Theoretical framework about optimal model of operation after intentional attacks considering transmission system switching

  • Juan Toctaquiza Universidad Politécnica Salesiana
  • Diego Carrión Universidad Politécnica Salesiana
Keywords: Power System Vulnerability, Transmission Line Switching, Optimization, Electrical Network Security, Intentional Attack, Optimal Transmission Switching, Contingency Analysis


This research focuses on optimal post-intentional attack operation considering switching transmission systems. The applicable models for this process focus on the application of bi-level optimization methods that are capable of analyzing two possible scenarios in order to reduce the time of loss or departure from the demand of the electricity system. The main objective of this work is related to maintaining the minimum requirements that allow the operation of the Electric Power System, for this the approach of equations will be carried out that allows establishing the mathematical models in the event of intentional attacks, it must maintain the operation of the Electric System and react in the event of contingencies through the Optimal Switching of Transmission Lines.


Download data is not yet available.


[1] G. Huang, J. Wang, C. Chen, J. Qi, and C. Guo, “Integration of Preventive and Emergency Responses for Power Grid Resilience Enhancement,” IEEE Trans. Power Syst., vol. 32, no. 6, pp. 4451–4463, Nov. 2017.

[2] T. Nguyen, S. Wang, M. Alhazmi, M. Nazemi, A. Estebsari, and P. Dehghanian, “Electric Power Grid Resilience to Cyber Adversaries: State of the Art,” IEEE Access, vol. 8, pp. 87592–87608, 2020.

[3] A. Bosisio et al., “A GIS-based approach for high-level distribution networks expansion planning in normal and contingency operation considering reliability,” Electr. Power Syst. Res., vol. 190, no. April 2020, p. 106684, Jan. 2021.

[4] P. Dehghanian, Y. Wang, G. Gurrala, E. Moreno-Centeno, and M. Kezunovic, “Flexible implementation of power system corrective topology control,” Electr. Power Syst. Res., vol. 128, pp. 79–89, Nov. 2015.

[5] D. Carrión, J. Palacios, M. Espinel, and J. W. González, “Transmission Expansion Planning Considering Grid Topology Changes and N-1 Contingencies Criteria,” 2021, pp. 266–279.

[6] S. Dehghan and N. Amjady, “Robust Transmission and Energy Storage Expansion Planning in Wind Farm-Integrated Power Systems Considering Transmission Switching,” IEEE Trans. Sustain. Energy, vol. 7, no. 2, pp. 765–774, Apr. 2016.

[7] S. Pinzón, D. Carrión, and E. Inga, “Optimal Transmission Switching Considering N-1 Contingencies on Power Transmission Lines,” IEEE Lat. Am. Trans., vol. 19, no. 4, pp. 534–541, 2021.

[8] X. Wu, Z. Zhou, G. Liu, W. Qi, and Z. Xie, “Preventive Security-Constrained Optimal Power Flow Considering UPFC Control Modes,” Energies, vol. 10, no. 8, p. 1199, Aug. 2017.

[9] M. Khanabadi, H. Ghasemi, and M. Doostizadeh, “Optimal Transmission Switching Considering Voltage Security and N-1 Contingency Analysis,” IEEE Trans. Power Syst., vol. 28, no. 1, pp. 542–550, Feb. 2013.

[10] H. Zhang, G. Li, and H. Yuan, “Collaborative Optimization of Post-Disaster Damage Repair and Power System Operation,” Energies, vol. 11, no. 10, p. 2611, Sep. 2018.

[11] E. B. Fisher, R. P. O’Neill, and M. C. Ferris, “Optimal Transmission Switching,” IEEE Trans. Power Syst., vol. 23, no. 3, pp. 1346–1355, Aug. 2008.

[12] D. Carrion and J. W. Gonzalez, “Optimal PMU Location in Electrical Power Systems Under N-1 Contingency,” in 2018 International Conference on Information Systems and Computer Science (INCISCOS), 2018, vol. 2018-Decem, no. 1, pp. 165–170.

[13] X. Xu, Y. Cao, H. Zhang, S. Ma, Y. Song, and D. Chen, “A Multi-Objective Optimization Approach for Corrective Switching of Transmission Systems in Emergency Scenarios,” Energies, vol. 10, no. 8, p. 1204, Aug. 2017.

[14] J. Salmeron, K. Wood, and R. Baldick, “Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids,” IEEE Trans. Power Syst., vol. 24, no. 1, pp. 96–104, Feb. 2009.

[15] J. Lin et al., “Co-optimization of unit commitment and transmission switching with short-circuit current constraints,” Int. J. Electr. Power Energy Syst., vol. 110, no. February, pp. 309–317, Sep. 2019.

[16] J. M. Arroyo and F. D. Galiana, “On the Solution of the Bilevel Programming Formulation of the Terrorist Threat Problem,” IEEE Trans. Power Syst., vol. 20, no. 2, pp. 789–797, May 2005.

[17] S. Basumallik, S. Eftekharnejad, and B. K. Johnson, “The impact of false data injection attacks against remedial action schemes,” Int. J. Electr. Power Energy Syst., vol. 123, no. April, p. 106225, Dec. 2020.

[18] Yilin Mo et al., “Cyber–Physical Security of a Smart Grid Infrastructure,” Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.

[19] C. C. Liu, J. Jung, G. T. Heydt, V. Vittal, and A. G. Phadke, “The strategic power infrastructure defense (SPID) system. A conceptual design,” IEEE Control Syst., vol. 20, no. 4, pp. 40–52, Aug. 2000.

[20] C. M. Rocco, J. E. Ramirez-Marquez, D. E. Salazar, and C. Yajure, “Assessing the Vulnerability of a Power System Through a Multiple Objective Contingency Screening Approach,” IEEE Trans. Reliab., vol. 60, no. 2, pp. 394–403, Jun. 2011.

[21] J. (Naval P. S. Salmeron, K. (Naval P. S. Wood, and R. (University of T. at A. Baldick, “Optimizing Electric Grid Design Under Asymmetric Threat (II),” Security, no. December, p. 79, 2006.

[22] J. Salmeron, K. Wood, and R. Baldick, “Analysis of Electric Grid Security Under Terrorist Threat,” IEEE Trans. Power Syst., vol. 19, no. 2, pp. 905–912, May 2004.

[23] R. Alvarez, J. (Naval P. S. Salmeron, and K. (Naval P. S. Wood, “Interdicting Electrical Power Grids,” Naval Postgraduate School, 2004.

[24] P. T. C., K. G. Boroojeni, M. Hadi Amini, N. R. Sunitha, and S. S. Iyengar, “Key pre-distribution scheme with join leave support for SCADA systems,” Int. J. Crit. Infrastruct. Prot., vol. 24, pp. 111–125, Mar. 2019.

[25] A. Delgadillo, J. M. Arroyo, and N. Alguacil, “Analysis of Electric Grid Interdiction With Line Switching,” IEEE Trans. Power Syst., vol. 25, no. 2, pp. 633–641, May 2010.

[26] J. Yan, H. He, X. Zhong, and Y. Tang, “Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 1, pp. 200–210, Jan. 2017.

[27] M. Sahraei-Ardakani, X. Li, P. Balasubramanian, K. W. Hedman, and M. Abdi-Khorsand, “Real-Time Contingency Analysis With Transmission Switching on Real Power System Data,” IEEE Trans. Power Syst., vol. 31, no. 3, pp. 2501–2502, May 2016.

[28] J. Aghaei, A. Nikoobakht, M. Mardaneh, M. Shafie-khah, and J. P. S. Catalão, “Transmission switching, demand response and energy storage systems in an innovative integrated scheme for managing the uncertainty of wind power generation,” Int. J. Electr. Power Energy Syst., vol. 98, no. August 2017, pp. 72–84, Jun. 2018.

[29] M. Jabarnejad, “Approximate optimal transmission switching,” Electr. Power Syst. Res., vol. 161, pp. 1–7, Aug. 2018.

[30] Q. Wang, J. Watson, and Y. Guan, “Two-stage robust optimization for N-k contingency-constrained unit commitment,” IEEE Trans. Power Syst., vol. 28, no. 3, pp. 2366–2375, Aug. 2013.
How to Cite
Toctaquiza, J., & Carrión, D. (2021). Theoretical framework about optimal model of operation after intentional attacks considering transmission system switching. ITECKNE, 18(2), 121-131.
Research and Innovation Articles