1. Introduction
Recently, power system blackouts have occurred frequently around the world, causing huge economic losses and serious social impact [
1,
2,
3]. Research shows that catastrophic blackouts are usually initiated by failure of one or several components [
4,
5,
6]. These components can be called weak components or vulnerable components [
7], including transmission lines, transformers, etc. Meanwhile, intermittent energy resources, such as wind turbines, and DC transmission have been extensively integrated into power systems, which makes the dynamic characteristics and operation mode of power systems more complex [
8,
9]. The safe and stable operation of novel power systems is facing severe challenges due to their own development [
10]. In this case, once weak components of a novel power system fail, blackout accidents could be further exacerbated, and the system may face higher operation risk. To this end, identifying weak components of the novel power system with intermittent energy resources and DC integration is of great significance, which contributes to maintaining secure system operation and preventing system blackout.
Much research has been conducted on identifying the weak components of power systems. There are mainly two types of methods in the research field. The first type of research is based on complex network theory. This type of method uses the concept of degree and betweenness and combines with electrical characteristics to identify the weak components of power systems. The authors in [
11] indicated that degree centrality methods inherently only take into account the local information of a power network, and the analysis results are not fully reliable. The concept of line electrical betweenness based on the physical characteristics of a power grid was proposed in [
12] to identify weak components. The concept of extended betweenness based on the power transfer distribution factors was proposed in [
13], which can consider the contribution of each transmission line. A maximum flow-based complex network approach was proposed in [
14] to identify weak lines in power systems. The network is modeled as a graph. Then, an improved maximum flow-based complex network approach was used for topology analysis. The complex network theory for modern smart grid applications was investigated in [
15], including structural vulnerability assessment, cascading blackouts, etc. A weak transmission lines identification method based on the depth of the K-shell decomposition was proposed in [
16], which fully considers the dynamic characteristics of the power transfer and transmission capability after the power grid fault. The hybrid flow betweenness is defined in [
17] to identify weak lines, which covers the direction of power flow and the maximum transmission capacity of lines with a more comprehensible physical background. An electrical betweenness method that can better balance the accuracy and efficiency of identifying vulnerable lines was proposed in [
18]. The power percentage of the generator load is used as an indicator to evaluate the stability of a power grid, and the dynamic influence of generator and load node removal on a power grid is considered in the literature. A holomorphic embedding method was proposed in [
19] to assess the vulnerable bus of power systems. The concept of an interaction graph was applied to model cascading outages in [
20,
21,
22], and then vulnerable lines of power systems can be efficiently determined.
The second type of research method is based on power system operation condition, which aims to define several indexes reflecting system operation state. In [
23], a reactive power loss index (RPLI) is proposed to identify the weak components of power systems. Then, this index is further used for determining the optimal locations for placement of reactive compensation devices. In [
24,
25], several security indexes, such as generator output capacity, line reactance, maximum line transfer capacity value, and power transfer characteristics of the power system were defined to identify the weak components of the system. Then, these indexes were weighted to form a comprehensive index. In [
26], several indexes were proposed by jointly considering the topology structural vulnerability and the power flow transmission vulnerability, and then a clustering algorithm was proposed and employed to divide the lines to identify the vulnerable lines in the systems. A vulnerable lines identification method based on a weighted H-index was proposed in [
27], which mainly reflected the correlation of the transmission branches on the active power transmission and constructed the correlation network. The authors in [
28,
29] used the concept of entropy to identify vulnerable components. Specifically, power flow entropy and improved power flow entropy were defined to discriminate line vulnerability in terms of system power flow calculation. In [
30], several indexes concerning complex network and electrical characteristics of a power system were defined to identify the weak components of power systems, where the electrical characteristics are mainly based on the power transfer distribution factor. Then, an intercriteria correlation-based multi-index decision-making method was proposed to comprehensively identify the importance of components. The authors in [
31] converted the power flow computation challenge into an optimization problem with constraints, wherein crucial components were discerned through a dynamic interplay between attackers and defenders. The authors in [
32] introduced a vulnerability assessment method for transmission lines in power system incorporating network topology and system operational states, where the improved power transfer distribution factor and line outage distribution factor are used to build the line operational state vulnerability indices. In [
33], a series of line vulnerability indexes were defined for vulnerable line identification, where these indexes incorporate line load rate, power flow fluctuation index, line failure probability, etc. Then, the combination weighting method was used to obtain a comprehensive vulnerability index.
The above research can fairly identify the vulnerable components of power systems but mainly focuses on traditional power systems. Nowadays, intermittent energy resources and DC transmission have been extensively integrated into novel power systems. The stochastic characteristic induced by intermittent energy output and the operational characteristic of DC transmission change the system operation mode overwhelmingly. The above vulnerable component identification method is not well applicable to novel power systems. Therefore, the integration of intermittent energy resources and their impact on vulnerable component identification has gradually become a hot topic. In [
34], an electrical LeaderRank method is proposed to identify the important nodes in power grids, considering the renewable energy uncertainties and transmission power flow. In [
35], a method for identifying vulnerable lines based on the theory of topological potential is proposed, which can consider wind power uncertainty. The proposed index comprehensively considers the in-degree and out-degree topological potentials of nodes and uses the entropy weight method for weight allocation.
In summary, the current weak component identification research of novel power systems with renewable energy and DC integration is relatively lacking. Moreover, rarely has the literature considered the impacts of renewable energy and DC on power system vulnerable component identification simultaneously. The stochastic characteristic of renewable energy output and the operational characteristic of DC transmission need to be considered synchronously. Furthermore, the current research method based on power system operation condition mainly uses the tool of power flow calculation to identify vulnerable components, which focuses on the steady state of the system. The dynamic characteristic of the system is less considered, which makes it hard to reflect the impacts of vulnerable components on power systems comprehensively.
Therefore, a novel identifying method for weak components of novel power systems with intermittent energy sources and DC integration is proposed in this paper, which aims to prevent novel power system blackouts. It is worth mentioning that references to vulnerable components in this paper mainly refer to vulnerable lines. Firstly, a series of risk assessment indexes consisting of power system security and stability is proposed, which can quantify the system risk due to vulnerable line outage in a comprehensive fashion. Then, a comprehensive weight method based on game theory is adopted. A comprehensive risk assessment indicator can be obtained by weighting each risk assessment indicator, which can determine the vulnerability of each line in power systems. Finally, the proposed method is tested in an improved IEEE 39 bus system with wind farms and AC/DC interconnection.
The rest of this paper is organized in the following manner.
Section 2 proposes an overall risk assessment index system for the vulnerable lines.
Section 3 details the calculation process of the proposed risk assessment index system. In
Section 4, a comprehensive risk assessment index of vulnerable lines is proposed based on game theory. In
Section 5, a modified IEEE 39 bus system which is integrated into wind farms and DC is used to test the proposed method. The software Matlab 2020b is used to test the proposed method.
Section 6 concludes the whole paper.
4. Comprehensive Risk Assessment Index of Vulnerable Lines
In this paper, six risk assessment indexes are defined to identify vulnerable lines from the perspective of system security and stability for the novel power system. When there is a line outage, the vulnerability of the line is evaluated by calculating the six indicators, respectively. On this basis, in order to comprehensively evaluate the vulnerability of each line, it is necessary to integrate these assessment indicators. In this paper, the comprehensive weight method based on game theory is used to weight these risk indicators.
Firstly, the magnitude and dimension of the six indicators need to be unified, and then they need to be weighted. The comprehensive risk evaluation index
Rc of vulnerable lines is obtained by weighting each index.
Here,
α1 to
α6 are the weights of each risk index; the upper line represents the normalized risk index. The weight calculation process using the comprehensive weighting method based on game theory is as follows [
43]:
(1) The subjective weight B1 of each risk index is obtained based on the analytic hierarchy process, and the objective weight B2 of each risk index is obtained based on the entropy weight method. The weights of the two methods are linearly combined to obtain the weight B = β1B1 + β2B2 of the comprehensive weighting method, where β1 and β2 are the comprehensive weight combination coefficients.
(2) In order to minimize the deviation between the comprehensive weight and each basic weight, it is necessary to establish the corresponding optimization objective to optimize the coefficient
β1 and
β2.
(3) According to the differential properties of matrices, Equation (29) can be transformed into:
The comprehensive weights β1 and β2 can be obtained by substituting the solved weights B1 and B2 into (30), and then the comprehensive weight B obtained by the comprehensive weighting method based on game theory can be solved by the linear combination in step (1).
Based on the above analysis, for the novel power system, each line in the system is tripped one by one, and each risk assessment index defined is calculated separately. All risk indicators are weighted by the comprehensive weighting method to obtain a comprehensive risk assessment index. The vulnerability of each line is assessed according to the level of the comprehensive risk assessment index. When there is a line outage, the higher the comprehensive risk assessment index, the greater the system risk caused by the line outage, the more important the line in the system, and the more vulnerable the line.
