Preprint
Article

This version is not peer-reviewed.

Assessment of Vulnerabilities and Risks That May Generate Energy Crises – Blackout

Submitted:

04 April 2025

Posted:

09 April 2025

You are already at the latest version

Abstract
A adaptable, resilient, safe and secure power system is essential for ensuring energy and national security, having a direct impact on a state's economy, social stability, and well-being through the following requirements: Ensuring continuity of power supply (a robust power system guarantees uninterrupted access to electricity for citizens, institutions, and industries, reducing the risk of disruptions caused by technical deficiencies, cyberattacks, or geopolitical instability); Energy independence and reduction of external dependence (a state that produces sufficient electricity from its own sources is less vulnerable to international market fluctuations and external pressures, while diversifying energy sources—renewable, nuclear, hydrocarbons—reduces import dependence and economic vulnerability); Security of power infrastructure (protecting electricity networks from physical and cyberattacks is essential for the normal functioning of society, and developing modern infrastructure—smart grids, electricity storage—ensures the resilience of the energy system); Economic stability and national development (an efficient power system supports industry, agriculture, and services, contributing to economic growth, while lower energy costs enhance economic competitiveness and attract investments); Environmental protection and energy transition (adopting renewable sources and clean technologies reduces dependence on fossil fuels and minimizes environmental impact, while increasing energy efficiency and reducing carbon emissions are essential for long-term sustainability); Strategic and geopolitical role (countries with significant energy resources have greater influence on the international stage, and regional energy cooperation can strengthen diplomatic and economic relations). A secure and efficient energy system is the backbone of national security, guaranteeing economic stability, strategic independence, and population protection. Investments in modern infrastructure, clean technologies, and diversification of energy sources are crucial for the energy future of any nation. The authors of this study have identified all elements of instability and insecurity within Romania's Power System, and they assessed the vulnerability Poor management of the transmission operator activity and risk of Natural Disaster, that could generate the Energy Crisis – black-out.
Keywords: 
;  ;  ;  ;  

