Presenting a Game-based Model for Confronting Cyber-physical attacks to Power Grid

Document Type : -

Authors

1 Assistant Professor, Imam Hossein University (AS), Tehran, Iran

2 Associate Professor, Shahid Beheshti University, Tehran, Iran

Abstract

Power grid is one of the most important infrastructure of any society on which other infrastructures depend. Studies show that the false data injection cyberattack can cause transmission lines to overload. Usually, the power grid is capable of responding to the natural overloads of transmission lines, but if a cyberattack is accompanied by a targeted physical attack, the overload of transmission lines can become out of control, and consecutive outages can occur in the power grid’s transmission lines. This situation eventually leads to local or nationwide blackouts of the power grid. To confront the overload of transmission lines, the power grid’s operator removes the overloads by taking corrective measures such as using the upward and downward reserve power as well as load shedding. In this paper, we first show how a simultaneous cyber-physical attack can increase the amount of load shedding. Then a model based on game theory is presented to plan the load dispatch of the grid so that the operator can repel the cyber-physical attack with the lowest possible cost using corrective measures. The proposed model is simulated on a 5-bus test network and the results are analyzed.

Keywords

Main Subjects


Smiley face

  1. [1] Amin, M. “Energy Infrastructure Defense Systems”; Proc. IEEE 2005, 93, 861-876. http://doi.org/1109/JPROC. 2005.847257
  2. [2] Pablo, H.; Ruiz, M. E. “Against All Odds”; IEEE Power Energy Mag. 2011, 9, 59-66. http://doi.org/1109/MPE. 2011.940266
  3. [3] Baozhong, T.; Wang, J.; Li, G. “Operational Risk-Averse Routing Optimization for Cyber-Physical Power Systems”; CSEE Journal of Power and Energy Systems, 2022, 8, 801–811. http://doi.org/17775/CSEEJPES.2021.00370
  4. [4] Liang, G.; Weller, S. R.; Zhao, J.; Luo, F. “The 2015 Ukraine Blackout: Implications for False Data Injection Attacks”; IEEE Trans. Power S 2017, 32, 3317-3318. http://doi.org/10.1109/TPWRS.2016.2631891
  5. [5] Shayan, H.; Amraee, T. “Network Constrainted Unit Commitment under Cyber Attack Driven Overloads”; IEEE Trans. Smart Grid, 2019, 10, 6449–6460. http://doi.org/ 1109/TPWRS.2016.2631891
  6. [6] Li, F.; Yan, X.; Xie, Y. “A Review of Cyber-Attack Methods in Cyber-Physical Power System”; IEEE 8th International Conference on Advanced Power System Automation and protection, 2019. http://doi.org/1109/ APAP47170.2019.9225126
  7. [7] Ranjbar, M. H.; Pirayesh, A. “Optimal Reserve Allocation of Power System in Critical Situation for Preparation against Threats”; Advance Defense Sci. & Technol., 2016, 8, 159–167. http://doi.org/1001.1.26762935.1395.7.2.7.0
  8. [8] Viafora, N.; Delikaraoglou, S.; Pinson, P.; Hug, G. “Dynamic Reserve and Transmission Capacity Allocation in Wind-Dominated Power Systems”; IEEE Trans. Power Syst., 2021, 36, 3017–3028. http://doi.org/1109/TPWRS. 2020.3043225
  9. [9] Washburn, A. “Two-Person Zero-Sum Games”; US Springer, http://doi.org/10.1007/978-1-4614-9050-0
  10. Ranjbar, M. H.; Kheradmandi, M.; Pirayesh, A. “Assigning Operating Reserves in Power Systems under Imminent Intelligent Attack Threat”; IEEE Trans. Power Syst. 2019, 34, 2768–2777. http://doi.org/1109/TPWRS.2019. 2897595
  11. Ganjkhani, M.; Hosseini, M. M.; Parvania, M. “Optimal Defensive Strategy for Power Distribution Systems against Relay Setting Attacks”; IEEE Trans. Power Deliv. 2023, 38, 1499–1509. http://doi.org/1109/TPWRD.2022. 3230946
  12. Yan, B.; Yao, P.; Yang, T.; Zhou, B. “Game-Theoretical Model for Dynamic Defense Resource Allocation in Cyber-Physical Power Systems under Distributed Denial of Service Attacks”; J. Mod. Power Syst. Clean Energy, 2023, 38, 1-10. http://doi.org/35833/MPCE.2022.000524
  13. Yan, K.; Liu, X.; Lu, Y. “A Cyber-Physical Power System Risk Assessment Model against Cyberattacks”; IEEE Syst. J., 2023, 17, 218–228. http://doi.org/1109/JSYST. 2022.3215591
  14. “The US Blackout Timeline”; Power Eng., 2003, 17, 11–1. Chen, G.; Dong, Z. Y.; Hill, D. J.; Xue, Y. S. “Exploring Reliable Strategies for Defending Power Systems against Targeted Attacks”; IEEE Trans. Power Syst., 2011, 26, 76–84. http://doi.org/1109/TPWRS.2010.2078524