5. Simulation Tests
An improved IEEE 39 bus system with wind farms and DC access was used as a test system to verify the applicability of the method proposed in this paper. The system structure is shown in
Figure 2. The original synchronous generators of busses 32, 34, and 38 are replaced by wind farms. It is assumed that the installed capacity of each wind farm is 650 MW, 500 MW, and 450 MW, respectively, and the total permeability of renewable energy is about 33%. The original AC line L3–18 is replaced by the LCC-HVDC line, in which bus 3 is the rectifier station and bus 18 is the inverter station. The constant ratio and constant current control are used for rectifiers, and the constant ratio and constant control angle are used as inverters. The constant power model is used in the simulation test, and the total load power of the system is 6150 MW. The wind turbine is regarded as a power source. All synchronous generators apply the classical model with a first-order governor model.
Firstly, the probabilistic AC/DC power flow calculation method based on the analytical method proposed in this paper is used to calculate the bus voltage violation and line overload risk after each line outage. Taking line L1–2 as an example, when it is tripped, the probability distribution of each bus voltage and each line power can be determined by using the probabilistic AC/DC power flow calculation method proposed in this paper. The probability distribution of the bus voltage amplitude of bus 22 and the probability distribution of the active power on line L16–19 are shown in
Figure 3. At the same time, the probabilistic AC/DC power flow is also calculated by MCS to verify the accuracy of the proposed probabilistic power flow method.
In
Figure 3, the red curve is the result obtained by MCS, and the blue curve is the result obtained by the analytical method proposed in this paper. It can be seen that the results obtained by the two methods are very close. In terms of calculation time, the proposed method takes 0.43 s and MCS takes 97 s, indicating that the proposed method greatly improves the calculation efficiency while satisfying the calculation accuracy.
Based on the probability distribution of the bus voltage and line power, the risk of system voltage violation and line overload after each line outage can be obtained by (9) to (12), as shown in
Figure 4 and
Figure 5.
In
Figure 4, the risk of bus voltage violation and line overload occur after some lines are tripped. According to the risk level, the top 10 lines that cause voltage violation risk and line overload risk are selected, respectively, as shown in
Table 1.
In
Table 1, the risk of voltage violation caused by the outage of L15–16, L25–26, and L9–39 is 0.1556, 0.1371, and 0.1046, respectively, ranking the top three in all lines. If these lines are attacked and tripped, the system will have a high risk of voltage violation. In the line overload risk index, the outage of L25–26 and L20–34 is more likely to cause an overload of other lines in the system, indicating that these lines are more important and vulnerable in the line overload risk index. After there is an outage in some lines, such as L1–2 and L16–24, the risk of bus voltage violation and line overload is zero, indicating that these lines are not important lines in the system under these two indicators. Even if they are attacked, they will not cause the risk of voltage violation and line overload.
The static security of the system after each line outage is assessed. When there is an outage in each line, the remaining lines are tripped one by one by using the N − 1 principle. The static security risk of the system after each line outage is solved by (13), as shown in
Figure 5.
In
Figure 5, the outage of each line has impacts on the static security of the system. According to the risk level, the top 10 lines are ranked as shown in
Table 2. Among them, L25–26, L9–39, and L8–9 are the top three lines, indicating that these lines have the greatest impact on the static security of the power system once there is an outage. They are the most vulnerable lines in the static security index.
The risk of static frequency instability of the system after each line outage is assessed. Through (14)–(17), the probability distribution of system eigenvalues during the fluctuation of wind farm outputs can be obtained, respectively. Then, the static frequency instability risk of the system after each line outage can be obtained by (18), as shown in
Figure 6.
From
Figure 6, only when there is an outage in L25–26, the system will have the risk of static frequency instability, indicating that L25–26 is the most vulnerable line in the static frequency stability risk index. When the line is attacked, it is prone to causing static frequency instability of the system.
The risk of static rotor angle instability of the system after each line outage is evaluated. Through (19)–(21), the probability distribution of the static stability limit of each generator after each line outage can be obtained, and then through (22)–(24), the risk that the static rotor angle stability reserve coefficient of the system does not meet the operation requirements is determined, as shown in
Figure 7.
In
Figure 7, the outage of some lines leads to insufficient static rotor angle stability reserve in the system. The top 10 lines are shown in
Table 3. Among them, lines such as L15–16, L2–25, and L9–39 are the most vulnerable lines in the static rotor angle stability index. When they are attacked, the system is prone to static rotor angle instability.
The risk of static voltage instability in the system after each line outage is evaluated. By tripping each line of the system one by one, the probability distribution of the critical value of voltage instability for each bus is assessed by probabilistic power flow. Then, the risk of static voltage instability is calculated by (25)–(27), as shown in
Figure 8.
From
Figure 8, the static voltage stability reserve of the system does not meet the operation requirements due to the outage of some lines, and there is a certain risk of static voltage instability. Taking the top 10 risk lines as shown in
Table 4, the outages of L2–25, L25–26, and other lines have the greatest impact on static voltage stability. When they are attacked, they are very likely to cause static voltage instability in the system.
Through the above simulation results, the influence of line outage on system security and stability is evaluated. The vulnerability of each line under each risk assessment index is obtained. In order to finally obtain the vulnerability of each line, the game-theory-based comprehensive weighting method is used to weight multiple indicators to form a comprehensive risk index to evaluate the vulnerability of each line. Firstly, the results of each index are normalized, and the subjective weight B
1 = [0.0859, 0.0650, 0.1508, 0.2790, 0.2097, 0.2097] of each index is solved by analytic hierarchy process. The objective weight B
2 = [0.1823, 0.1657, 0.0430, 0.3637, 0.1603, 0.0849] of each index is obtained by entropy weight method, and β
1 = 0.2945, β
2 = 0.7597 is obtained by (30). Then, the comprehensive weight of each index is B = [0.1638, 0.1450, 0.0771, 0.3585, 0.1836, 0.1263]. The normalized risk assessment index results are weighted according to the comprehensive weight B. Finally, the comprehensive risk of each line outage on the system’s security and stability can be obtained as shown in
Figure 9.
In
Figure 9, the top 10 risk lines are shown; they are shown in
Table 5 according to the risk ranking. From the perspective of system security and stability, L25–26 has the highest importance in the system. When there is an outage, it has the greatest impact on system security and stability, and it is the most important and vulnerable line in the system. Compared with L25–26, the importance of lines such as L9–39, L8–9, L15–16, and L2–25 is second, but they are also relatively vulnerable lines in the system. Once they experience an outage, it will also have a great impact on the security and stability of the system.
By assessing the vulnerable lines in the system, it can provide a decision-making basis for the control strategy that can prevent power systems from blackouts. For example, in the simulation test, the defense of vulnerable lines such as L25–26 and L9–39 can be strengthened. From the perspective of power system operation, corresponding control measures and contingency plans can be formulated and implemented according to these vulnerable lines, so that the system can still maintain safe operation even if these vulnerable lines experience an outage.
In order to further demonstrate the effectiveness of the proposed method, the method proposed in [
25] is used to compare with the proposed method in this paper. The authors in [
25] also identified the weak lines of the system by defining a variety of vulnerability indicators, such as topology indexes based on network structure and indexes based on power flow calculation. Moreover, these indexes proposed in [
25] are also weighted to form a comprehensive index to identify vulnerable lines of power systems. Therefore, [
25] could be regarded as representative enough to compare with the proposed method in this paper. The vulnerable lines that rank in the top 10 obtained by the proposed method in this paper and [
25] are shown in
Table 6.
From
Table 6, the method in this paper is the same as the method proposed in [
25] to identify a total of five lines in the set of vulnerable lines. The most vulnerable line obtained by [
25] is L16–19, which is the same as the results obtained by the proposed method. The indexes proposed in [
25] contain power transfer characteristics. Thus, lines that are prone to inducing line overload after an outage such as L25–26, L22–35, and L2–30 are more vulnerable than other lines. Meanwhile, the indexes proposed in [
25] also contain topology connectivity. Some lines such as L2–30, L22–35, and L10–32 are more vulnerable than other lines since the outage of these lines will make some generators split from the system, which damages the topology connectivity of the system. This paper assumes that the generator on the swing bus has enough capacity. Although these line outages will unbalance the system power, the swing bus will regulate the power to keep the system power balanced. Therefore, in this paper, the outage of these lines does not cause severe problems (such as static rotor angle instability, etc.) other than triggering overloading of the lines connected to the swing bus. These lines are not the most vulnerable lines in this paper. Furthermore, for L9–39, its vulnerability ranks second in this paper but does not rank in the top 10 in [
25], indicating that the line is not vulnerable after identification in [
25]. However, although the impact of L9–39 outage on line overload is small, its outage will cause static rotor angle instability and static voltage instability in this paper, which will cause severe operation issues for power systems. However, it cannot be well reflected by [
25]. In contrast, the indicators proposed in this paper can assess the security and stability of the system simultaneously. These indexes are always the most important indexes for power systems, which can give more comprehensive and effective identification for vulnerable lines than existing methods.