1. Introduction

A. Essential information regarding National Power System (Figure 1):
Romania is integrated into the European electricity transmission network, part of the European Network of Transmission System Operators for Electricity (ENTSO-E). International interconnections enable energy exchanges, optimisation of energy resources and contribute to system stability in the event of major variations in consumption or production. The structure of the National Power System is the set of interconnected components that ensure the production, transmission, distribution and consumption of electricity. Electricity production in Romania is based on a combination of energy sources, and the energy landscape of the country has evolved over time, based on conventional and renewable energy sources. Romania has a diversified energy infrastructure, with power plants that use several energy sources, including nuclear energy, hydropower, fossil fuel energy (lignite, hard coal, natural gas) and renewable energy (wind, solar, biomass). Electricity transmission is carried out through the National Power Grid, which plays a key role in the transmission of electricity from producers to distributors and is responsible for the safety and reliability of the National Power System. The structure of the power grid includes very and high voltage overhead power lines, power substations and dispatching. The power infrastructure is composed of 81 power substations, of which 1 power substation at 750 kV (working at 400 kV), 38 power substation at 400 kV and 42 power substations at 220 kV. The distribution of electricity is carried out through the Power Distribution Network, which is an essential part of the national power infrastructure, responsible for the distribution of electricity to consumers. This network includes overhead power lines and power substations at 110 kV providing power to both urban and rural areas. [1,2].
B. The importance of the study in the context of ensuring energy security: [3]
The essential purpose of this paper is to identify all the all elements of instability and insecurity to critical infrastructures within The National Power System, by next actions:
  • identifies the possible systemic dysfunctions, deficiencies and non-compliances;
  • identifies the possible vulnerabilities originated from systemic dysfunctions, deficiencies and non-compliances;
  • identifies the possible risks originated from vulnerabilities;
  • identifies the possible threats originated from risks ;
  • identifies the possible hazards orginated from threats;
  • identifies the possible aggressions originated from dangers.
Knowing all the instability and insecurity elements the following actions can be carried out:
  • the assessment of the vulnerabilities;
  • the assessment of the risks;
  • the assessment of the threats;
  • the assessment of the hazards;
  • the assessment of the agressions.
Following the assessment of the vulnerabilities, risks, threats, hazards and aggressions, the following actions can be carried out:
  • assessment of the security state of The National Power System;
  • development of the security strategies of The National Power System.
Types of national security strategies:
a)
The national strategy of security and protection of the critical infrastructures within the National Power System:
  • power plants for producing electricity;
  • power substations for transmission of electricity;
  • overhead power lines for transmission of electricity.
b)
The national strategy of power safety focused on The National Power System:
  • power plants for producing electricity;
  • power substations for transmission of electricity;
  • overhead power lines for transmission of electricity.
Because The National Power System is vulnerable, it can be, at any time, the target of terrorist threats or attacks (bomb or cyber attacks), natural risks (calamities caused by nature) and anthropic risks (caused by man), which could endanger the proper functioning, or in the most unfortunate case, its total outage – black-out, generating a major crisis that could cause extreme damage to the citizen, society and state.
The National Power System is the generator of critical infrastructures (power plants, power substations and overhead power lines), because it ensures the health and safety of the citizens by supplying all of the state systems, the industry and the national economy with electricity and has a substantial contribution to ensuring national security and well-being, as shown in Figure 2. [4].
C. The risk analysis – Quantitative risk matrix on 5 levels: [5]
Defining likelihood and impact levels:
A. Likelihood (L):
  • 1: Very low;
  • 2: Low;
  • 3: Medium;
  • 4: High;
  • 5: Very high.
B. Impact (I):
  • 1: Very low;
  • 2: Low;
  • 3: Medium;
  • 4: High;
  • 5: Very high.
Building the risk matrix:
F R = P I
where:
P = 5 4 3 2 1 T ; I = 1 2 3 4 5 .
Following the calculations, we get:
F R = 5 10 15 20 25 4 8 12 16 20 3 6 9 12 15 2 4 6 8 10 1 2 3 4 5
The classification of the risks:
The risks shall be classified according to the FR value obtained:
  • FR between 1 and 3: Very low risk;
  • FR between 4 and 6: Low risk;
  • FR between 7 and 12: Medium risk;
  • FR between 13 and 16: High risk;
  • FR between 17 and 25: Very high risk.
Example: Suppose we have a risk with:
  • medium likelihood: 3;
  • high impact: 4;
  • FR = 3∙4 = 12;
  • medium risk level: 12.
This matrix model allows for a clear and structured risk assessment, facilitating their identification and effective management.
The residual risk calculation:
Residual risk (RR) is the remaining risk after applying the control factors.
The control factors are used to reduce the risk.
These factors may include preventive, detector, and corrective measures.
Each control factor has an efficiency (E) between 0 and 1, where 1 means maximum efficiency.
R R = F R 1 E ,
Example: Suppose we have a risk with:
  • medium likelihood:3;
  • high impact: 4;
  • control factor with 0.7 efficiency.
Then:
F R = 3 4 = 12 R R = 12 1 0.7 = 3.6
The assessment of the combined risk:
For multiple risks, we evaluate the combined risk (CR) using an aggregation method, such as the weighted amounts of individual risks:
R C = i F R i W i
where:
(FRi) is the risk factor for the risk i;
(Wi) is the weight assigned to risk i.
Note:
To develop previous relationships, a risk factor must be identified.
The identification of risk factors relevant to the specific context (for example, environmental, financial, operational, technological risk, etc.).

2. State of Art—Recent Evolution

Identifying the instability and insecurity elements (dysfunction, deficiences, non-compliances, vulnerabilities, risks, threats, hazards and agression) of a power system is crucial to ensuring energy security, reducing risks and promoting sustainability. Here are some main reasons why this analysis is crucial: Ensuring Energy Security (the vulnerabilities of an power system can lead to power supply disruptions, affecting the economy and quality of life, while identifying weak points allows for the development of resilience strategies), Managing Geopolitical Risks (electricity is often used as a geopolitical tool, and excessive dependence on fossil fuel imports from certain regions can expose states to major risks in the event of international conflicts or economic sanctions), Adapting to Climate Change (climate change affects power infrastructure through extreme weather events, and assessing vulnerabilities enables the development of adaptation solutions and investments in renewable sources), Protection Against Cyber and Physical Attacks (power systems are increasingly digitalized, making them vulnerable to cyberattacks; additionally, physical infrastructure: power stations and high-voltage overhead and underground power lines, can be targeted by terrorist attacks or sabotage), Ensuring Equitable Access to Energy (many regions of the world still lack stable access to electricity, and identifying vulnerabilities helps in developing effective electrification and economic development policies), Stabilizing Energy Markets and Preventing Economic Crises (electricity prices are influenced by the vulnerabilities of power systems, and energy crises can destabilize entire economies, making continuous risk analysis essential), Developing Resilient and Sustainable Energy Systems (identifying vulnerabilities helps build flexible systems based on energy source diversification, energy storage, and the development of smart grids). The analysis of instability and insecurity elements within an power system is essential for ensuring energy security, economic stability, and environmental protection. It allows for the identification of risks, threats, hazards, and aggressions that may affect energy supply and provides solutions to mitigate their impact. [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31]
Worldwide research on the insecurity and instability of power systems, as well as the analysis and identification of vulnerabilities, risks, dangers and aggressions on them, are summarized:
Preprints 154873 i001
Preprints 154873 i002

3. Identification and Definition of the Instability and Insecurity Elements

3.1. Identification

The following instability and insecurity elements are identified for critical infrastructures within The National Power System, through The Power Transmission Grid, as shown in Figure 3: [29]
a)
Systemic elements:
  • dysfunctions;
  • deficiencies;
  • non-compliances.
b)
Vulnerabilities
c)
Risks;
d)
Threats;
e)
Hazards;
f)
Agressions.

3.2. Definition

A. Systemic elements
a) Dysfunctions: The dysfunctions are those actions manifested by failures and/or disturbances of the functions of a system, with the effect of reducing, integrating or adapting of critical infrastructure, and the unidentification, superficial treatment or poor management of the dysfunctions automatically generates vulnerabilities, which can affect the smooth running of the critical infrastructure.
b) Deficiencies: The deficiencies represents the lack of physical attributes manifested by defects or gaps and are characterized by deficiency, and a critical infrastructure with deficiencies cannot operate at its normal parameters and urgent re-commissioning or resilience measures must be taken.
c) Non-compliances: The non-compliances represents the failure to meet the requirements of a critical infrastructure, manifested by the deviation of some characteristics from the requirements specified in the security plan or operating manual, and a critical infrastructure with non- compliances cannot operate at its normal parameters and urgent measures must be taken to eliminate non- compliances.
B. Vulnerabilities
The vulnerabilities generated by systemic dysfunctions, deficiencies or non-compliances are factual states, processes and phenomena that diminish the responsiveness of critical infrastructures to potential risks or threats or that favor their emergence and development, with consequences in terms of functionality and utility. Non-knowledge, non-management or poor and faulty management of vulnerabilities may result in risk factors, threats, dangers or aggression towards national objectives, values, interests and needs subsumed to critical infrastructures.
C. Risks
The risks generated by certain vulnerabilities, designate situations, circumstances, elements or internal or external conjuctions, sometimes doubled and operative, which determine or favor the materialization of a threat to critical infrastructure, generating insecurity effects.
D. Threats
The threats generated by risk factors are capacities, strategies, intentions, plans that potentiate a danger to critical infrastructures, materialized by attitudes, gestures, acts, facts that create states of imbalance or instability and generate states of hazard, with impact on security.
E. Hazards
The hazards arising from certain threats are situations, events that can endanger or threaten the existence or integrity of critical infrastructures.
F. Agressions
The aggressions arising from certain danger condtions are attacks, including armed attacks, which jeopardize the existence, balance or integrity of critical infrastructures.

4. Types of the Instability and Insecurity Elements from Romanian Power System

A. Types of systemic elements
a) Dysfunctions: dysfunctions identified within The National Power System, as shown in Table 1: [1,2,3,4].
b) Deficiencies: deficiencies identified within The National Power System, as shown in Table 2: [1,2,3,4].
c) Non-compliances: non-compliances identified within The National Power System, as shown in Table 3: [1,2,3,4].
B. Types of vulnerabilities
The vulnerabilities identified caused by systemic elements (dysfunctions, deficiences and non-compliances) within The National Power System are the following, as shown in Table 4: [1,2,3,4].
C. Types of risks
The risks identified caused by vulnerabilities within The National Power System are the following, as shown in Table 5: [1,2,3,4].
D. Types of threats
Identified threats caused by risks within The National Power System are the following, as shown in Table 6: [1,2,3,4].
Other identified threats naturally caused with a crisis or collapse effect on The National Power System, as shown in Table 7: [1,2,3,4].
E. Types of hazards
Identified hazards caused by threats within The National Power System are the following, as shown in Table 8: [1,2,3,4].
Other identified hazards naturally caused with a crisis or collapse effect on The National Power System, as shown in Table 9: [1,2,3,4].
F. Types of agression
Identified aggression caused by dangers within The National Power System are the following, as shown in Table 10: [1,2,3,4].
Other identified aggressions naturally caused with a crisis or collapse effect on The National Power System, as shown in Table 11: [1,2,3,4].

5. Propagation of the Instability and Insecurity Elements

Figure 4 shows the scheme of propagation of system, instability and insecurity elements, and figure 5 shows the sequence (phases) of propagation. [1,2,3,4].
Phase 1: The identification and analysis of the systemic elements:
  • dysfunctions;
  • deficiencies;
  • non-compliances;
Phase 2: The identification and assessment of vulnerabilities generated by systemic elements (dysfunctions, deficiencies and non-compliances);
Phase 3: The identification and assessment of risks generated by the identified vulnerabilities;
Phase 4: The dentification and assessment of threats generated by the identified risks;
Phase 5: The identification and assessment of hazards generated by the identified threats;
Phase 6: The identification and assessment of the aggressions generated by the identified dangers;
Phase 7: The assessment of the security state of The National Power System;
Phase 8: The development of The National Power System security strategies.

6. Prioritizing of the Instability and Insecurity Elements from Romanian Power System

6.1. Vulnerabilities

A. Estimating the Gravity: in this stage, the vulnerability gravity will be estimated:
Preprints 154873 i020
B. Estimating the Impact: in this stage, the vulnerability impact will be estimated:
Preprints 154873 i021
C. Scenario type: after estimating the vulnerability gravity and impact, the type of scenario will be decided, according with Table 12:
  • 1. The worst;
  • 2. Plausible the worst;
  • 3. Moderate.
Preprints 154873 i022
Table 12. Scenario type.
Table 12. Scenario type.
Preprints 154873 i023
Preprints 154873 i024

6.2. Risks

A. Estimating the Likelihood: in this stage, the risk likelihood will be estimated:
Preprints 154873 i025
B. Estimating the Gravity: in this stage, the risk gravity will be estimated:
Preprints 154873 i026
Preprints 154873 i027
C. Scenario type: after estimating the likelihood and gravity, the type of scenario will be decided, according with Table 13:
  • 1. The worst;
  • 2. Plausible the worst;
  • 3. Moderate.
Preprints 154873 i028
Table 13. Scenario type.
Table 13. Scenario type.
Preprints 154873 i029
Preprints 154873 i030
Table 14. Scenario type.
Table 14. Scenario type.
Preprints 154873 i031

6.3. Threats

A. Estimating the Intention: in this stage, the threats intention will be estimated:
Preprints 154873 i032
B. Estimating the Capability: in this stage, the threats capability will be estimated:
Preprints 154873 i033
Preprints 154873 i034
C. Scenario type: after estimating the intention and capability, the type of scenario will be decided, according with Table 15 and Table 16:
  • 1. The worst;
  • 2. Plausible the worst;
  • 3. Moderate.
Preprints 154873 i035
Table 15. Scenario type.
Table 15. Scenario type.
Preprints 154873 i036
Preprints 154873 i037
Table 16. Scenario type.
Table 16. Scenario type.
Preprints 154873 i038

6.4. Hazards

A. Estimating the Likelihood: in this stage, the danger likelihood will be estimated:
Preprints 154873 i039
B. Estimating the Gravity: in this stage, the danger gravity will be estimated:
Preprints 154873 i040
C. Scenario type: after estimating the likelihood and gravity, the type of scenario will be decided, according with Table 17 and Table 18:
  • 1. The worst;
  • 2. Plausible the worst;
  • 3. Moderate.

6.5. Agression

A. Estimating the Impact: in this stage, the agression impact will be estimated:
Preprints 154873 i044
Preprints 154873 i045
B. Scenario type: after estimating the agression impact, the type of scenario will be decided, according with Table 19 and 20:
  • 1. The worst;
  • 2. Plausible the worst;
  • 3. Moderate.
Preprints 154873 i046
Table 19. Scenario type.
Table 19. Scenario type.
Preprints 154873 i047
Table 20. Scenario type.
Table 20. Scenario type.
Preprints 154873 i048

6.6. Prioritizing Scenarios

A. The identification of the worst scenarios: according with Table 21. [1,2,3,4]
B. Choosing the worst scenarios for the assessment: according with Table 22. [1,2,3,4]

7. Assessment of Vulnerability and Risk Identifies from National Power System

7.1. Vulnerability: Poor Management of the Transmission Operator Activity (Exploitation, Maintenance and Development) of the Power Transmission Grid Installations → Risk of Technical Incident (Isolated/Associated), Technical Disturbance or Damage → Technological Threat → Hazard of Technologically Instability (Incident / Damage) → Black-Out

Table 23. The causal analysis.
Table 23. The causal analysis.
Preprints 154873 i052
Table 24. Causes and effects.
Table 24. Causes and effects.
Preprints 154873 i053
Preprints 154873 i054
A. The gravity analysis
Table 25. The gravitiy analysis.
Table 25. The gravitiy analysis.
Preprints 154873 i055
Preprints 154873 i056
B. The gravity level
Preprints 154873 i057
C. The impact analysis
Table 26. The impact analysis.
Table 26. The impact analysis.
Preprints 154873 i058
D. The impact level
Preprints 154873 i059
Preprints 154873 i060
E. The identification of the involved infrastructures
Table 27. Involved critical equipments.
Table 27. Involved critical equipments.
Preprints 154873 i061
F. The interdepepencies analysis
Table 28. Interdepencies analysis / Critical infrastructures or system.
Table 28. Interdepencies analysis / Critical infrastructures or system.
Preprints 154873 i062
G. The calculation of the vulnerability level
Preprints 154873 i063
Preprints 154873 i064
Preprints 154873 i065
H. Proposed recommendations
Table 29. Proposed recommedations.
Table 29. Proposed recommedations.
Preprints 154873 i066
Table 29. The identified vulnerability after the proposed recommendations.
Table 29. The identified vulnerability after the proposed recommendations.
Preprints 154873 i067
I. The recalculation of the vulnerability level
Preprints 154873 i068
Preprints 154873 i069
A. The causal analysis
Table 30. The causal analysis.
Table 30. The causal analysis.
Preprints 154873 i070
B. Estimating the likelihood
Preprints 154873 i071
C. The gravity analysis
Table 31. The Gravity Analysis.
Table 31. The Gravity Analysis.
Preprints 154873 i072
Table 32. The Gravity and Level Analysis.
Table 32. The Gravity and Level Analysis.
Preprints 154873 i073
Preprints 154873 i074
D. Estimating the gravity
Preprints 154873 i075
E. The calculation of the risk level
Preprints 154873 i076
F. Treating the risk
Treating the risk is made through proposed recommendations that support the reduction of the risk level.
Table 33. Proposed recommendations.
Table 33. Proposed recommendations.
Preprints 154873 i077
G. The recalculation of the risk
Table 34. The identified risk after the proposed recommendations.
Table 34. The identified risk after the proposed recommendations.
Preprints 154873 i078
H. The recalculation of the risk level
Preprints 154873 i079
Preprints 154873 i080

8. Conclusions

Following the analysis of the instability and insecurity elements within the National Power System, the following were identified: 7 dysfunctions, 11 deficiencies, 3 non-compliances, 21 vulnerabilities, 21 risks, 1 risk from outside, 21 threats, 1 threat from outside, 21 hazards, 1 hazard from outside, 4 aggressions and 1 aggression from outside.
Following the prioritization of the identified instability and insecurity elements within the National Power System (7 dysfunctions, 11 deficiencies, 3 non-compliances, 21 vulnerabilities, 21 risks, 21 threats, 1 threat from outside, 21 hazards, 1 hazards from outside, 4 aggressions and 1 aggression from outside), the following types of risk scenarios have been highlighted:
  • Vulnerabilities: 5 the worst scenarios; 8 the plausible the worst; 8 moderate scenarios;
  • Risks: 6 the worst scenarios; 8 the plausible the worst; 8 moderate scenarios;
  • Threats: 6 the worst scenarios; 8 the plausible the worst; 8 moderate scenarios;
  • Dangers: 6 the worst scenarios; 8 the plausible the worst; 8 moderate scenarios;
  • Aggression: 2 the worst scenarios; 2 the plausible the worst; 1 moderate scenarios.
In total is 25 the worst scenarios, 34 plausible the worst and 33 moderate scenarios.
Following the highlighting of the 25 the worst scenarios, the authors propose that only 2 risk scenarios with very high probability and severity, may endanger the malfunctioning of the National Power System (black-out), to be evaluated in this paper:
  • Poor management of the transmission operator activity (exploitation, maintenance and development) of the Power Transmission Grid installations → Risk of technical incident (isolated/associated), technical disturbance or damage → Technological threat → Hazard of technologically instability (incident / damage) → black-out;
  • Risk of natural disaster → Threat of natural disaster → Hazard of natural disaster → Attacks caused by natural disasters (earthquake, landslide, volcano, avalanche, tsunami, solar flare, meteor strike, hurricane, drought, frost, etc.).
After assessment of Vulnerability: Poor management of the transmission operator activity (exploitation, maintenance and development) of the Power Transmission Grid installations → Risk of technical incident (isolated/associated), technical disturbance or damage → Technological threat → Hazard of technologically instability (incident / damage) → black-out, result is next:
  • The calculated vulnerability has a value of 25 (gravity 5 x impact 5), therefore the production of the chosen scenario has a VERY HIGH vulnerability level;
  • After proposed recommendations: The calculated vulnerability has a value of 15 (gravity 5 x impact 5) therefore the production of the chosen scenario has a MEDIUM vulnerability level.
After assessment of the Risk: Natural disaster → Threat of natural disaster → Hazard of natural disaster → Attacks caused by natural disasters (earthquake, landslide, volcano, avalanche, tsunami, solar flare, meteor strike, hurricane, drought, frost, etc.) → black-out, rrsults is next:
  • The calculated risk has a value of 10 (likelihood 5 x gravity 5) therefore the production of the chosen scenario has a MEDIUM vulnerability level;
  • After proposed recommendations: The calculated risk has a value of 6 (likelihood 2 x gravity 3) therefore the production of the chosen scenario has a LOW vulnerability level.

References

  1. Nicolae Daniel Fîță, Mila Ilieva Obretenova, Florin G. Popescu, Romanian Power System – European energy security generator, LAP – Lambert Academic Publishing, ISBN: 978-620-7-46269-8, 2024.
  2. Nicolae Daniel Fîță, Dan Codrut Petrilean, Ioan Lucian Diodiu, Andrei Cristian Rada, Adrian Mihai Schiopu, Florin Muresan-Grecu, Analysis of the causes of power crises and theit impacts on energy security, Proceedings of International Conference on Electrical, Computer ad Energy Technologies – ICECET 2204, July 2024, Sydney, Australia, Publisher IEEE, Date added to IEEE Explore: 08 October 2024, www.icecet.com. [CrossRef]
  3. Nicolae Daniel Fîță, Adina Tătar, Mila Ilieva Obretenova, Security risk assessment of critical energy infrastructures, LAP – Lambert Academic Publishing, ISBN: 978-620-7-45824-0, 2024.
  4. Nicolae Daniel Fîță, Mila Ilieva Obretenova, Adrian Mihai Șchiopu, National Security – Elements regarding the optimisation of Energy Sector, LAP – Lambert Academic Publishing, ISBN: 978-620-7-45693-2, 2024.
  5. ISO 31000:2018 - Risk management — Guidelines.
  6. Kezunovic, M.; Dobson, I.; Dong, Y. Impact of extreme weather on power system blackouts and forced outages: New challenges. In Proceedings of the 7th Balkan Power Conference, Šibenik, Croatia, 10–12 September 2008; pp. 1–5.
  7. Panteli, M.; Mancarella, P. Influence of extreme weather and climate change on the resilience of power systems: Impacts and possible mitigation strategies. Electr. Power Syst. Res. 2015, 127, 259–270.
  8. Li, T.; Luo, B.; Liu, L.; Wu, T. Wind accident analysis of transmission line in China Southern Power Grid’s Coastal Regions. In Proceedings of the 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), Changsha, China, 26–29 November 2015; pp. 1700–1704.
  9. Panteli, M.; Mancarella, P. Modeling and Evaluating the Resilience of Critical Electrical Power Infrastructure to Extreme Weather Events. IEEE Syst. J. 2015, 11, 1733–1742.
  10. Cadini, F.; Agliardi, G.L.; Zio, E. A modeling and simulation framework for the reliability/availability assessment of a power transmission grid subject to cascading failures under extreme weather conditions. Appl. Energy 2017, 185, 267–279.
  11. Liu, Y. Short-term operational reliability evaluation for power systems under extreme weather conditions. In Proceedings of the 2015 IEEE Eindhoven PowerTech, Eindhoven, The Netherlands, 29 June–2 July 2015; pp. 1–5.
  12. Anvari, M.; Lohmann, G.M.; Wächter, M.; Milan, P.; Lorenz, E.; Heinemann, D.; Tabar, M.R.R.; Peinke, J. Short term fluctuations of wind and solar power systems. New J. Phys. 2016, 18, 063027.
  13. Pahwa, S.; Scoglio, C.M.; Scala, A. Abruptness of Cascade Failures in Power Grids. Sci. Rep. 2014, 4, 3694.
  14. Gan, Y.; Hu, Y.; Ruan, J.; Du, Z.; Liu, C.; Du, W. Analysis and Prevention of Main Natural Disasters of 500kV Transmission Lines in Central China Power Grid. Electr. Power Constr. 2012, 6, 37–42.
  15. Kiel, E.S.; Kjølle, G.H. The impact of protection system failures and weather exposure on power system reliability. In Proceedings of the International Conference on Environment and Electrical Engineering and 2019 IEEE Industrial and Commercial Power Systems Europe (EEEIC/I&CPS Europe), Genova, Italy, 10–14 June 2019; pp. 1–6.
  16. Jufri, F.H.; Widiputra, V.; Jung, J. State-of-the-art review on power grid resilience to extreme weather events: Definitions, frameworks, quantitative assessment methodologies, and enhancement strategies. Appl. Energy 2019, 239, 1049–1065.
  17. Matko, M.; Golobič, M.; Kontić, B. Reducing risks to electric power infrastructure due to extreme weather events by means of spatial planning: Case studies from Slovenia. Utilities Policy 2017, 44, 12–24.
  18. Chen, X.; Sun, K.; Cao, Y.; Wang, S. Identification of Vulnerable Lines in Power Grid Based on Complex Network Theory. In Proceedings of the 2007 IEEE Power Engineering Society General Meeting, Tampa, FL, USA, 23 July 2007; pp. 1–6.
  19. Arianos, S.; Bompard, E.; Carbone, A.; Xue, F. Power grid vulnerability: A complex network approach. Chaos: Interdiscip. J. Nonlinear Sci. 2009, 19, 013119.
  20. Pagani, G.A.; Aiello, M. The Power Grid as a complex network: A survey. Phys. A Stat. Mech. Its Appl. 2013, 392, 2688–2700.
  21. Cuadra, L.; Salcedo-Sanz, S.; Del Ser, J.; Jiménez-Fernández, S.; Geem, Z.W.; Cuadra, L.; Salcedo-Sanz, S.; Del Ser, J.; Jiménez-Fernández, S.; Geem, Z.W. A Critical Review of Robustness in Power Grids Using Complex Networks Concepts. Energies 2015, 8, 9211–9265.
  22. Li, Q.; Li, H.Q.; Huang, Z.M.; Li, Y.Q. Power system vulnerability assessment based on transient energy hybrid method. Power Syst. Protect. Control. 2013, 41, 1–6.
  23. Li, X.; Qi, Z. Impact of cascading failure based on line vulnerability index on power grids. Energy Syst. 2021, 1–26.
  24. Abedi, A.; Gaudard, L.; Romerio, F. Review of major approaches to analyze vulnerability in power system. Reliab. Eng. Syst. Saf. 2019, 183, 153–172.
  25. Johansson, J.; Hassel, H.; Zio, E. Reliability and vulnerability analyses of critical infrastructures: Comparing two approaches in the context of power systems. Reliab. Eng. Syst. Saf. 2013, 120, 27–38.
  26. Ouyang, M. Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability. Chaos Interdiscip. J. Nonlinear Sci. 2013, 23, 023114.
  27. Wei, X.; Gao, S.; Huang, T.; Bompard, E.; Pi, R.; Wang, T. Complex Network-Based Cascading Faults Graph for the Analysis of Transmission Network Vulnerability. IEEE Trans. Ind. Inform. 2018, 15, 1265–1276.
  28. Wang, W.; Song, Y.; Li, Y.; Jia, Y. Research on Cascading Failures Model of Power Grid Based on Complex Network. In Proceedings of the 2020 Chinese Control and Decision Conference (CCDC), Hefei, China, 22–24 August 2020; pp. 1367–1372.
  29. Alin E. Cruceru, Florin G. Popescu, Daniel N. Fita, Marius D. Marcu, Razvan C. Olteanu, Adrian M. Schiopu, Gabriela Popescu, Current Approaches in Engineering Research and Technology, Vol. 10, Chapter 4: Exploring the Dimensions of Energy Security in Relation to the National Power Grid, Book Publisher International, India ISBN 978-81-983173-4-6 (Print), ISBN 978-81-983173-0-8 (eBook). [CrossRef]
  30. Moraru, R.I., Păun, A.P., Dura, C.C., Dinulescu, R., Potcovaru, A-M. Analysis of the drivers of Occupational Health and Safety performance disclosures by Romanian companies, Economic Computation and Economic Cybernetics Studies and Research, Issue 3, 2020, pp. 197 – 214. [CrossRef]
  31. Darabont, D.C., Moraru, R.I., Antonov, A.E., Bejinariu, C. (2017), Managing new and emerging risks in the context of ISO 45001 standard, Quality - Access to Success, Volume 18, Supplement 1, pp. 11-14.
Figure 1. National Power System map.
Figure 1. National Power System map.
Preprints 154873 g001
Figure 2. The dependence of state systems, economy and national industry on electricity.
Figure 2. The dependence of state systems, economy and national industry on electricity.
Preprints 154873 g002
Figure 3. The identification of instability and insecurity elements.
Figure 3. The identification of instability and insecurity elements.
Preprints 154873 g003
Figure 4. The scheme of propagation of system, instability and insecurity elements.
Figure 4. The scheme of propagation of system, instability and insecurity elements.
Preprints 154873 g004
Figure 5. The sequence (phases) of propagation of system, instability and insecurity elements.
Figure 5. The sequence (phases) of propagation of system, instability and insecurity elements.
Preprints 154873 g005
Table 1. Dysfunctions identified within The National Power System.
Table 1. Dysfunctions identified within The National Power System.
Preprints 154873 i003
Preprints 154873 i004
Preprints 154873 i005
Table 2. Deficiencies identified within The National Power System.
Table 2. Deficiencies identified within The National Power System.
Preprints 154873 i006
Preprints 154873 i007
Table 3. Non-compliances identified within The National Power System.
Table 3. Non-compliances identified within The National Power System.
Preprints 154873 i008
Table 4. Vulnerabilities identified within The National Power System.
Table 4. Vulnerabilities identified within The National Power System.
Preprints 154873 i009
Preprints 154873 i010
Table 5. Identified risks within The National Power System.
Table 5. Identified risks within The National Power System.
Preprints 154873 i011
Preprints 154873 i012
Table 6. Identified threats within The National Power System.
Table 6. Identified threats within The National Power System.
Preprints 154873 i013
Preprints 154873 i014
Table 7. Identified threats from the outside with effect on The National Power System.
Table 7. Identified threats from the outside with effect on The National Power System.
Preprints 154873 i015
Table 8. Identified dangers within The National Power System.
Table 8. Identified dangers within The National Power System.
Preprints 154873 i016
Table 9. Identified dangers from the outside with effect on The National Power System.
Table 9. Identified dangers from the outside with effect on The National Power System.
Preprints 154873 i017
Table 10. Identified agressions within The National Power System.
Table 10. Identified agressions within The National Power System.
Preprints 154873 i018
Table 11. Other identified aggressions with effect on The National Power System.
Table 11. Other identified aggressions with effect on The National Power System.
Preprints 154873 i019
Table 17. Scenario type.
Table 17. Scenario type.
Preprints 154873 i041
Preprints 154873 i042
Table 18. Scenario type.
Table 18. Scenario type.
Preprints 154873 i043
Table 21. The identification of the worst scenarios.
Table 21. The identification of the worst scenarios.
Preprints 154873 i049
Preprints 154873 i050
Table 22. Choosing the worst scenarios for assessment.
Table 22. Choosing the worst scenarios for assessment.
Preprints 154873 i051
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated