Game Theory based Optimal Defensive Resources Allocation with Incomplete Information in Cyber-physical Power Systems against False Data Injection Attacks

被引:13
作者
Yan, Bingjing [1 ]
Jiang, Zhenze [1 ]
Yao, Pengchao [2 ]
Yang, Qiang [1 ]
Li, Wei [3 ,4 ,5 ,6 ]
Zomaya, Albert Y. [7 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, Hangzhou 310027, Peoples R China
[2] Zhejiang Univ, Coll Control Sci & Engn, Hangzhou, Peoples R China
[3] Univ Sydney, Sch Comp Sci, Ctr Distributed & High Performance Comp, Sydney, NSW, Australia
[4] IEEE Comp Soc, Sydney, NSW, Australia
[5] IEEE, Sydney, NSW, Australia
[6] ACM, Sydney, NSW, Australia
[7] Univ Sydney, Sch Informat Technol, High Performance Comp & Networking, Sydney, NSW, Australia
基金
中国国家自然科学基金;
关键词
Optimal strategy; game theory; Nash equilibrium; CPPS; FDI attack; MODEL; WEIGHTS;
D O I
10.23919/PCMP.2023.000138
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Modern power grid is fast emerging as a complex cyber-physical power system (CPPS) integrating physical current-carrying components and processes with cyber-embedded computing, which faces increasing cyberspace security threats and risks. In this paper, the state (i.e., voltage) offsets resulting from false data injection (FDI) attacks and the bus safety characterization are applied to quantify the attack consequences. The state offsets are obtained by the state estimation method, and the bus safety characterization considers the power network topology as well as the vulnerability and connection relationship of buses. Considering the indeterminacy of attacker's resource consumption and reward, a zero-sum game-theoretical model from the defender's perspective with incomplete information is explored for the optimal allocation of limited defensive resources. The attacker aims to falsify measurements without triggering threshold alarms to break through the protection, leading to load shedding, over-voltage or under-voltage. The defender attempts to ensure the estimation results to be as close to the actual states as possible, and guarantee the system's safety and efficient defensive resource utilization. The proposed solution is extensively evaluated through simulations using the IEEE 33-bus test network and real-time digital simulator (RTDS) based testbed experiments of the IEEE 14-bus network. The results demonstrate the effectiveness of the proposed game-theoretical approach for optimal defensive resource allocation in CPPS when limited resources are available when under FDI attacks.
引用
收藏
页码:115 / 127
页数:13
相关论文
共 52 条
[1]   Game model to optimally combine electric vehicles with green and non-green sources into an end-to-end smart grid architecture [J].
Attia, Mohamed ;
Sedjelmaci, Hichem ;
Senouci, Sidi Mohammed ;
Aglzim, El-Hassane .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 72 :1-13
[2]  
Basar T., 1998, Dynamic Noncooperative Game Theory, V2nd
[3]   Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (07) :1471-1485
[4]  
Bingjing Yan, 2021, 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2), P2392, DOI 10.1109/EI252483.2021.9712952
[5]  
Chen M., 2022, Expert Systems with Applications
[6]   Lessons from Stuxnet [J].
Chen, Thomas M. ;
Abu-Nimeh, Saeed .
COMPUTER, 2011, 44 (04) :91-93
[7]   False Data Injection Attacks Against State Estimation in Power Distribution Systems [J].
Deng, Ruilong ;
Zhuang, Peng ;
Liang, Hao .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) :2871-2881
[8]  
Devroye L, 2006, HBK OPERAT RES MANAG, V13, P83, DOI 10.1016/S0927-0507(06)13004-2
[9]   DETERMINING OBJECTIVE WEIGHTS IN MULTIPLE CRITERIA PROBLEMS - THE CRITIC METHOD [J].
DIAKOULAKI, D ;
MAVROTAS, G ;
PAPAYANNAKIS, L .
COMPUTERS & OPERATIONS RESEARCH, 1995, 22 (07) :763-770
[10]   Dynamics of service selection and provider pricing game in heterogeneous cloud market [J].
Do, Cuong T. ;
Tran, Nguyen H. ;
Huh, Eui-Nam ;
Hong, Choong Seon ;
Niyato, Dusit ;
Han, Zhu .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 69 :152-165