Attack Vulnerability of Power Systems Under an Equal Load Redistribution Model - 2018


This Project studies the vulnerability of flow networks against adversarial attacks. In specific, take into account a power system (or, any system carrying a physical flow) consisting of N transmission lines with initial loads L one, . . . , L N and capacities C 1 , . . . , C N , respectively; the capability C defines the most flow allowed on line i. Beneath an equal load redistribution model, where load of failed lines is redistributed equally among all remaining lines, we tend to study the optimization problem of finding the simplest k lines to attack so as to reduce the number of alive lines at the steady-state (i.e., when cascades stop). This is completed to reveal the worst-case attack vulnerability of the system still on reveal its most vulnerable lines. We have a tendency to derive optimal attack ways in several special cases of load-capability distributions that are practically relevant. We tend to then consider a changed optimization problem where the adversary is additionally constrained by the whole load (additionally to the number) of the initial attack set, and prove that this downside is NP-laborious. Finally, we have a tendency to develop heuristic algorithms for selecting the attack set for each the initial and changed problems. Through intensive simulations, we tend to show that these heuristics outperform benchmark algorithms underneath a wide selection of settings.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Attack Detection in Sensor Network Target Localization Systems With Quantized Data - 2018ABSTRACT:We have a tendency to think about a sensor network focused heading in the right direction localization, where sensors
PROJECT TITLE : Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property - 2017 ABSTRACT: The prosperity of on-line rating system makes it a popular place for malicious
PROJECT TITLE :Swift Jamming Attack on Frequency Offset Estimation: The Achilles’ Heel of OFDM SystemsABSTRACT:Frequency offset (FO) refers to the distinction within the operating frequencies of two radio oscillators. Failure
PROJECT TITLE :Supervised approach for detecting average over popular items attack in collaborative recommender systemsABSTRACT:Recent research has shown the numerous vulnerabilities of collaborative recommender systems in the
PROJECT TITLE :Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping AttackABSTRACT:This paper studies the intercept behavior of an industrial wireless sensor network (WSN) consisting

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry