A graph-theoretical characterization of power network vulnerabilities
This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph with the power plant. We provide a necess...
Saved in:
| Published in | Proceedings of the 2011 American Control Conference pp. 3918 - 3923 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.06.2011
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1457700808 9781457700804 |
| ISSN | 0743-1619 |
| DOI | 10.1109/ACC.2011.5991344 |
Cover
| Abstract | This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph with the power plant. We provide a necessary and sufficient graph theoretic condition for the existence of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic perspective, we generalize a known result on the structural rank of the transfer matrix of a state space system to take into account a set of algebraic constraints. |
|---|---|
| AbstractList | This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph with the power plant. We provide a necessary and sufficient graph theoretic condition for the existence of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic perspective, we generalize a known result on the structural rank of the transfer matrix of a state space system to take into account a set of algebraic constraints. |
| Author | Pasqualetti, Fabio Bicchi, Antonio Bullo, Francesco |
| Author_xml | – sequence: 1 givenname: Fabio surname: Pasqualetti fullname: Pasqualetti, Fabio email: fabiopas@engineering.ucsb.edu organization: Center for Control, Dynamical Syst. & Comput., Univ. of California at Santa Barbara, Santa Barbara, CA, USA – sequence: 2 givenname: Antonio surname: Bicchi fullname: Bicchi, Antonio email: bicchi@ing.unipi.it organization: Centro I. R. E. Piaggio, Univ. di Pisa, Pisa, Italy – sequence: 3 givenname: Francesco surname: Bullo fullname: Bullo, Francesco email: bullo@engineering.ucsb.edu organization: Center for Control, Dynamical Syst. & Comput., Univ. of California at Santa Barbara, Santa Barbara, CA, USA |
| BookMark | eNotkLFOwzAUAI0oEm3pjsSSH0h5z3HieKyiUpAqscBcvTjPxBCSyDFU8PUMZDrdcsOtxKIfehbiFmGLCOZ-V1VbCYjb3BjMlLoQG6NLVLnWANqUl2I1SwnlQixBqyzFAs21WE3TOwAaU8BS7HfJW6CxTWPLQ-DoLXWJbSmQjRz8L0U_9MngknE4c0h6juchfCTfX13PgWrf-eh5uhFXjrqJNzPX4vVh_1I9psfnw1O1O6YedR5TS5BrW8rGOVnnZQ1oQSpH0KCT7JwzmlRTWKtRImHmMqukoYbrGh04m63F3X_XM_NpDP6Tws9pXpD9AWqHUTY |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/ACC.2011.5991344 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781457700798 1457700816 9781457700811 1457700794 |
| EndPage | 3923 |
| ExternalDocumentID | 5991344 |
| Genre | orig-research |
| GroupedDBID | -~X 23M 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ACGFS ADZIZ AFFNX ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
| ID | FETCH-LOGICAL-i175t-ca057c82dff2b58b01c024fa0d1f2efff97a4d6cc7121a13f3c429adebb1f0fc3 |
| IEDL.DBID | RIE |
| ISBN | 1457700808 9781457700804 |
| ISSN | 0743-1619 |
| IngestDate | Wed Aug 27 03:32:22 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-ca057c82dff2b58b01c024fa0d1f2efff97a4d6cc7121a13f3c429adebb1f0fc3 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_5991344 |
| PublicationCentury | 2000 |
| PublicationDate | 2011-June |
| PublicationDateYYYYMMDD | 2011-06-01 |
| PublicationDate_xml | – month: 06 year: 2011 text: 2011-June |
| PublicationDecade | 2010 |
| PublicationTitle | Proceedings of the 2011 American Control Conference |
| PublicationTitleAbbrev | ACC |
| PublicationYear | 2011 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0019960 ssj0000608363 |
| Score | 1.7367654 |
| Snippet | This work is concerned with the security of a power network against components failure and external attacks. We model a power plant as a linear continuous-time... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 3918 |
| SubjectTerms | Equations Generators Joining processes Load modeling Mathematical model Power generation Power system dynamics |
| Title | A graph-theoretical characterization of power network vulnerabilities |
| URI | https://ieeexplore.ieee.org/document/5991344 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nWDh0SLe8sCI2zh14mSsqlYVUhEDlbpVjuOTECitUMLAr-ecFwUxsCUZktg55b57fN8B3AWoPE12wZH8K5fCRjwxKLlOgyiJQ8LEqeMOLx_DxUo-rIN1B-5bLoy1tmw-s0N3WNby060pXKpsFMSuTiy70FVRWHG12nyKFzqd5fYv7JprvVaCk6KEktQVKOUgUtRoPdXnsqlfevFoMp1Wwp71w35MXSmdzvwIls3rVr0mr8MiT4bm85eS43_XcwyDb3ofe2od1wl0bHYKh3vKhH2YTVgpZc33iI7MtOLOFXeTbZHt3JQ1llXN5OyjeHMq1mXDLYXgA1jNZ8_TBa8nLvAXghE5N5rgm4n8FNFP6GN5wpAPR-2lAn2LiLHSMg2NUcIXWoxxbMif6dQmiUAPzfgMetk2s-fAKAzRykiM6VaSlqmVsI70SyZDEZjwL6DvNmSzq0Q1NvVeXP59-QoOqmSuS39cQy9_L-wNoYE8uS3N4AtUxq58 |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8JAEJ4gHtSLDzC-3YNHF7pl-zoSAkEF4gESbmS73UmMphBTPPjrnW1LRePBW9tD291OOt88vm8A7jwMHEV2wZH8K5fChDzWKLlKvDCOfMLEieUOjyf-cCYf5968BvcVF8YYkzefmZY9zGv5yVKvbaqs7UW2Tix3YNeTUnoFW6vKqDi-VVqu_sO2vdapRDgpTshpXV4QWJAUbtSeynO5qWA6Ubvb6xXSnuXjfsxdyd3O4BDGmxcuuk1eW-ssbunPX1qO_13RETS_CX7suXJdx1Az6QkcbGkTNqDfZbmYNd-iOjJdyTsX7E22RLayc9ZYWrSTs4_1m9WxzltuKQhvwmzQn_aGvJy5wF8ISGRcKwJwOnQTRDemz-UITV4clZMIdA0iRoGSia91IFyhRAc7mjyaSkwcC3RQd06hni5TcwaMAhEVaIkR3UrSMlUgjKX9ktFQDCbcc2jYDVmsClmNRbkXF39fvoW94XQ8WoweJk-XsF-kdm0y5Arq2fvaXBM2yOKb3CS-AK2jsck |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+2011+American+Control+Conference&rft.atitle=A+graph-theoretical+characterization+of+power+network+vulnerabilities&rft.au=Pasqualetti%2C+Fabio&rft.au=Bicchi%2C+Antonio&rft.au=Bullo%2C+Francesco&rft.date=2011-06-01&rft.pub=IEEE&rft.isbn=9781457700804&rft.issn=0743-1619&rft.spage=3918&rft.epage=3923&rft_id=info:doi/10.1109%2FACC.2011.5991344&rft.externalDocID=5991344 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0743-1619&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0743-1619&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0743-1619&client=summon |