بررسی روش‌های تخصیص بهینه‌ی منابع برای دفاع از شبکه‌های برق در مقابل حملات عامدانه

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشگاه امام حسین (ع)

2 دانشگاه صنعتی اصفهان

چکیده

گزارش‌ها و آمارهای بین‌المللی نشان می‌دهند که در سال­های اخیر، شبکه‌های برق یکی از اهداف اصلی گروه‌های تروریستی قرار گرفته‌اند. شبکه‌‌ برق، در هر کشوری نقشی اساسی را ایفا می‌‌کند و حیات همه زیرساخت‌‌های یک کشور وابسته به عملکرد صحیح این شبکه‌‌ است. بین اقتصاد و صنعت برق هر کشور، ارتباط تنگاتنگی وجود دارد و در صورت مختل­شدن عملکرد شبکه برق، می‌‌توان ضرر‌‌های اقتصادی عظیمی را برای آن کشور متصور شد. بنابراین، تعداد بسیاری از محققان به دنبال پاسخ به این سؤال که برای کاهش پیامدهای ناشی از حملات عامدانه، چگونه باید منابعِ دفاعی در دسترس را به‌صورت بهینه تخصیص‌دهی کرد، به ارائه مدل‌های متعددی پرداخته‌اند. آگاهی برنامه‌ریز شبکه‌ برق از این روش‌ها، می‌تواند برای انتخاب بهترین راهکار دفاعی برای دفاع از شبکه برق در مقابل حملات عامدانه، مفید باشد. تا به حال هیچ مقاله‌ مروری، برای گردآوری این روش‌ها نوشته نشده است. از این رو، در این مقاله سعی شده است که مروری کامل بر مهم‌ترینِ این مدل‌ها صورت گیرد و یک دسته­بندی مناسب از این مدل­ها ارائه شود. در ادامه، مدل­های مربوط به هر دسته، با تمرکز بر نقاط ضعف و قوت آن­ها، مورد بررسی و تحلیل قرار گرفته­اند.

کلیدواژه‌ها


عنوان مقاله [English]

A Review on Optimal Resource Allocation Methodsto Defend the Power Grids against Intentional Attacks

نویسندگان [English]

  • R. Ghaffarpour 1
  • S. Sayyadipour 2
1 imam hossein university
2 isfahan university
چکیده [English]

International reports and statistics reveal that power grids have been one of the main targets for terrorist groups in recent years. Power grid has a vital role in all countries and, the functionality of all infrastructures depends on the performance of this network. In a country, the economy and the electric industry are highly interdependent and, consequently, the malfunction of the power grid results in a huge economic loss for that country. As a result, various models have been proposed by researchers, in an attempt to answer the question that how the available defensive resources should be optimally allocated to alleviate the negative consequences of intentional attacks. Power grid planner’s knowledge of these models can be helpful in selecting the best defense strategy for defending the power grid against intentional attacks. To the best of our knowledge, no review has been conducted on the proposed methods so far. Hence, in this paper, a comprehensive review of the most important models is conducted and a proper classification is provided. Then, the models belonging to each class are analyzed in detail, focusing on their flaws and merits.

کلیدواژه‌ها [English]

  • Intentional Attacks
  • Power Grid Vulnerability Analysis
  • Optimal Resource Allocation
  • Optimal Defense Strategy Selection
  1. N. Alguacil, A. Delgadillo, and J. M. Arroyo, “A Trilevel Programming Approach for Electric Grid Defense Planning,” Comput. Oper. Res., vol. 41, pp. 282–290, 2014.##
  2. G. Brown, M. Carlyle, J. Salmerón, and K. Wood, “Defending Critical Infrastructure,” Interfaces, vol. 36, pp. 530–544, 2006.##
  3. G. Chen, Z. Y. Dong, D. J. Hill, Y. S. Xue, “Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks,” IEEE Trans. Power Syst., vol. 26, pp. 1000–1009, 2011.##
  4. A. J. Holmgren, E. Jenelius, and J. Westin, “Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks,” IEEE Trans. Power Syst., vol. 22, pp. 76–84, 2007.##
  5. M. Carrión, J. M. Arroyo, and N. Alguacil, “Vulnerability-Constrained Transmission Expansion Planning: A Stochastic Programming Approach,” IEEE Trans. Power Syst., vol. 22, pp. 1436–1445, 2007.##
  6. M. P. Scaparra and R. L. Church, “A Bilevel       Mixed-Integer Program for Critical Infrastructure Protection Planning,” Comput. Oper. Res., vol. 35, pp. 1905–1923, 2008.##
  7. R. Powell, “Defending Against Strategic Terrorists over the Long Run: a Basic Approach to Resource Allocation,” Working Paper, University of California, Travers Department of Political Science, Berkeley, 2006.##
  8. G. Levitin, “Optimal Defense Strategy Against Intentional Attacks,” IEEE Trans. Reliab., vol. 56, pp. 148–157, 2007.##
  9. V. Bier, “Game-Theoretic and Reliability Methods in Counterterrorism and Security,” Statistical Methods in Counterterrorism, pp. 23–40, 2006.##
  10. E. Kardes and R. Hall, “Survey of Literature on Strategic Decision Making in the Presence of Adversaries,” Nonpublished Research Reports, vol. 115, 2005.##
  11. N. Romero, N. Xu, L. K. Nozick, I. Dobson, and D. Jones, “Investment Planning for Electric Power Systems under Terrorist Threat,” IEEE Trans. Power Syst., vol. 27, pp. 108–116, 2012.##
  12. R. W. Rose, “Defending Electrical Power Grids,” M.Sc. Thesis, Naval Postgraduate School, Monterey, CA, 2007.##
  13. D. L. Alderson, G. G. Brown, W. M. Carlyle, and R. K. Wood, “Solving Defender-Attacker-Defender Models for Infrastructure Defense,” In Informs Computing Society Conference, pp. 28-49, 2011.##
  14. W. Yuan, L. Zhao, and B. Zeng, “Optimal Power Grid Protection through a Defender–Attacker–Defender Model,” Reliab. Eng. Syst. Saf., vol. 121, pp. 83–89, 2014.##
  15. Y. Yao, T. Edmunds, D. Papageorgiou, and R. Alvarez, “Trilevel Optimization In Power Network Defense,” IEEE Trans. Syst. Man, Cybern, vol. 37, pp. 712–718, 2007.##
  16. J. Salmeron, K. Wood, and R. Baldick, “Analysis of Electric Grid Security under Terrorist Threat,” IEEE Trans. Power Syst., vol. 19, pp. 905–912, 2004.##
  17. A. L. Motto, J. M. Arroyo, and F. D. Galiana, “A Mixed-Integer LP Procedure for the Analysis of Electric Grid Security under Disruptive Threat,” IEEE Trans. Power Syst., vol. 20, pp. 1357–1365, 2005.##
  18. J. M. Arroyo and F. D. Galiana, “On the Solution of the Bilevel Programming Formulation of the Terrorist Threat Problem,” IEEE Trans. Power Syst., vol. 20, pp. 789–797, 2005.##
  19. M. Chertoff, “Remarks for Secretary Michael Chertoff, US Department of Homeland Security, George Washington University Homeland Security Policy Institute,” Georg. Washingt. Univ. Washington, DC, 2005.##
  20. M. G. F. Bell, “The Use Of Game Theory To Measure The Vulnerability Of Stochastic Networks,” IEEE Trans. Reliab, vol. 52, pp. 63–68, 2003.##
  21. H. H. Willis, A. R. Morral, T. K. Kelly, and J. J. Medby, “Estimating Terrorism Risk,” Rand Corporation, 2006.##
  22. N. J. Rabkin, “Strengthening the Use of Risk Management Principles in Homeland Security Risk Management,” U. S. Government Accountability Office, 2008.##
  23. DHS, “The 2009 National Infrastructure Protection Plan,” Department of Homeland Security, 2009.##
  24. G. W. Bush, “The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets,” Nonpublished Research Reports, 2003.##
  25. R. E. Alvarez, “Interdicting electrical power grids,” M. Sc. Thesis, Naval Postgraduate School, Monterey, CA, 2004.##
  26. J. M. Arroyo, “Bilevel Programming Applied To Power System Vulnerability Analysis under Multiple Contingencies,” IET Gener. Transm. Distrib., vol. 4, pp. 178–190, 2010.##
  27. E. Israeli and R. K. Wood, “Shortest‐Path Network Interdiction,” Networks, vol. 40, pp. 97–111, 2002.##
  28. K. J. Cormican, D. P. Morton, and R. K. Wood, “Stochastic Network Interdiction,” Oper. Res., 46, pp. 184–197, 1998.##
  29. D. P. Morton, F. Pan, and K. J. Saeger, “Models for Nuclear Smuggling Interdiction,” IIE Trans., vol. 39, pp. 3–14, 2007.##

 26.     A. J. Wood and B. F. Wollenberg, “Power Generation, Operation, and Control,” John Wiley & Sons, 2012.##