyzing the effects of intentional attacks on the power system’s operation and choosing which transmission lines can be switched after an intentional contingency.
Switching of transmission lines is a strategy that allows analyzing the electrical system from a dynamic perspective. By modifying the topology of the network, the flows that circulate through the lines are altered, causing inconveniences to the operator. Considering that the disconnection of EPS equipment is a common situation, and occurs for different reasons, it is essential to analyze which elements will be highly affected by failures that may occur in the SEP. Through the ranking of contingencies, it is possible to determine the disconnections that cause the most damage to the system.
The optimal flow of DC power, being a linear analysis method, allows for preserving the system’s safety in operation and finds an economic operation that is feasible by minimizing an objective function, such as minimization of fuel cost, VAR planning, and minimization of losses. It is also possible to modify the control systems to account for equality and inequality constraints used to model a balance of power constraints and performance constraints.
The OTS model also serves as a management tool to change the EPS topology as it transports power more efficiently through the power transmission lines.
The objective is to determine the behavior of the EPS, considering the OTS application up to a contingency of N−1. In this way, the aim is to determine if the system can withstand an additional contingency (N−1)−1, and to verify if it is possible to maintain the operation of the system under operation criteria, such as maintaining the system within voltage margins, keeping the angle within deviation margins, and avoiding overloading of transmission lines due to changes in flow resulting from line changes. Additionally, a contingency analysis is performed to identify the vulnerable lines of the system.
On the other hand, the OTS criterion must be applied to analyze the system’s response to line switching. To reduce the complexity and contrast the results of the algorithm, OTS is proposed, on the one hand, and OTS N−1, on the other. In this way, comparing the results of each alternative, the benefits of each one will be noted. It should be noted that both strategies use OPF−DC as a tool for power flow, which provides information on line loads, bus voltage angles, and electricity production costs.
Finally, line switching is analyzed in the presence of a possible contingency case, which will be determined by the contingency ranking. For the optimal operation model, the IEEE 30−bus system was considered, which was designed for the analysis of operation, taking into account switching in transmission systems. Among the relevant characteristics of the IEEE 30−bus system, the system has 30 bars, 41 lines, 21 loads, and 6 generators, as can be seen in Appendix A.
With the previous information, one intentional attack was carried out randomly, which represents an N−1 contingency, i.e., an attack that will affect the operation of the system; for this, the contingency index is obtained, which is represented as a scalar value according to Equation (18).
Intentional attacks are determined where the lines that are in operation will have a value of 1 and those that are out of service will have a value of 0. The value of the voltage considered for this initial analysis is 1 [pu] using OPF−DC and by analyzing the operating power of the entire system.
The results include information about the power in nodes, generated power, and delta angle, where it can be seen to what extent the values are affected by intentional attacks and which lines can keep the EPS operational, the proposed methodology is shown in Algorithm 1.
Algorithm 1 Topology reconfiguration based on OTS-DC.
Step: 1
Input data
EPS parameter setting
Lines:  r , x , b  and  S I L
Generators:  P g m i n  and  P g m a x
Loads:  L i
Step: 2
Critical event determination
for line 1: end
    N−1 contingency
    if OPF−DC converges
       P I ( l i n e ) = i = 1 N l W f i 2 n P i j P i j m a x 2 n
    else
      discard the event
    end if
end for
Step: 3
Topology reconfiguration
Randomly apply intentional attack
for each PI
    if OTS converges
       P I n e w ( e a c h P I ) = i = 1 N l W f i 2 n P i j P i j m a x 2 n
    else
      discard new topology
    end if
end for
Step: 4
Show results

4. Analysis of the Results

The algorithm simulation was developed for the case study to determine the topology of the system that allows for maintaining the power supply after malicious attacks; see Algorithm 1. For this purpose, a list of the most harmful contingencies for the EPS must be made, which was developed in MATLAB R2018b. Subsequently, OTS was performed in the GAMS environment, taking into consideration the contingencies described above. This simulation ran on a computer with the following descriptions: CPU i7-4500, clock frequency 2.4 GHz, 8 GB of RAM, and Windows 8.
The test was performed on an IEEE 30−bus system as shown in Figure A1; the design of the network allowed making structural changes to it. Furthermore, bus 1 was assumed to be the oscillating bus of the SEP.
The pre-contingency data for both lines and bars of the system can be seen in Table A1, Table A2, and Table A3, respectively.
Once the simulation was carried out in the system indicated above, the particularities that the EPS presented in the post-contingency conditions could be evidenced, where condition N−1 was evaluated in each line. Once the data were obtained, they were imported into MATLAB; subsequently, the performance index or PI factor was determined, which weighed each contingency’s impact on the system.

System in Pre-Contingency Conditions

For the initial analysis, the active power delivered by each generator was established to cover all of the demands needed by the system at the lowest costs, as shown in Table 1.
As can be seen in Figure 1, the power flow carried out by the transmission lines of the system is in a stable state, and the PI values are shown in Table 2.
In Figure 2, the transmission lines are classified from greater to lesser impacts, where the highest value produces greater severity in the system in the event of an intentional attack.
In Table A3, there are 41 operating lines; however, they are according to what was proposed for this analysis where the lines whose PI values are above 4.5 are considered. The results presented in Figure 1 show the power flow in each power transmission line before applying the switching action on the EPS. Lines L28−27, L10−20, L9−11, L12−13, and L25−26 needed special consideration because the optimal transmission switching model did not allow the EPS to be restored in the event of an intentional attack, resulting in losses and operating costs; see Figure 2. For this case, re-powering must be planned, or, the need to implement distributed generation that allows optimal transmission switching in these nodes can be considered.
Through OPF−DC, the power flow analysis was performed for the base case. The results compare the system’s response to the contingencies considered for this study. In addition, these results show that some lines are underutilized, as is the case with lines L5−7 and L6−7, whose loadabilities are very low, i.e., 3.4% and 17.4%, respectively. It is essential to highlight that L9−11 does not transport flow, due to the lack of power demand in bus 11. On the other hand, L1−2 is at its operating limit with a load capacity of approximately 95.38%.
Subsequently, the OTS methodology is applied to the base case, resulting in the switching of five transmission lines. The significance of this technique is highlighted as it optimizes the utilization of the system’s physical resources.
In the case of L28−27, it causes the loss of the generation units that are connected to busbars 1 and 3. The aforementioned contingency can be considered the most important in terms of classifying cases of force majeure within the ranking of contingencies. On the other hand, the disconnection of lines L10−20 and L25−26 causes the disconnection of the loads connected to busbars 20 and 26. Lastly, lines L9−11 and L12−13 cause the disconnection of generation units, specifically Gen5 and Gen6 from bars 11 and 13, respectively.
The lines that deserve planning and expansion are discarded; the ranking of contingencies is carried out only with the lines where optimal transmission switching can be applied, as shown in Figure 3.
Excluding the unfeasible cases, the most critical contingency under the contingency ranking analysis in the IEEE 30−bus system would be the contingency involving lines L4−12 and L9−10, which cause more significant inconveniences than the other failures.
Although there are cases that generate worse conditions in the system, these are not considered because the OTS strategy does not provide a solution (performance index = 0), e.g., contingencies that cause the non-operation of generators or the formation of islands. Among the list of contingencies to be considered for the OTS simulation, the disconnection of L4−12 is deemed to be the most severe. Additionally, the loss of L1−2 is assumed, as it carries the highest power flow.
The EPS analyzed in this article requires approximately 310 MW for its optimal performance; each generator in the different scenarios contributes an amount of power that provides energy; on the other hand, in other scenarios, Figure 4 shows the power dispatch of each generator. The generation cost is the same in all scenarios and amounts to 587.98 $/h.
Meanwhile, the voltage angle variation when applying OPF−DC and OTS is observed in Figure 5, where the voltage angle in bus 3 presents the most significant change (−0.236 to −0.381).
Now, when considering the contingency of L4−12, several vital events exist to analyze. On the one hand, the optimal switching model proposes three line disconnections, without considering the contingency line. For this reason, a total of four lines will be disconnected from the EPS, causing an increase in the power flow in the lines that share a common busbar with the disconnected lines.
L16−17 had a loadability of 93.50%, close to its operating limits; this value is well above the 29.50% loadability obtained in the pre-contingency state. A particular case occurs in L2-6, as can be seen in Figure 6; it was considered switched in OTSDC; however, due to the contingency of L4−12, it is included in the network. As a consequence, its loadability increases to 86.38%.
On the other hand, at this point, it is believed that the voltage angles in all of the simulated scenarios are the same, with a few exceptions. In addition, there is a considerable increase in flow in most of the lines, as is the case with L4−6. However, some lines maintain a constant power flow in all study scenarios, as with L6−8, L9−11, L12−13, and L27−30.
Likewise, the switching of L27−29 deserves special attention due to its presence in all analyzed study cases; therefore, it can be excluded without fear of severe repercussions for the system.
It should be noted that the scenario with L1−2 in contingency causes a load capacity of 100% of L12−15; thus, after a specific time, the line will be disconnected; consequently, the simple contingency problem will become N−2 and, subsequently, a possible cascade failure will arise. However, this event is not emphasized because it transcends the objective of the study.

5. Conclusions

The proposed methodology focuses on the behavior of power systems under intentional attacks. The methodology uses optimal DC power flows and optimal switching of transmission lines to quantify the active power flows through the lines and the voltage angles at the nodes. Based on these two parameters, possible collapses can be verified based on the contingency index. This allows the ordering of contingencies from the one that has the most significant impact to the least important.
It can be observed how the loadabilities of the lines are affected as the number of elements that go out of operation increases, and this is where the OTS criteria, together with the contingency index, become vital. Since it is an optimization function, it respects all the restrictions that allow the objective function to be fulfilled, and possible line disconnections are determined that will enable the EPS to operate within its safety limits. Thus, the restoration of the EPS operation generates alternatives that involve disconnecting some additional lines.
The proposed methodology prevents loads from being disconnected or, in other words, electricity rationing is generated for end users, optimizing technical resources; for example, generators dispatch the same amount of energy regardless of the number of lines that are disconnected and at the same time the contingency selection criteria reject situations that this methodology cannot solve. For this reason, in the event of the formation of islands or the disconnection of generators, future research must apply complementary techniques that avoid these events.
Finally, one of the possible extra applications of the proposed methodology is that power system operators can identify which elements of the EPS require the most attention concerning possible contingencies and, thus, be able to determine improvement plans or EPS expansions.
One of the main weaknesses of the proposed methodology is that when using the OPF−DC model as a basis, there are event exceptions that cannot be considered due to the fact that an excess of demand is generated in comparison to the generation; thus, lines L28−27, L10−20, L9−11, L12−13, and L25−26 were not considered as contingency possibilities. For the model to work with these types of cases, it should be hybridized with one that performs expansion planning or EPS improvement.

Author Contributions

J.T., D.C.: conceptualization, methodology, validation, writing—review and editing. J.T.: methodology, software, writing—original draft. D.C.: data curation, formal analysis. D.C.: supervision. M.J.: writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Universidad Politécnica Salesiana and GIREI—Smart Grid Research Group under the optimal operation of electrical power systems considering new technologies and energy sustainability criteria project.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The abbreviations used in this article are as follows
gnumber of generators
i , j busbar number
Ω l line set
Ω B busbar set
Ω G generator set
C g generator operation cost
B i j electrical susceptance of the transmission line
X i j electrical reactance of the transmission line
L i electrical demand at the busbar i
L S i i busbar load disconnect
P i j m a x maximum transmission line rate
P g m a x maximum generation
P g m i n minimum generation
δ i origin busbar angle
δ j destiny busbar angle
δ m a x maximum angular difference between bars ij
δ m i n minimum angular difference between bars ij
N S W maximum number of switched lines
ζ i j line state
ψ i j contingency state
P g generator power
P i j power flow transmitted by the line
F O p variable to optimize
Mmaximum power value of the lines

Appendix A

Figure A1 shows the IEEE 30−bus system, while Table A1 displays the characteristics of the electrical demands considered at each node. Table A2 shows the line connections between bars, line reactance, power limits, and operating costs taken into account. Table A3 provides details on the data considered in the generation units.
Figure A1. IEEE 30−bus system topology.
Figure A1. IEEE 30−bus system topology.
Energies 16 02879 g0a1
Table A1. IEEE 30−bus system electrical demand data.
Table A1. IEEE 30−bus system electrical demand data.
BusbarActive
Power [MW]
BusbarActive
Power [MW]
1-163.5
221.7179.0
32.4183.2
47.6199.5
594.2202.2
6-2117.5
722.822-
830.0233.2
9-248.7
105.825-
11-263.5
1211.227-
13-28-
146.2292.4
158.23010.6
Table A2. IEEE 30−bus system line data.
Table A2. IEEE 30−bus system line data.
Line
  i j
r
[p.u.]
x
[p.u.]
bij
[p.u.]
SIL
[MVA]
Line
  i j
r
[p.u.]
x
[p.u.]
bij
[p.u.]
SIL
[MVA]
1 − 20.01920.05750.052813016 − 170.08240.1932016
1 − 30.04520.16520.040813018 − 190.06390.1292016
2 − 40.05700.17370.03686519 − 200.03400.0680032
3 − 40.01320.03790.008413010 − 200.09360.2090032
2 − 50.04720.19830.041813010 − 170.03240.0845032
2 − 60.05810.17630.03746510 − 210.03480.0749032
4 − 60.01190.04140.00909010 − 220.07270.1499032
4 − 1200.256006521 − 220.01160.0236032
5 − 70.04600.11600.02047015 − 230.10000.2020016
6 − 70.02670.08200.017013022 − 240.11500.1790016
6 − 80.01200.04200.00903223 − 240.13200.2700016
6 − 900.208006524 − 250.18850.3292016
6 − 1000.556003225 − 260.25440.3800016
9 − 1000.110006525 − 270.10930.2087016
9 − 1100.208006528 − 2700.3960065
12 − 1300.140006527 − 290.21980.4153016
12 − 140.12310.255903227 − 300.32020.6027016
12 − 150.06620.130403229 − 300.23990.4533016
12 − 160.09450.19870328 − 280.06360.20000.042832
14 − 150.22100.19970166 − 280.01690.05990.013032
15 − 180.10730.2185016
Table A3. Characteristics of the basic components of the IEEE 30−bus system.
Table A3. Characteristics of the basic components of the IEEE 30−bus system.
GeneratorPmin [MW]Pmax [MW]
G150200
G22080
G31550
G41035
G51030
G61240

