-
Operating envelopes for the grid-constrained use of distributed flexibility in balancing markets
Authors:
Abhimanyu Kaushal,
Wicak Ananduta,
Luciana Marques,
Tom Cuypers,
Anibal Sanjab
Abstract:
The increasing share of distributed energy sources enhances the participation potential of distributed flexibility in the provision of system services. However, this participation can endanger the grid-safety of the distribution networks (DNs) from which this flexibility originates. In this paper, the use of operating envelopes (OE) to enable the grid-safe procurement of distributed flexibility in…
▽ More
The increasing share of distributed energy sources enhances the participation potential of distributed flexibility in the provision of system services. However, this participation can endanger the grid-safety of the distribution networks (DNs) from which this flexibility originates. In this paper, the use of operating envelopes (OE) to enable the grid-safe procurement of distributed flexibility in centralized balancing markets is proposed. Two classes of approaches for calculating OEs (one-step and two-step methods) are compared in terms of the level of distribution grid safety they can provide, the impact they can have on the market efficiency, and the volume of discarded flexibility they can yield. A case study considering different system scenarios, based on Monte Carlo simulations, highlights a trade-off between the market efficiency, DN flexibility resource utilization, and the grid safety delivered by the different OE methods. The results showcase that the use of the two-step OE approach results in a more grid-secure albeit less-efficient use of distributed flexibility.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Ensuring Grid-Safe Forwarding of Distributed Flexibility in Sequential DSO-TSO Markets
Authors:
Wicak Ananduta,
Anibal Sanjab,
Luciana Marques
Abstract:
This paper investigates sequential flexibility markets consisting of a first market layer for distribution system operators (DSOs) to procure local flexibility to resolve their own needs (e.g., congestion management) followed by a second layer, in which the transmission system operator (TSO) procures remaining flexibility forwarded from the distribution system layer as well as flexibility from its…
▽ More
This paper investigates sequential flexibility markets consisting of a first market layer for distribution system operators (DSOs) to procure local flexibility to resolve their own needs (e.g., congestion management) followed by a second layer, in which the transmission system operator (TSO) procures remaining flexibility forwarded from the distribution system layer as well as flexibility from its own system for providing system services. As the TSO does not necessarily have full knowledge of the distribution grid constraints, this bid forwarding can cause an infeasibility problem for distribution systems, i.e., cleared distribution-level bids in the TSO layer might not satisfy local network constraints. To address this challenge, we introduce and examine three methods aiming to enable the grid-safe use of distribution-located resources in markets for system services, namely: a corrective three-layer market scheme, a bid prequalification/filtering method, and a bid aggregation method. Technically, we provide conditions under which these methods can produce a grid-safe use of distributed flexibility. We also characterize the efficiency of the market outcome under these methods. Finally, we carry out a representative case study to evaluate the performances of the three methods, focusing on economic efficiency, grid-safety, and computational load.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
TSO-DSOs Stable Cost Allocation for the Joint Procurement of Flexibility: A Cooperative Game Approach
Authors:
Anibal Sanjab,
Hélène Le Cadre,
Yuting Mou
Abstract:
In this paper, a transmission-distribution systems flexibility market is introduced, in which system operators (SOs) jointly procure flexibility from different systems to meet their needs (balancing and congestion management) using a common market. This common market is, then, formulated as a cooperative game aiming at identifying a stable and efficient split of costs of the jointly procured flexi…
▽ More
In this paper, a transmission-distribution systems flexibility market is introduced, in which system operators (SOs) jointly procure flexibility from different systems to meet their needs (balancing and congestion management) using a common market. This common market is, then, formulated as a cooperative game aiming at identifying a stable and efficient split of costs of the jointly procured flexibility among the participating SOs to incentivize their cooperation. The non-emptiness of the core of this game is then mathematically proven, implying the stability of the game and the naturally-arising incentive for cooperation among the SOs. Several cost allocation mechanisms are then introduced, while characterizing their mathematical properties. Numerical results focusing on an interconnected system (composed of the IEEE 14-bus transmission system and the Matpower 18-bus, 69-bus, and 141-bus distributions systems) showcase the cooperation-induced reduction in system-wide flexibility procurement costs, and identifies the varying costs borne by different SOs under various cost allocations methods.
△ Less
Submitted 24 November, 2021;
originally announced November 2021.
-
A Linear Model for Distributed Flexibility Markets and DLMPs: A Comparison with the SOCP Formulation
Authors:
Anibal Sanjab,
Yuting Mou,
Ana Virag,
Kris Kessels
Abstract:
This paper examines the performance trade-offs between an introduced linear flexibility market model for congestion management and a benchmark second-order cone programming (SOCP) formulation. The linear market model incorporates voltage magnitudes and reactive powers, while providing a simpler formulation than the SOCP model, which enables its practical implementation. The paper provides a struct…
▽ More
This paper examines the performance trade-offs between an introduced linear flexibility market model for congestion management and a benchmark second-order cone programming (SOCP) formulation. The linear market model incorporates voltage magnitudes and reactive powers, while providing a simpler formulation than the SOCP model, which enables its practical implementation. The paper provides a structured comparison of the two formulations relying on developed deterministic and statistical Monte Carlo case analyses using two distribution test systems (the Matpower 69-bus and 141-bus systems). The case analyses show that with the increasing spread of offered flexibility throughout the system, the linear formulation increasingly preserves the reliability of the computed system variables as compared to the SOCP formulation, while more lenient imposed voltage limits can improve the approximation of prices and power flows at the expense of a less accurate computation of voltage magnitudes.
△ Less
Submitted 3 November, 2021;
originally announced November 2021.
-
Short Term Electricity Market Designs: Identified Challenges and Promising Solutions
Authors:
Lina Silva-Rodriguez,
Anibal Sanjab,
Elena Fumagalli,
Ana Virag,
Madeleine Gibescu
Abstract:
The electricity market, which was initially designed for dispatchable power plants and inflexible demand, is being increasingly challenged by new trends, such as the high penetration of intermittent renewables and the transformation of the consumers energy space. To accommodate these new trends and improve the performance of the market, several modifications to current market designs have been pro…
▽ More
The electricity market, which was initially designed for dispatchable power plants and inflexible demand, is being increasingly challenged by new trends, such as the high penetration of intermittent renewables and the transformation of the consumers energy space. To accommodate these new trends and improve the performance of the market, several modifications to current market designs have been proposed in the literature. Given the vast variety of these proposals, this paper provides a comprehensive investigation of the modifications proposed in the literature as well as a detailed assessment of their suitability for improving market performance under the continuously evolving electricity landscape. To this end, first, a set of criteria for an ideal market design is proposed, and the barriers present in current market designs hindering the fulfillment of these criteria are identified. Then, the different market solutions proposed in the literature, which could potentially mitigate these barriers, are extensively explored. Finally, a taxonomy of the proposed solutions is presented, highlighting the barriers addressed by each proposal and the associated implementation challenges. The outcomes of this analysis show that even though each barrier is addressed by at least one proposed solution, no single proposal is able to address all the barriers simultaneously. In this regard, a future-proof market design must combine different elements of proposed solutions to comprehensively mitigate market barriers and overcome the identified implementation challenges. Thus, by thoroughly reviewing this rich body of literature, this paper introduces key contributions enabling the advancement of the state-of-the-art towards increasingly efficient electricity market.
△ Less
Submitted 9 November, 2020;
originally announced November 2020.
-
A Game of Drones: Cyber-Physical Security of Time-Critical UAV Applications with Cumulative Prospect Theory Perceptions and Valuations
Authors:
Anibal Sanjab,
Walid Saad,
Tamer Başar
Abstract:
In this paper, a novel mathematical framework is introduced for modeling and analyzing the cyber-physical security of time-critical UAV applications. A general UAV security network interdiction game is formulated to model interactions between a UAV operator and an interdictor, each of which can be benign or malicious. In this game, the interdictor chooses the optimal location(s) from which to targ…
▽ More
In this paper, a novel mathematical framework is introduced for modeling and analyzing the cyber-physical security of time-critical UAV applications. A general UAV security network interdiction game is formulated to model interactions between a UAV operator and an interdictor, each of which can be benign or malicious. In this game, the interdictor chooses the optimal location(s) from which to target the drone system by interdicting the potential paths of the UAVs. Meanwhile, the UAV operator responds by finding an optimal path selection policy that enables its UAVs to evade attacks and minimize their mission completion time. New notions from cumulative prospect theory (PT) are incorporated into the game to capture the operator's and interdictor's subjective valuations of mission completion times and perceptions of the risk levels facing the UAVs. The equilibrium of the game, with and without PT, is then analytically characterized and studied. Novel algorithms are then proposed to reach the game's equilibria under both PT and classical game theory. Simulation results show the properties of the equilibrium for both the rational and PT cases. The results show that the operator's and interdictor's bounded rationality is more likely to be disadvantageous to the UAV operator.
△ Less
Submitted 7 February, 2020; v1 submitted 9 February, 2019;
originally announced February 2019.
-
Dynamic Psychological Game Theory for Secure Internet of Battlefield Things (IoBT) Systems
Authors:
Ye Hu,
Anibal Sanjab,
Walid Saad
Abstract:
In this paper, a novel anti-jamming mechanism is proposed to analyze and enhance the security of adversarial Internet of Battlefield Things (IoBT) systems. In particular, the problem is formulated as a dynamic psychological game between a soldier and an attacker. In this game, the soldier seeks to accomplish a time-critical mission by traversing a battlefield within a certain amount of time, while…
▽ More
In this paper, a novel anti-jamming mechanism is proposed to analyze and enhance the security of adversarial Internet of Battlefield Things (IoBT) systems. In particular, the problem is formulated as a dynamic psychological game between a soldier and an attacker. In this game, the soldier seeks to accomplish a time-critical mission by traversing a battlefield within a certain amount of time, while maintaining its connectivity with an IoBT network. The attacker, on the other hand, seeks to find the optimal opportunity to compromise the IoBT network and maximize the delay of the soldier's IoBT transmission link. The soldier and the attacker's psychological behavior are captured using tools from psychological game theory, with which the soldier's and attacker's intentions to harm one another are considered in their utilities. To solve this game, a novel learning algorithm based on Bayesian updating is proposed to find a $ε$-like psychological self-confirming equilibrium of the game. Simulation results show that, based on the error-free beliefs on the attacker's psychological strategies and beliefs, the soldier's material payoff can be improved by up to 15.11\% compared to a conventional dynamic game without psychological considerations.
△ Less
Submitted 29 August, 2018;
originally announced September 2018.
-
Graph-Theoretic Framework for Unified Analysis of Observability and Data Injection Attacks in the Smart Grid
Authors:
Anibal Sanjab,
Walid Saad,
Tamer Başar
Abstract:
In this paper, a novel graph-theoretic framework is proposed to generalize the analysis of a broad set of security attacks, including observability and data injection attacks, that target the state estimator of a smart grid. First, the notion of observability attacks is defined based on a proposed graph-theoretic construct. In this respect, a structured approach is proposed to characterize critica…
▽ More
In this paper, a novel graph-theoretic framework is proposed to generalize the analysis of a broad set of security attacks, including observability and data injection attacks, that target the state estimator of a smart grid. First, the notion of observability attacks is defined based on a proposed graph-theoretic construct. In this respect, a structured approach is proposed to characterize critical sets, whose removal renders the system unobservable. It is then shown that, for the system to be observable, these critical sets must be part of a maximum matching over a proposed bipartite graph. In addition, it is shown that stealthy data injection attacks (SDIAs) constitute a special case of these observability attacks. Then, various attack strategies and defense policies, for observability and data injection attacks, are shown to be amenable to analysis using the introduced graph-theoretic framework. The proposed framework is then shown to provide a unified basis for analysis of four key security problems (among others), pertaining to the characterization of: 1) The sparsest SDIA; 2) the sparsest SDIA including a certain measurement; 3) a set of measurements which must be defended to thwart all potential SDIAs; and 4) the set of measurements, which when protected, can thwart any SDIA whose cardinality is below a certain threshold. A case study using the IEEE 14-bus system with a set of 17 measurements is used to support the theoretical findings.
△ Less
Submitted 4 February, 2020; v1 submitted 26 January, 2018;
originally announced January 2018.
-
Generalized Colonel Blotto Game
Authors:
Aidin Ferdowsi,
Anibal Sanjab,
Walid Saad,
Tamer Başar
Abstract:
Competitive resource allocation between adversarial decision makers arises in a wide spectrum of real-world applications such as in communication systems, cyber-physical systems security, as well as financial, political, and electoral competition. As such, develo** analytical tools to model and analyze competitive resource allocation is crucial for devising optimal allocation strategies and anti…
▽ More
Competitive resource allocation between adversarial decision makers arises in a wide spectrum of real-world applications such as in communication systems, cyber-physical systems security, as well as financial, political, and electoral competition. As such, develo** analytical tools to model and analyze competitive resource allocation is crucial for devising optimal allocation strategies and anticipating the potential outcomes of the competition. To this end, the Colonel Blotto game is one of the most popular game-theoretic frameworks for modeling and analyzing such competitive resource allocation problems. However, in many real-world competitive situations, the Colonel Blotto game does not admit solutions in deterministic strategies and, hence, one must rely on analytically complex mixed-strategies with their associated tractability, applicability, and practicality challenges. In this paper, a generalization of the Colonel Blotto game which enables the derivation of deterministic, practical, and implementable equilibrium strategies is proposed while accounting for the heterogeneity of the battlefields. In addition, the proposed generalized game enables accounting for the consumed resources in each battlefield, a feature that is not considered in the classical Blotto game. For the generalized game, the existence of a Nash equilibrium in pure-strategies is shown. Then, closed-form analytical expressions of the equilibrium strategies, are derived and the outcome of the game is characterized; based on the number of resources of each player as well as the valuation of each battlefield. The generated results provide invaluable insights on the outcome of the competition. For example, the results show that, when both players are fully rational, the more resourceful player can achieve a better total payoff at the Nash equilibrium, a result that is not mimicked in the classical Blotto game.
△ Less
Submitted 1 March, 2018; v1 submitted 3 October, 2017;
originally announced October 2017.
-
Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure
Authors:
Aidin Ferdowsi,
Anibal Sanjab,
Walid Saad,
Narayan B. Mandayam
Abstract:
A city's critical infrastructure such as gas, water, and power systems, are largely interdependent since they share energy, computing, and communication resources. This, in turn, makes it challenging to endow them with fool-proof security solutions. In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel…
▽ More
A city's critical infrastructure such as gas, water, and power systems, are largely interdependent since they share energy, computing, and communication resources. This, in turn, makes it challenging to endow them with fool-proof security solutions. In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel game-theoretic framework. In particular, a zero-sum noncooperative game is formulated between a malicious attacker who seeks to simultaneously alter the states of the gas-power-water critical infrastructure to increase the power generation cost and a defender who allocates communication resources over its attack detection filters in local areas to monitor the infrastructure. At the mixed strategy Nash equilibrium of this game, numerical results show that the expected power generation cost deviation is 35\% lower than the one resulting from an equal allocation of resources over the local filters. The results also show that, at equilibrium, the interdependence of the power system on the natural gas and water systems can motivate the attacker to target the states of the water and natural gas systems to change the operational states of the power grid. Conversely, the defender allocates a portion of its resources to the water and natural gas states of the interdependent system to protect the grid from state deviations.
△ Less
Submitted 14 July, 2017;
originally announced July 2017.
-
Hardware Trojan Detection Game: A Prospect-Theoretic Approach
Authors:
Walid Saad,
Anibal Sanjab,
Yunpeng Wang,
Charles Kamhoua,
Kevin Kwiat
Abstract:
Outsourcing integrated circuit (IC) manufacturing to offshore foundries has grown exponentially in recent years. Given the critical role of ICs in the control and operation of vehicular systems and other modern engineering designs, such offshore outsourcing has led to serious security threats due to the potential of insertion of hardware trojans - malicious designs that, when activated, can lead t…
▽ More
Outsourcing integrated circuit (IC) manufacturing to offshore foundries has grown exponentially in recent years. Given the critical role of ICs in the control and operation of vehicular systems and other modern engineering designs, such offshore outsourcing has led to serious security threats due to the potential of insertion of hardware trojans - malicious designs that, when activated, can lead to highly detrimental consequences. In this paper, a novel game-theoretic framework is proposed to analyze the interactions between a hardware manufacturer, acting as attacker, and an IC testing facility, acting as defender. The problem is formulated as a noncooperative game in which the attacker must decide on the type of trojan that it inserts while taking into account the detection penalty as well as the damage caused by the trojan. Meanwhile, the resource-constrained defender must decide on the best testing strategy that allows optimizing its overall utility which accounts for both damages and the fines. The proposed game is based on the robust behavioral framework of prospect theory (PT) which allows capturing the potential uncertainty, risk, and irrational behavior in the decision making of both the attacker and defender. For both, the standard rational expected utility (EUT) case and the PT case, a novel algorithm based on fictitious play is proposed and shown to converge to a mixed-strategy Nash equilibrium. For an illustrative case study, thorough analytical results are derived for both EUT and PT to study the properties of the reached equilibrium as well as the impact of key system parameters such as the defender-set fine. Simulation results assess the performance of the proposed framework under both EUT and PT and show that the use of PT will provide invaluable insights on the outcomes of the proposed hardware trojan game, in particular, and system security, in general.
△ Less
Submitted 21 March, 2017;
originally announced March 2017.
-
Prospect Theory for Enhanced Cyber-Physical Security of Drone Delivery Systems: A Network Interdiction Game
Authors:
Anibal Sanjab,
Walid Saad,
Tamer Başar
Abstract:
The use of unmanned aerial vehicles (UAVs) as delivery systems of online goods is rapidly becoming a global norm, as corroborated by Amazon's "Prime Air" and Google's "Project Wing" projects. However, the real-world deployment of such drone delivery systems faces many cyber-physical security challenges. In this paper, a novel mathematical framework for analyzing and enhancing the security of drone…
▽ More
The use of unmanned aerial vehicles (UAVs) as delivery systems of online goods is rapidly becoming a global norm, as corroborated by Amazon's "Prime Air" and Google's "Project Wing" projects. However, the real-world deployment of such drone delivery systems faces many cyber-physical security challenges. In this paper, a novel mathematical framework for analyzing and enhancing the security of drone delivery systems is introduced. In this regard, a zero-sum network interdiction game is formulated between a vendor, operating a drone delivery system, and a malicious attacker. In this game, the vendor seeks to find the optimal path that its UAV should follow, to deliver a purchase from the vendor's warehouse to a customer location, to minimize the delivery time. Meanwhile, an attacker seeks to choose an optimal location to interdict the potential paths of the UAVs, so as to inflict cyber or physical damage to it, thus, maximizing its delivery time. First, the Nash equilibrium point of this game is characterized. Then, to capture the subjective behavior of both the vendor and attacker, new notions from prospect theory are incorporated into the game. These notions allow capturing the vendor's and attacker's i) subjective perception of attack success probabilities, and ii) their disparate subjective valuations of the achieved delivery times relative to a certain target delivery time. Simulation results have shown that the subjective decision making of the vendor and attacker leads to adopting risky path selection strategies which inflict delays to the delivery, thus, yielding unexpected delivery times which surpass the target delivery time set by the vendor.
△ Less
Submitted 10 February, 2017;
originally announced February 2017.
-
On Bounded Rationality in Cyber-Physical Systems Security: Game-Theoretic Analysis with Application to Smart Grid Protection
Authors:
Anibal Sanjab,
Walid Saad
Abstract:
In this paper, a general model for cyber-physical systems (CPSs), that captures the diffusion of attacks from the cyber layer to the physical system, is studied. In particular, a game-theoretic approach is proposed to analyze the interactions between one defender and one attacker over a CPS. In this game, the attacker launches cyber attacks on a number of cyber components of the CPS to maximize th…
▽ More
In this paper, a general model for cyber-physical systems (CPSs), that captures the diffusion of attacks from the cyber layer to the physical system, is studied. In particular, a game-theoretic approach is proposed to analyze the interactions between one defender and one attacker over a CPS. In this game, the attacker launches cyber attacks on a number of cyber components of the CPS to maximize the potential harm to the physical system while the system operator chooses to defend a number of cyber nodes to thwart the attacks and minimize potential damage to the physical side. The proposed game explicitly accounts for the fact that both attacker and defender can have different computational capabilities and disparate levels of knowledge of the system. To capture such bounded rationality of attacker and defender, a novel approach inspired from the behavioral framework of cognitive hierarchy theory is developed. In this framework, the defender is assumed to be faced with an attacker that can have different possible thinking levels reflecting its knowledge of the system and computational capabilities. To solve the game, the optimal strategies of each attacker type are characterized and the optimal response of the defender facing these different types is computed. This general approach is applied to smart grid security considering wide area protection with energy markets implications. Numerical results show that a deviation from the Nash equilibrium strategy is beneficial when the bounded rationality of the attacker is considered. Moreover, the results show that the defender's incentive to deviate from the Nash equilibrium decreases when faced with an attacker that has high computational ability.
△ Less
Submitted 6 October, 2016;
originally announced October 2016.
-
Prospect Theory for Enhanced Smart Grid Resilience Using Distributed Energy Storage
Authors:
Georges El Rahi,
Anibal Sanjab,
Walid Saad,
Narayan B. Mandayam,
H. Vincent Poor
Abstract:
The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future eme…
▽ More
The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future emergencies, given the prospective market prices which are influenced by other MGOs' decisions. The problem is modeled using a Bayesian game to account for the incomplete information that MGOs have about each others' levels of surplus. The proposed game explicitly accounts for each MGO's subjective decision when faced with the uncertainty of its opponents' energy surplus. In particular, the so-called framing effect, from the framework of prospect theory (PT), is used to account for each MGO's valuation of its gains and losses with respect to an individual utility reference point. The reference point is typically different for each individual and originates from its past experiences and future aspirations. A closed-form expression for the Bayesian Nash equilibrium is derived for the standard game formulation. Under PT, a best response algorithm is proposed to find the equilibrium. Simulation results show that, depending on their individual reference points, MGOs can tend to store more or less energy under PT compared to classical game theory. In addition, the impact of the reference point is found to be more prominent as the emergency price set by the power company increases.
△ Less
Submitted 6 October, 2016;
originally announced October 2016.
-
Smart Grid Security: Threats, Challenges, and Solutions
Authors:
Anibal Sanjab,
Walid Saad,
Ismail Guvenc,
Arif Sarwat,
Saroj Biswas
Abstract:
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid. Thus, to properly secure the smart grid, it is of utm…
▽ More
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid. Thus, to properly secure the smart grid, it is of utmost importance to: a) understand its underlying vulnerabilities and associated threats, b) quantify their effects, and c) devise appropriate security solutions. In this paper, the key threats targeting the smart grid are first exposed while assessing their effects on the operation and stability of the grid. Then, the challenges involved in understanding these attacks and devising defense strategies against them are identified. Potential solution approaches that can help mitigate these threats are then discussed. Last, a number of mathematical tools that can help in analyzing and implementing security solutions are introduced. As such, this paper will provide the first comprehensive overview on smart grid security.
△ Less
Submitted 22 June, 2016;
originally announced June 2016.
-
Data Injection Attacks on Smart Grids with Multiple Adversaries: A Game-Theoretic Perspective
Authors:
Anibal Sanjab,
Walid Saad
Abstract:
Data injection attacks have recently emerged as a significant threat on the smart power grid. By launching data injection attacks, an adversary can manipulate the real-time locational marginal prices to obtain economic benefits. Despite the surge of existing literature on data injection, most such works assume the presence of a single attacker and assume no cost for attack or defense. In contrast,…
▽ More
Data injection attacks have recently emerged as a significant threat on the smart power grid. By launching data injection attacks, an adversary can manipulate the real-time locational marginal prices to obtain economic benefits. Despite the surge of existing literature on data injection, most such works assume the presence of a single attacker and assume no cost for attack or defense. In contrast, in this paper, a model for data injection attacks with multiple adversaries and a single smart grid defender is introduced. To study the defender-attackers interaction, two game models are considered. In the first, a Stackelberg game model is used in which the defender acts as a leader that can anticipate the actions of the adversaries, that act as followers, before deciding on which measurements to protect. The existence and properties of the Stackelberg equilibrium of this game are studied. To find the equilibrium, a distributed learning algorithm that operates under limited system information is proposed and shown to converge to the game solution. In the second proposed game model, it is considered that the defender cannot anticipate the actions of the adversaries. To this end, we proposed a hybrid satisfaction equilibrium - Nash equilibrium game and defined its equilibrium concept. A search algorithm is also provided to find the equilibrium of the hybrid game. Numerical results using the IEEE 30-bus system are used to illustrate and analyze the strategic interactions between the attackers and defender. Our results show that by defending a very small set of measurements, the grid operator can achieve an equilibrium through which the optimal attacks have no effect on the system. Moreover, our results show how, at equilibrium, multiple attackers can play a destructive role towards each other, by choosing to carry out attacks that cancel each other out, leaving the system unaffected.
△ Less
Submitted 31 March, 2016;
originally announced April 2016.