{"id":196254,"date":"2024-09-17T09:53:58","date_gmt":"2024-09-17T07:53:58","guid":{"rendered":"https:\/\/www.rse-web.it\/rapporti\/power-system-vulnerability-models-for-natural-and-cyber-threats\/"},"modified":"2024-09-17T09:56:29","modified_gmt":"2024-09-17T07:56:29","slug":"power-system-vulnerability-models-for-natural-and-cyber-threats","status":"publish","type":"rapporti","link":"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/","title":{"rendered":"Power system vulnerability models for natural and cyber threats"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>This report describes accurate models for the vulnerability of overhead lines to the combined effects of strong wind and wet snow, and for the vulnerability of insulators to two important pollution-induced flashover mechanisms. It also proposes a preliminary model to account for the effects of cyber attacks on control, defense, protection, and automation systems in modern power systems.  <\/p>\n","protected":false},"author":93,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[1344,1325,1324,1409,1340,1330,1379],"targets":[1317],"rapporti_tipologie":[762],"class_list":["post-196254","rapporti","type-rapporti","status-publish","hentry","tag-cybersecurity-en","tag-electrical-system","tag-electricity-network-en","tag-isolators","tag-resilience","tag-security-en","tag-technologies-and-components","targets-research","rapporti_tipologie-report-en"],"acf":{"projects":{"ID":191053,"post_author":"464","post_date":"2024-07-10 16:51:45","post_date_gmt":"2024-07-10 14:51:45","post_content":"","post_title":"Models and tools for interventions, including preventive interventions, for defending and improving grid security and resilience","post_excerpt":"Models and tools for interventions, including preventive interventions, for defending and improving grid security and resilience","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"models-and-tools-for-interventions-including-preventive-interventions-for-defending-and-improving-grid-security-and-resilience","to_ping":"","pinged":"","post_modified":"2024-08-09 16:02:23","post_modified_gmt":"2024-08-09 14:02:23","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.rse-web.it\/progetti\/models-and-tools-for-interventions-including-preventive-interventions-for-defending-and-improving-grid-security-and-resilience\/","menu_order":0,"post_type":"progetti","post_mime_type":"","comment_count":"0","filter":"raw"},"order_posts":"","dont_show_search":false,"related_posts":false,"dont_show_hompage":false,"show_on_slider":false,"single_post_data":{"titolo_spot":"","post_content":"<p>Accurately assessing the vulnerability of network components to threats is key for quantifying the resilience of the electricity system in the face of both anthropogenic and natural threats.<\/p>\n<p>This report proposes an advanced model of vulnerability of overhead lines that considers the combined action of strong wind and wet snow, evaluating both the direct actions of threats on the line subcomponents and the indirect actions due to vegetation interfering with the line.<\/p>\n<p>The vulnerability curves generated for some lines of the Italian transmission network provide insights consistent with the operators\u2019 experience. The models can be applied both for long-term analysis (calculation of the return times to failure of the components) and in support of the planning of the operation based on weather forecasts. Furthermore, the benefits brought to the resilience by a change in the maintenance procedures of the cutting strip can be quantified via these analytical vulnerability models.<\/p>\n<p>A vulnerability model of insulators to salt pollution is also described, with reference to two pollution-induced <em>flashover<\/em> mechanisms: the deposition of pollutants in humid conditions and the accumulation of conductive snow on the insulators\u2019 surface. Also in this case, the simulations show the models\u2019 applicability in the operation programming and planning phases. Finally, a methodological approach is proposed to quantify the effects of <em>cyber<\/em> attacks on network defense systems. Starting from the ICT infrastructure of a specific defense system, in the context of the RdS 2.3 project, the conditional \u201cmalfunction\u201d probability of each substation subject to a request for intervention by the defense system, following the <em>cyber<\/em> attack, is evaluated. By exploiting the theory of binary variable copulas, the methodology presented in this report calculates the probabilities of certain combinations of substation malfunctions and, for each combination, evaluates the risk of de-energized load in the face of a severe contingency that triggers the defense system.<\/p>\n<p>Future developments include the development of vulnerability models for flood-induced landslides and heat waves, and a refinement of the model of the effects of <em>cyber<\/em> attacks on power system control, protection, and automation systems.<\/p>\n","link_estreno":false,"scarica_file":[{"download_option":"download","file_name":"Download Report","download":{"ID":166817,"id":166817,"title":"20010905","filename":"20010905.pdf","filesize":3505714,"url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2022\/05\/20010905.pdf","link":"https:\/\/www.rse-web.it\/en\/rapporti\/modelli-di-vulnerabilita-del-sistema-elettrico-per-minacce-naturali-e-cyber\/attachment\/20010905\/","alt":"","author":"93","description":"","caption":"","name":"20010905","status":"inherit","uploaded_to":166816,"date":"2022-05-17 07:10:47","modified":"2022-05-17 07:10:47","menu_order":0,"mime_type":"application\/pdf","type":"application","subtype":"pdf","icon":"https:\/\/www.rse-web.it\/wp-includes\/images\/media\/document.png"}}],"button":{"text":"","link":""},"referente_group":false,"data_emissione":"2020-12-30","autori":"A. Pitto, E. Ciapessoni (RSE S.P.A.)","rapporto":"","rif_rse":"20010905"},"satellite_post_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Power system vulnerability models for natural and cyber threats - RSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Power system vulnerability models for natural and cyber threats - RSE\" \/>\n<meta property=\"og:description\" content=\"This report describes accurate models for the vulnerability of overhead lines to the combined effects of strong wind and wet snow, and for the vulnerability of insulators to two important pollution-induced flashover mechanisms. It also proposes a preliminary model to account for the effects of cyber attacks on control, defense, protection, and automation systems in modern power systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"RSE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-17T07:56:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/\",\"url\":\"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/\",\"name\":\"Power system vulnerability models for natural and cyber threats - RSE\",\"isPartOf\":{\"@id\":\"https:\/\/www.rse-web.it\/#website\"},\"datePublished\":\"2024-09-17T07:53:58+00:00\",\"dateModified\":\"2024-09-17T07:56:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rse-web.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Power system vulnerability models for natural and cyber threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rse-web.it\/#website\",\"url\":\"https:\/\/www.rse-web.it\/\",\"name\":\"RSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.rse-web.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rse-web.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rse-web.it\/#organization\",\"name\":\"RSE\",\"url\":\"https:\/\/www.rse-web.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"contentUrl\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"width\":734,\"height\":164,\"caption\":\"RSE\"},\"image\":{\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Power system vulnerability models for natural and cyber threats - RSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"Power system vulnerability models for natural and cyber threats - RSE","og_description":"This report describes accurate models for the vulnerability of overhead lines to the combined effects of strong wind and wet snow, and for the vulnerability of insulators to two important pollution-induced flashover mechanisms. It also proposes a preliminary model to account for the effects of cyber attacks on control, defense, protection, and automation systems in modern power systems.","og_url":"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/","og_site_name":"RSE","article_modified_time":"2024-09-17T07:56:29+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/","url":"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/","name":"Power system vulnerability models for natural and cyber threats - RSE","isPartOf":{"@id":"https:\/\/www.rse-web.it\/#website"},"datePublished":"2024-09-17T07:53:58+00:00","dateModified":"2024-09-17T07:56:29+00:00","breadcrumb":{"@id":"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rse-web.it\/en\/reports\/power-system-vulnerability-models-for-natural-and-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rse-web.it\/en\/"},{"@type":"ListItem","position":2,"name":"Power system vulnerability models for natural and cyber threats"}]},{"@type":"WebSite","@id":"https:\/\/www.rse-web.it\/#website","url":"https:\/\/www.rse-web.it\/","name":"RSE","description":"","publisher":{"@id":"https:\/\/www.rse-web.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rse-web.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rse-web.it\/#organization","name":"RSE","url":"https:\/\/www.rse-web.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","contentUrl":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","width":734,"height":164,"caption":"RSE"},"image":{"@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/196254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti"}],"about":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/types\/rapporti"}],"author":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/comments?post=196254"}],"version-history":[{"count":2,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/196254\/revisions"}],"predecessor-version":[{"id":196256,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti\/196254\/revisions\/196256"}],"wp:attachment":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/media?parent=196254"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/tags?post=196254"},{"taxonomy":"targets","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/targets?post=196254"},{"taxonomy":"rapporti_tipologie","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/rapporti_tipologie?post=196254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}