References

  1. Huang, G.; Wang, J.; Chen, C.; Qi, J.; Guo, C. Integration of Preventive and Emergency Responses for Power Grid Resilience Enhancement. IEEE Trans. Power Syst. 2017, 32, 4451–4463. [Google Scholar] [CrossRef]
  2. Nguyen, T.; Wang, S.; Alhazmi, M.; Nazemi, M.; Estebsari, A.; Dehghanian, P. Electric Power Grid Resilience to Cyber Adversaries: State of the Art. IEEE Access 2020, 8, 87592–87608. [Google Scholar] [CrossRef]
  3. Dehghanian, P.; Wang, Y.; Gurrala, G.; Moreno-Centeno, E.; Kezunovic, M. Flexible implementation of power system corrective topology control. Electr. Power Syst. Res. 2015, 128, 79–89. [Google Scholar] [CrossRef]
  4. Bosisio, A.; Berizzi, A.; Amaldi, E.; Bovo, C.; Morotti, A.; Greco, B.; Iannarelli, G. A GIS-based approach for high-level distribution networks expansion planning in normal and contingency operation considering reliability. Electr. Power Syst. Res. 2021, 190, 106684. [Google Scholar] [CrossRef]
  5. Carrión, D.; Palacios, J.; Espinel, M.; González, J.W. Transmission Expansion Planning Considering Grid Topology Changes and N−1 Contingencies Criteria; Springer: Berlin/Heidelberg, Germany, 2021; pp. 266–279. [Google Scholar] [CrossRef]
  6. Pilatásig, J.; Carrión, D.; Jaramillo, M. Resilience Maximization in Electrical Power Systems through Switching of Power Transmission Lines. Energies 2022, 15, 8138. [Google Scholar] [CrossRef]
  7. Quinteros, F.; Carrión, D.; Jaramillo, M. Optimal Power Systems Restoration Based on Energy Quality and Stability Criteria. Energies 2022, 15, 2062. [Google Scholar] [CrossRef]
  8. Khanabadi, M.; Ghasemi, H.; Doostizadeh, M. Optimal Transmission Switching Considering Voltage Security and N−1 Contingency Analysis. IEEE Trans. Power Syst. 2013, 28, 542–550. [Google Scholar] [CrossRef]
  9. Dehghan, S.; Amjady, N. Robust Transmission and Energy Storage Expansion Planning in Wind Farm-Integrated Power Systems Considering Transmission Switching. IEEE Trans. Sustain. Energy 2016, 7, 765–774. [Google Scholar] [CrossRef]
  10. Roque Coelho, E.P.; Moreira Paiva, M.H.; Vieira Segatto, M.E.; Caporossi, G. A New Approach for Contingency Analysis Based on Centrality Measures. IEEE Syst. J. 2019, 13, 1915–1923. [Google Scholar] [CrossRef]
  11. Gunduz, M.Z.; Das, R. Analysis of cyber-attacks on smart grid applications. In Proceedings of the 2018 International Conference on Artificial Intelligence and Data Processing, IDAP 2018, Malatya, Turkey, 28–30 September 2018; pp. 1–5. [Google Scholar] [CrossRef]
  12. Pinzón, S.; Carrión, D.; Inga, E. Optimal Transmission Switching Considering N−1 Contingencies on Power Transmission Lines. IEEE Lat. Am. Trans. 2021, 19, 534–541. [Google Scholar] [CrossRef]
  13. Wu, X.; Zhou, Z.; Liu, G.; Qi, W.; Xie, Z. Preventive Security-Constrained Optimal Power Flow Considering UPFC Control Modes. Energies 2017, 10, 1199. [Google Scholar] [CrossRef] [Green Version]
  14. Zhang, H.; Li, G.; Yuan, H. Collaborative Optimization of Post-Disaster Damage Repair and Power System Operation. Energies 2018, 11, 2611. [Google Scholar] [CrossRef] [Green Version]
  15. Fisher, E.; O’Neill, R.; Ferris, M. Optimal Transmission Switching. IEEE Trans. Power Syst. 2008, 23, 1346–1355. [Google Scholar] [CrossRef] [Green Version]
  16. Xu, X.; Cao, Y.; Zhang, H.; Ma, S.; Song, Y.; Chen, D. A Multi-Objective Optimization Approach for Corrective Switching of Transmission Systems in Emergency Scenarios. Energies 2017, 10, 1204. [Google Scholar] [CrossRef] [Green Version]
  17. Carrion, D.; Gonzalez, J.W. Optimal PMU Location in Electrical Power Systems under N−1 Contingency. In Proceedings of the 2018 International Conference on Information Systems and Computer Science (INCISCOS), Quito, Ecuador, 13–15 November 2018; IEEE: New York, NY, USA, 2018; pp. 165–170. [Google Scholar] [CrossRef]
  18. Salmeron, J.; Wood, K.; Baldick, R. Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids. IEEE Trans. Power Syst. 2009, 24, 96–104. [Google Scholar] [CrossRef] [Green Version]
  19. Kryukov, A.; Suslov, K.; Van Thao, L.; Hung, T.D.; Akhmetshin, A. Power Flow Modeling of Multi-Circuit Transmission Lines. Energies 2022, 15, 8249. [Google Scholar] [CrossRef]
  20. Arroyo, J.; Galiana, F. On the Solution of the Bilevel Programming Formulation of the Terrorist Threat Problem. IEEE Trans. Power Syst. 2005, 20, 789–797. [Google Scholar] [CrossRef]
  21. Basumallik, S.; Eftekharnejad, S.; Johnson, B.K. The impact of false data injection attacks against remedial action schemes. Int. J. Electr. Power Energy Syst. 2020, 123, 106225. [Google Scholar] [CrossRef]
  22. Mo, Y.; Kim, T.H.J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–Physical Security of a Smart Grid Infrastructure. Proc. IEEE 2012, 100, 195–209. [Google Scholar] [CrossRef]
  23. Liu, C.C.; Jung, J.; Heydt, G.T.; Vittal, V.; Phadke, A.G. The strategic power infrastructure defense (SPID) system. A conceptual design. IEEE Control Syst. 2000, 20, 40–52. [Google Scholar] [CrossRef]
  24. Rocco, C.M.; Ramirez-Marquez, J.E.; Salazar, D.E.; Yajure, C. Assessing the Vulnerability of a Power System Through a Multiple Objective Contingency Screening Approach. IEEE Trans. Reliab. 2011, 60, 394–403. [Google Scholar] [CrossRef]
  25. Salmeron, J.; Wood, K.; Baldick, R. Analysis of Electric Grid Security Under Terrorist Threat. IEEE Trans. Power Syst. 2004, 19, 905–912. [Google Scholar] [CrossRef] [Green Version]
  26. Delgadillo, A.; Arroyo, J.M.; Alguacil, N. Analysis of Electric Grid Interdiction With Line Switching. IEEE Trans. Power Syst. 2010, 25, 633–641. [Google Scholar] [CrossRef]
  27. T. C., P.; Boroojeni, K.G.; Hadi Amini, M.; Sunitha, N.; Iyengar, S. Key pre-distribution scheme with join leave support for SCADA systems. Int. J. Crit. Infrastruct. Prot. 2019, 24, 111–125. [Google Scholar] [CrossRef]
  28. Yan, J.; He, H.; Zhong, X.; Tang, Y. Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks. IEEE Trans. Inf. Forensics Secur. 2017, 12, 200–210. [Google Scholar] [CrossRef]
  29. Jabarnejad, M. Approximate optimal transmission switching. Electr. Power Syst. Res. 2018, 161, 1–7. [Google Scholar] [CrossRef]
  30. Wang, Q.; Watson, J.P.; Guan, Y. Two-stage robust optimization for N-k contingency-constrained unit commitment. IEEE Trans. Power Syst. 2013, 28, 2366–2375. [Google Scholar] [CrossRef]
  31. Zhu, J. Optimization of Power System Operation; John Wiley & Sons: Hoboken, NJ, USA, 2016; Volume 4, p. 665. [Google Scholar]
  32. Montoya, O.D.; Gil-González, W.; Garces, A. Sequential quadratic programming models for solving the OPF problem in DC grids. Electr. Power Syst. Res. 2019, 169, 18–23. [Google Scholar] [CrossRef]
  33. Lin, J.; Hou, Y.; Zhu, G.; Luo, S.; Li, P.; Qin, L.; Wang, L. Co-optimization of unit commitment and transmission switching with short-circuit current constraints. Int. J. Electr. Power Energy Syst. 2019, 110, 309–317. [Google Scholar] [CrossRef]
  34. Sahraei-Ardakani, M.; Li, X.; Balasubramanian, P.; Hedman, K.W.; Abdi-Khorsand, M. Real-Time Contingency Analysis With Transmission Switching on Real Power System Data. IEEE Trans. Power Syst. 2016, 31, 2501–2502. [Google Scholar] [CrossRef]
Figure 1. Power flow in the transmission lines.
Figure 1. Power flow in the transmission lines.
Energies 16 02879 g001
Figure 2. Contingency index for transmission lines for the IEEE 30−bus system.
Figure 2. Contingency index for transmission lines for the IEEE 30−bus system.
Energies 16 02879 g002
Figure 3. Contingency rate in case of disconnection of lines.
Figure 3. Contingency rate in case of disconnection of lines.
Energies 16 02879 g003
Figure 4. Generation dispatch after OPF−DC, OTS, and OTS + N−k.
Figure 4. Generation dispatch after OPF−DC, OTS, and OTS + N−k.
Energies 16 02879 g004
Figure 5. Online disconnection performance for each analysis scenario OPF−DC, OTS, and OTS + N−k.
Figure 5. Online disconnection performance for each analysis scenario OPF−DC, OTS, and OTS + N−k.
Energies 16 02879 g005
Figure 6. Maximum power to be transmitted applied with OPF−DC, OTS, and OTS + N−k.
Figure 6. Maximum power to be transmitted applied with OPF−DC, OTS, and OTS + N−k.
Energies 16 02879 g006
Table 1. Active power and generation cost in pre-contingency conditions.
Table 1. Active power and generation cost in pre-contingency conditions.
GeneratorPmin [MW]Pmax [MW]OPF−DC [MW]Cost [USD/MWh]
G150200149.742.00
G22080801.75
G31550501.00
G41035103.25
G51030103.00
G61240123.00
Demand
[MW]
311.74
Total cost
[USD/MWh]
587.98
Table 2. PI index.
Table 2. PI index.
Line
ij
PILine
ij
PILine
ij
PILine
ij
PI
1 − 23.93636 − 83.287215 − 183.399122 − 243.4561
1 − 33.77196 − 93.900516 − 173.369423 − 243.3499
2 − 42.65756 − 103.546818 − 193.289324 − 253.3212
3 − 43.62499 − 104.446419 − 203.85546 − 283.4661
2 − 54.01299 − 112.838210 − 204.177625 − 273.4748
2 − 63.725512 − 132.625110 − 173.451128 − 2712.5999
4 − 63.124712 − 143.533410 − 213.614327 − 293.4913
4 − 125.337312 − 153.866510 − 223.442727 − 303.7432
5 − 73.336812 − 163.543721 − 223.332229 − 303.3574
6 − 73.190514 − 153.349315 − 233.55438 − 283.3071
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Toctaquiza, J.; Carrión, D.; Jaramillo, M. An Electrical Power System Reconfiguration Model Based on Optimal Transmission Switching under Scenarios of Intentional Attacks. Energies 2023, 16, 2879. https://doi.org/10.3390/en16062879

AMA Style

Toctaquiza J, Carrión D, Jaramillo M. An Electrical Power System Reconfiguration Model Based on Optimal Transmission Switching under Scenarios of Intentional Attacks. Energies. 2023; 16(6):2879. https://doi.org/10.3390/en16062879

Chicago/Turabian Style

Toctaquiza, Juan, Diego Carrión, and Manuel Jaramillo. 2023. "An Electrical Power System Reconfiguration Model Based on Optimal Transmission Switching under Scenarios of Intentional Attacks" Energies 16, no. 6: 2879. https://doi.org/10.3390/en16062879

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop