Assessing the Vulnerability of Power Systems Using Multilevel Programming: A Literature Review

Vulnerability studies can identify critical elements in electric power systems in order to take protective measures against possible scenarios that may result in load shedding, which can be caused by natural events or deliberate attacks. This article is a literature review on the latter kind, i.e.,...

Full description

Bibliographic Details
Main Authors: Juan Pablo Hernandez Valencia, Jesus Maria Lopez-Lezama, Bonie Johana Restrepo Cuestas
Format: Article
Language:English
Published: Universidad de Medellín 2021-03-01
Series:Revista Ingenierías Universidad de Medellín
Subjects:
Online Access:https://revistas.udem.edu.co/index.php/ingenierias/article/view/3138
Description
Summary:Vulnerability studies can identify critical elements in electric power systems in order to take protective measures against possible scenarios that may result in load shedding, which can be caused by natural events or deliberate attacks. This article is a literature review on the latter kind, i.e., the interdiction problem, which assumes there is a disruptive agent whose objective is to maximize the damage to the system, while the network operator acts as a defensive agent. The non-simultaneous interaction of these two agents creates a multilevel optimization problem, and the literature has reported several interdiction models and solution methods to address it. The main contribution of this paper is presenting the considerations that should be taken into account to analyze, model, and solve the interdiction problem, including the most common solution techniques, applied methodologies, and future studies. This literature review found that most research in this area is focused on the analysis of transmission systems considering linear approximations of the network, and a few interdiction studies use an AC model of the network or directly treat distribution networks from a multilevel standpoint. Future challenges in this field include modeling and incorporating new defense options for the network operator, such as distributed generation, demand response, and the topological reconfiguration of the system.f the system.
ISSN:1692-3324
2248-4094