English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109952/140891 (78%)
Visitors : 46260879      Online Users : 715
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/68268


    Title: 多種連鎖性失效的電網分析及有效率多重攻擊策略
    Various cascading failure models on power grids and efficient multi-target attack strategy
    Authors: 林丁順
    Contributors: 蕭又新
    Shiau, Yuo Hsien
    林丁順
    Keywords: 電力網路
    複雜網路
    脆弱性分析
    連鎖性失效
    攻擊策略
    Date: 2013
    Issue Date: 2014-08-06 11:47:32 (UTC+8)
    Abstract: 在真實網路中,一個節點或連結的損壞可能會造成網路大規模崩解,這現象亦出現在過去許多電力系統的大停電事件中。因此由網路的觀點對電力系統是否安全和穩定之研究一直是備受探討。在本論文中使用複雜網路方法對台灣電力網路進行脆弱性分析,並由攻擊者的角度使用多重攻擊策略探討網路脆弱性。
    本論文中使用了拓樸性效率脆弱性(efficiency vulnerability)和四種連鎖性失效模型針對台灣電力網路進行分析,其中包含三種靜態負載的連鎖性失效模型(static load cascading failure model)和一種動態負載的連鎖性失效模型(dynamic load cascading failure model),藉由這些不同觀點檢視台灣電力網路的脆弱性。
    以上模擬皆為攻擊單一連結,但若以攻擊者的觀點,其可以同時對多個連結進行破壞,因此最後部分為如何有效對網路造成傷害的多重攻擊策略,我們應用此攻擊策略於隨機網路(random network)以及無尺度網路(scale-free network)測試其有效性,最後將此攻擊策略應用於台灣電力網路,並從結果中透露出台灣電力網路相當脆弱。
    Reference: Reference

    [1] Chen, Jie, J. Thorp, and Manu Parashar. "Analysis of electric power system disturbance data." 2013 46th Hawaii International Conference on System Sciences. Vol. 2. IEEE Computer Society, 2001.
    [2] U. S. C. p. s. o. t. force, "Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations," April 2004.
    [3] Glanz, J. and R. Perez-Pena (2003). That Left Tens of Millions of People in the Dark. New York Times. 26.
    [4] D. N. Kosterev, et al., "Model validation for the August 10, 1996 WSCC system outage," IEEE Transactions on Power Systems, vol. 14, pp. 967-974, Aug 1999
    [5] Wong, J. J. (2007). Study of Preventive and Remedial Strategies based on Simulations and Analyses of 729 Blackout in Taiwan Power System. Electrical Engineering, National Chung Cheng University.
    [6] Strogatz, S. H. (2001). "Exploring complex networks." Nature 410: 268-276.
    [7] M.E.J Newman, Networks : an introduction, Oxford University Press, Oxford; New York, 2010
    [8] Brandes, Ulrik. "A faster algorithm for betweenness centrality*." Journal of Mathematical Sociology 25.2 (2001): 163-177.
    [9] Erdős, P., and A. Rényi. "On the evolution of random graphs." Selected Papers of Alfréd Rényi, vol 2 (1976): 482-525.
    [10] Barabási, Albert-László, and Réka Albert. "Emergence of scaling in random networks." science 286.5439 (1999): 509-512.
    [11] Latora, V. and M. Marchiori (2001). "Efficient Behavior of Small-World Networks." Physical Review Letters 87.
    [12] Eusgeld, I., et al. (2009). "The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures." Reliability Engineering and System Safety 94: 954-963.
    [13] Motter, A. E. and Y.-C Lai (2002). "Cascade-based attacks on complex networks. " Physical Review E 66(065102)
    [14] Crucitti, Paolo, et al. "Error and attack tolerance of complex networks." Physica A: Statistical Mechanics and its Applications 340.1 (2004): 388-394.
    [15] Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol. 389, pp. 595–603. Elsevier, Amsterdam (2010)
    [16] S. Tamronglak, “Analysis of power system disturbances due to relay hidden failures,” Ph.D. dissertation, Virginia Polytechnic Institute State Univ., Blacksburg, 1994.
    [17] J. Chen, J. Thorp, I. Dobson, Electrical Power & Energy Systems 27 (2005) 318
    [18] Simonsen, I., et al. (2008). "Transient Dynamics Increasing Network Vulnerability to Cascading Failures." Physical Review Letters 100.
    [19] Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems", IEEE GLOBECOM 2012, Dec. 2012.
    [20] S. Arianos, E. Bompard, A. Carbone, F. Xue, Power grid vulnerability: a complex network approach, Chaos, 19(2009)013119.
    [21] Wang, Jiaoe, et al. "Exploring the network structure and nodal centrality of China’s air transport network: A complex network approach." Journal of Transport Geography 19.4 (2011): 712-721.
    [22] Crucitti, Paolo, Vito Latora, and Massimo Marchiori. "Model for cascading failures in complex networks." Physical Review E 69.4 (2004): 045104.
    [23] Kinney, Ryan, et al. "Modeling cascading failures in the North American power grid." The European Physical Journal B-Condensed Matter and Complex Systems 46.1 (2005): 101-107.
    [24] Goh, K-I., B. Kahng, and D. Kim. "Universal behavior of load distribution in scale-free networks." Physical Review Letters 87.27 (2001): 278701.
    [25] Brandes, Ulrik. "On variants of shortest-path betweenness centrality and their generic computation." Social Networks 30.2 (2008): 136-145.
    [26] Liu, Y. H. (2012). Computational large-scale complex networks : competition network and power grid. Applied Physics, National Chengchi University.
    [27] Yi, C. K. (2013). Group-based vulnerability analyses on power grid and associated protection strategies against cascading failures. Applied Physics, National Chengchi University.
    Description: 碩士
    國立政治大學
    應用物理研究所
    100755003
    102
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G1007550031
    Data Type: thesis
    Appears in Collections:[應用物理研究所 ] 學位論文

    Files in This Item:

    There are no files associated with this item.



    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback