Secure Region of Network and Comparison with Invulnerability
XIAO Jun1, SU Buyun2, LI Xin3, WANG Chengshan1
1. Key Laboratory of Smart Grid of Ministry of Education, Tianjin University,Tianjin 300072,China; 2. Guangdong Electric Power Design Institute, CEEC, Gungzhou 510663,China; 3. Sichuan Electric Power Research Institute, Chengdu 610072, China
Abstract:This paper presents a new method for security analysis and precautionary measures when attack or error occurs in networks. This method describes the operating region under N-1 constraint and presents the degree of security or insecurity by secure distance to indicate direction and intensity for next step. We put the method into effect in general networks, small communication network and large-scale power network to verify its correctness, and compare it with network invulnerability. It can be seen that secure distance index and invulnerability index are very consistent in judging the reliability of a system, meanwhile, the former can bring secure region information to eliminate hidden dangers in advance and be appropriate for online security surveillance and control based on faster calculation speed.
肖峻, 苏步芸, 李鑫, 王成山. 网络的安全域方法及与抗毁性的对比验证[J]. 复杂系统与复杂性科学, 2016, 13(4): 41-50.
XIAO Jun, SU Buyun, LI Xin, WANG Chengshan. Secure Region of Network and Comparison with Invulnerability[J]. Complex Systems and Complexity Science, 2016, 13(4): 41-50.
[1] Wen H, Lin C, Ren F, et al. Retransmission or redundancy: transmission reliability in wireless sensor networks[J].Sci China Ser F, 2012, 55(4): 737-746. [2] Chen Y Z, Li N, He D R. A study on some urban bus transport networks[J].Physica A: Statistical Mechanics and its Applications, 2007, 376(1): 747-754. [3] Min Y, Jin X, Chen M, et al. Pathway knockout and redundancy in metabolic networks[J].J Theor Biol, 2011, 270(1): 63-69. [4] Albert R, Jeong H, Barabási A L. Error and attack tolerance of complex networks[J].Nature, 2000, 406(6794): 378-382. [5] 谭跃进, 吕欣, 吴俊, 等. 复杂网络抗毁性研究若干问题的思考[J].系统工程理论与实践, 2008(增刊): 116-120. Tan Yuejin, Lu Xin, Wu Jun, et al. On the invulnerability research of complex networks[J].System Engineering Theory & Practice, 2008( Suppl): 116-120. [6] Borgatti S P, Mehra A, Brass D, et al. Network analysis in the social sciences[J].Science, 2009, 323(5916): 892-895. [7] Cohen R, Erez K, Ben-Avraham D, et al. Breakdown of the Internet under intentional attack[J].Phys Rev Lett, 2001, 86(16): 3682. [8] Liu H R, Dong M R, Yin R R, et al. Cascading failure in the wireless sensor scale-free networks[J].Chin Phys B, 2015, 24(5): 050506. [9] Ouyang M. Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability[J].Chaos, 2013, 23(23):023114. [10] Bashan A, Berezin Y, Buldyrev S V, et al. The extreme vulnerability of interdependent spatially embedded networks[J].Nature Physics, 2013, 9(10): 667-672. [11] Buldyrev S V, Parshani R, Paul G, et al. Catastrophic cascade of failures in interdependent networks[J].Nature, 2010, 464(7291): 1025-1028. [12] Wang W X, Chen G R. Universal robustness characteristic of weighted networks against cascading failure[J].Physical Review E, 2008, 77(2): 20-28. [13] 段立东, 武小悦. 基于可调负载重分配的无标度网络连锁效应分析[J].物理学报, 2014, 63(3): 030501. Duan LiDong, Wu Xiaoyue. Cascading failure of scale-free networks based on a tunable load redistribution model[J].Acta Phys Sin, 2014, 63(3): 030501. [14] 戴存礼, 吴威, 赵艳艳, 等. 权重分布对加权局域世界网络动力学同步的影响[J].物理学报, 2013, 62(10): 108903. Dai Cunli, Wu Wei, Zhao Yanyan, et al. Effect of weight distribution on the synchronization of weighted generalized local-world networks[J].Acta Phys Sin, 2013, 62(10): 108903. [15] 张喜平, 李永树, 刘刚, 等. 节点重要度贡献的复杂网络借点重要度评估方法[J].复杂系统与复杂性科学, 2014, 11(3): 26-32. Zhang Xiping, Li Yongshu, Liu Gang,et al. evaluation method of importance for nodes in complex networks based on importance contribution[J].Complex Systems and Complex Science, 2014, 11(3): 26-32. [16] Wang L W. Origin of the stronger robustness against cascading failure of complex networks: a mitigation strategy perspective[J].Mod Phys Lett, 2013, 27(3): 1350023. [17] Lakervi E, Holmes E J, et al. Electricity distribution network design[J].Lee Review, 1990, 36(4):340. [18] Hnyilicza E, Lee S T Y, Schweppe F C. Steady-state security regions: the set-theoretic approach[J].Proceedings of the PICA Conference, 1975:347-355. [19] Ding T, Guo Q L, Bo R, et al. A static voltage security region for centralized wind power integratio —part I concept and method[J].Energies, 2014, 7(1): 420-443. [20] 余贻鑫. 电力系统安全域方法研究述评[J].天津大学学报, 2008, 41(6): 635-646. Yu Yixing. Review of study on methodology of security regions of power system[J].J Tianjin Univ,2008, 41(6): 635-646. [21] Liu F, Wei W, Mei S W. On expansion of estimated stability region: theory, methodology, and application to power systems[J].Sci China Ser E, 2011, 54(6): 1394-1406. [22] Liu Y L, Yu Y Y. Probabilistic steady-state and dynamic security assessment of power transmission system[J].Sci China Ser E, 2013, 56(5): 1198-1207. [23] 秦勇, 史婧轩, 张媛,等. 基于安全域估计的轨道车辆服役状态安全评估方法[J].中南大学学报(自然科学版), 2013(s1):195-200. Qin Yong, Shi Jingxuan, Zhang Yuan, et al. Research on method framework of security region estimation in rail transit system operation safety assessment[J].J Central South Univ (Sci Technol), 2013(s1):195-200. [24] Goldsmith A. Capacity limits of MIMO channels[J].IEEE Journal on Selected Areas in Communications, 2003, 21(5): 684-704. [25] 余贻鑫, 栾文鹏. 智能电网述评[J].中国电机工程学报, 2009(34), 29: 1-8. Yu Yixin, Luan WenPeng. Smart grid and its implementations[J].Proceedings of CSEE, 2009, 29(34): 1-8. [26] 肖峻, 贡晓旭, 王成山. 智能配电网N-1安全边界拓扑性质及边界算法[J].中国电机工程学报, 2014, 34(4): 545-554. Xiao Jun, Gong XiaoXu, Wang ChengShan. Topological properties of N-1 security boundary for smart distribution network[J].Proceedings of CSEE, 2014, 34(4): 545-554. [27] Xiao J, Gu W Z, Wang C S. Distribution system security region: definition, model and security assessment[J].IET Generation, Transmission & Distribution, 2012, 6(10): 1029-35. [28] 肖峻, 贺琪博, 苏步芸. 基于安全域的智能配电网安全高效运行模式[J].电力系统自动化, 2014,38(19): 52-60. Xiao Jun, He Qibo, Su Buyun. A secure and efficient operation mode for smart distribution networks based on security region[J].Automation of Electric Power Systems, 2014, 38(19): 52-60. [29] Felemban E, Chang-Gun L, Ekici E. Multipath routing techniques in wireless sensor networks: a survey[J].Wireless Pers Commun, 2013, 70(2): 807-829. [30] 张景中. 数学辞海第五卷[M].北京: 中国科学技术出版社, 2002:10-11. [31] 黄汉江. 建筑经济大辞典[M].上海: 上海社会科学出版社, 1990:230. [32] Halpi N S M, Harley K A. Anticipatory load shedding for line overload alleviation using teaching learning based optimization[J].IEEE Electrical Power and Energy Systems, 2014, 63(12): 862-877. [33] Zhang A M H, Gao Z Y, Ren H L. Incident-based traffic congestion control strategy[J].Sci China Ser E, 2011, 54(5): 1338-1344. [34] Graham C, Robert P. Self-adaptive congestion control for multiclass intermittent connections in a communication network[J].Queueing Syst, 2011, 69(3-4): 237-257. [35] 陈建国. 网络分析与设计的抗毁性量度剖析[J].无线电工程, 1998(6), 28: 12-17. Chen Jianguo. Study on measure of invulnerability for network design and analyst[J].Radio Engineering, 1998, 28(6): 12-17. [36] 李勇, 邓宏钟. 不同流量的复杂保障网络抗毁性仿真分析[J].火力与指挥控制, 2010, 35(3): 9-13. Li Yong, Deng Hongzhong. Simulated analysis of complex networks with different flows[J].Fire control & command control, 2010, 35(3): 9-13.