A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status

Vulnerability assessment is one of the effective ways to prevent cascading failures of a distribution network (DN). Considering topological structure and operation status, a comprehensive assessment method based on the technique for order preference by similarity to ideal solution (TOPSIS) is propos...

Full description

Bibliographic Details
Main Authors: Juan Wen, Siyu Lin, Xing Qu, Qiankang Xiao
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10231086/
_version_ 1797688485166972928
author Juan Wen
Siyu Lin
Xing Qu
Qiankang Xiao
author_facet Juan Wen
Siyu Lin
Xing Qu
Qiankang Xiao
author_sort Juan Wen
collection DOAJ
description Vulnerability assessment is one of the effective ways to prevent cascading failures of a distribution network (DN). Considering topological structure and operation status, a comprehensive assessment method based on the technique for order preference by similarity to ideal solution (TOPSIS) is proposed to accurately identify the vulnerable parts of the DN. In the method, the improved structural vulnerability indices based on complex network theory are defined, such as degree and network efficiency. And the electrical betweenness and power flow transfer entropy are established to evaluate the state vulnerability of a DN. Combining the analytic hierarchy process (AHP) and the entropy weight method, a comprehensive weight matrix of each vulnerability index is obtained. Based on the weighted vulnerability indices, the TOPSIS method is proposed to calculate the comprehensive vulnerability of each node and line in the DN. Moreover, the obtained comprehensive vulnerability results are corrected by the grey correlation degree to accurately identify vulnerable parts in the DN. In addition, the system transmission efficiency index is established to describe the degree of system performance degradation of the DN under different attack strategies. The simulation results of IEEE 33-bus test case show that the proposed method can effectively identify vulnerable nodes and lines in the DN.
first_indexed 2024-03-12T01:32:38Z
format Article
id doaj.art-cad14951f8264177a173d17498b6d434
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-12T01:32:38Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-cad14951f8264177a173d17498b6d4342023-09-11T23:01:47ZengIEEEIEEE Access2169-35362023-01-0111943589437010.1109/ACCESS.2023.330918810231086A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation StatusJuan Wen0https://orcid.org/0000-0002-8215-0824Siyu Lin1https://orcid.org/0009-0002-3217-2459Xing Qu2https://orcid.org/0000-0002-1943-0081Qiankang Xiao3https://orcid.org/0009-0002-6489-5993School of Electrical Engineering, University of South China, Hengyang, ChinaSchool of Electrical Engineering, University of South China, Hengyang, ChinaSchool of Electrical Engineering, University of South China, Hengyang, ChinaSchool of Electrical Engineering, University of South China, Hengyang, ChinaVulnerability assessment is one of the effective ways to prevent cascading failures of a distribution network (DN). Considering topological structure and operation status, a comprehensive assessment method based on the technique for order preference by similarity to ideal solution (TOPSIS) is proposed to accurately identify the vulnerable parts of the DN. In the method, the improved structural vulnerability indices based on complex network theory are defined, such as degree and network efficiency. And the electrical betweenness and power flow transfer entropy are established to evaluate the state vulnerability of a DN. Combining the analytic hierarchy process (AHP) and the entropy weight method, a comprehensive weight matrix of each vulnerability index is obtained. Based on the weighted vulnerability indices, the TOPSIS method is proposed to calculate the comprehensive vulnerability of each node and line in the DN. Moreover, the obtained comprehensive vulnerability results are corrected by the grey correlation degree to accurately identify vulnerable parts in the DN. In addition, the system transmission efficiency index is established to describe the degree of system performance degradation of the DN under different attack strategies. The simulation results of IEEE 33-bus test case show that the proposed method can effectively identify vulnerable nodes and lines in the DN.https://ieeexplore.ieee.org/document/10231086/Distribution networkvulnerability assessmentTOPSIS methodcomplex network theoryattack strategy
spellingShingle Juan Wen
Siyu Lin
Xing Qu
Qiankang Xiao
A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status
IEEE Access
Distribution network
vulnerability assessment
TOPSIS method
complex network theory
attack strategy
title A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status
title_full A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status
title_fullStr A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status
title_full_unstemmed A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status
title_short A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status
title_sort topsis based vulnerability assessment method of distribution network considering network topology and operation status
topic Distribution network
vulnerability assessment
TOPSIS method
complex network theory
attack strategy
url https://ieeexplore.ieee.org/document/10231086/
work_keys_str_mv AT juanwen atopsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus
AT siyulin atopsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus
AT xingqu atopsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus
AT qiankangxiao atopsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus
AT juanwen topsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus
AT siyulin topsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus
AT xingqu topsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus
AT qiankangxiao topsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus