A graph-theoretical characterization of power network vulnerabilities

This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph with the power plant. We provide a necess...

Full description

Saved in:
Bibliographic Details
Published inProceedings of the 2011 American Control Conference pp. 3918 - 3923
Main Authors Pasqualetti, Fabio, Bicchi, Antonio, Bullo, Francesco
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2011
Subjects
Online AccessGet full text
ISBN1457700808
9781457700804
ISSN0743-1619
DOI10.1109/ACC.2011.5991344

Cover

Abstract This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph with the power plant. We provide a necessary and sufficient graph theoretic condition for the existence of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic perspective, we generalize a known result on the structural rank of the transfer matrix of a state space system to take into account a set of algebraic constraints.
AbstractList This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph with the power plant. We provide a necessary and sufficient graph theoretic condition for the existence of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic perspective, we generalize a known result on the structural rank of the transfer matrix of a state space system to take into account a set of algebraic constraints.
Author Pasqualetti, Fabio
Bicchi, Antonio
Bullo, Francesco
Author_xml – sequence: 1
  givenname: Fabio
  surname: Pasqualetti
  fullname: Pasqualetti, Fabio
  email: fabiopas@engineering.ucsb.edu
  organization: Center for Control, Dynamical Syst. & Comput., Univ. of California at Santa Barbara, Santa Barbara, CA, USA
– sequence: 2
  givenname: Antonio
  surname: Bicchi
  fullname: Bicchi, Antonio
  email: bicchi@ing.unipi.it
  organization: Centro I. R. E. Piaggio, Univ. di Pisa, Pisa, Italy
– sequence: 3
  givenname: Francesco
  surname: Bullo
  fullname: Bullo, Francesco
  email: bullo@engineering.ucsb.edu
  organization: Center for Control, Dynamical Syst. & Comput., Univ. of California at Santa Barbara, Santa Barbara, CA, USA
BookMark eNotkLFOwzAUAI0oEm3pjsSSH0h5z3HieKyiUpAqscBcvTjPxBCSyDFU8PUMZDrdcsOtxKIfehbiFmGLCOZ-V1VbCYjb3BjMlLoQG6NLVLnWANqUl2I1SwnlQixBqyzFAs21WE3TOwAaU8BS7HfJW6CxTWPLQ-DoLXWJbSmQjRz8L0U_9MngknE4c0h6juchfCTfX13PgWrf-eh5uhFXjrqJNzPX4vVh_1I9psfnw1O1O6YedR5TS5BrW8rGOVnnZQ1oQSpH0KCT7JwzmlRTWKtRImHmMqukoYbrGh04m63F3X_XM_NpDP6Tws9pXpD9AWqHUTY
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ACC.2011.5991344
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9781457700798
1457700816
9781457700811
1457700794
EndPage 3923
ExternalDocumentID 5991344
Genre orig-research
GroupedDBID -~X
23M
29O
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ACGFS
ADZIZ
AFFNX
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
M43
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i175t-ca057c82dff2b58b01c024fa0d1f2efff97a4d6cc7121a13f3c429adebb1f0fc3
IEDL.DBID RIE
ISBN 1457700808
9781457700804
ISSN 0743-1619
IngestDate Wed Aug 27 03:32:22 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-ca057c82dff2b58b01c024fa0d1f2efff97a4d6cc7121a13f3c429adebb1f0fc3
PageCount 6
ParticipantIDs ieee_primary_5991344
PublicationCentury 2000
PublicationDate 2011-June
PublicationDateYYYYMMDD 2011-06-01
PublicationDate_xml – month: 06
  year: 2011
  text: 2011-June
PublicationDecade 2010
PublicationTitle Proceedings of the 2011 American Control Conference
PublicationTitleAbbrev ACC
PublicationYear 2011
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0019960
ssj0000608363
Score 1.7367654
Snippet This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time...
SourceID ieee
SourceType Publisher
StartPage 3918
SubjectTerms Equations
Generators
Joining processes
Load modeling
Mathematical model
Power generation
Power system dynamics
Title A graph-theoretical characterization of power network vulnerabilities
URI https://ieeexplore.ieee.org/document/5991344
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nWDh0SLe8sCI2zh14mSsqlYVUhEDlbpVjuOTECitUMLAr-ecFwUxsCUZktg55b57fN8B3AWoPE12wZH8K5fCRjwxKLlOgyiJQ8LEqeMOLx_DxUo-rIN1B-5bLoy1tmw-s0N3WNby060pXKpsFMSuTiy70FVRWHG12nyKFzqd5fYv7JprvVaCk6KEktQVKOUgUtRoPdXnsqlfevFoMp1Wwp71w35MXSmdzvwIls3rVr0mr8MiT4bm85eS43_XcwyDb3ofe2od1wl0bHYKh3vKhH2YTVgpZc33iI7MtOLOFXeTbZHt3JQ1llXN5OyjeHMq1mXDLYXgA1jNZ8_TBa8nLvAXghE5N5rgm4n8FNFP6GN5wpAPR-2lAn2LiLHSMg2NUcIXWoxxbMif6dQmiUAPzfgMetk2s-fAKAzRykiM6VaSlqmVsI70SyZDEZjwL6DvNmSzq0Q1NvVeXP59-QoOqmSuS39cQy9_L-wNoYE8uS3N4AtUxq58
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHtSLDzC-3YNHF7pl-zoSAkEF4gESbmS73UmMphBTPPjrnW1LRePBW9tD291OOt88vm8A7jwMHEV2wZH8K5fChDzWKLlKvDCOfMLEieUOjyf-cCYf5968BvcVF8YYkzefmZY9zGv5yVKvbaqs7UW2Tix3YNeTUnoFW6vKqDi-VVqu_sO2vdapRDgpTshpXV4QWJAUbtSeynO5qWA6Ubvb6xXSnuXjfsxdyd3O4BDGmxcuuk1eW-ssbunPX1qO_13RETS_CX7suXJdx1Az6QkcbGkTNqDfZbmYNd-iOjJdyTsX7E22RLayc9ZYWrSTs4_1m9WxzltuKQhvwmzQn_aGvJy5wF8ISGRcKwJwOnQTRDemz-UITV4clZMIdA0iRoGSia91IFyhRAc7mjyaSkwcC3RQd06hni5TcwaMAhEVaIkR3UrSMlUgjKX9ktFQDCbcc2jYDVmsClmNRbkXF39fvoW94XQ8WoweJk-XsF-kdm0y5Arq2fvaXBM2yOKb3CS-AK2jsck
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+2011+American+Control+Conference&rft.atitle=A+graph-theoretical+characterization+of+power+network+vulnerabilities&rft.au=Pasqualetti%2C+Fabio&rft.au=Bicchi%2C+Antonio&rft.au=Bullo%2C+Francesco&rft.date=2011-06-01&rft.pub=IEEE&rft.isbn=9781457700804&rft.issn=0743-1619&rft.spage=3918&rft.epage=3923&rft_id=info:doi/10.1109%2FACC.2011.5991344&rft.externalDocID=5991344
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0743-1619&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0743-1619&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0743-1619&client=summon