Security attacks on smart grid scheduling and their defences: a game-theoretic approach

被引:20
作者
Pilz, M. [1 ]
Naeini, F. Baghaei [1 ]
Grammont, K. [2 ]
Smagghe, C. [2 ]
Davis, M. [1 ]
Nebel, J. -C. [1 ]
Al-Fagih, L. [1 ,3 ]
Pfluegel, E. [1 ]
机构
[1] Kingston Univ, Sch Comp Sci & Math, London KT1 2EE, England
[2] Normandie Univ, ENSICAEN, UNICAEN, CNRS, Caen, France
[3] Hamad Bin Khalifa Univ, Coll Sci & Engn, Div Engn Management & Decis Sci, Doha, Qatar
关键词
Cyber security; Game theory; Smart grid; False data injection; Defence strategies; Decision-making; Optimal resource allocation; DEMAND-SIDE MANAGEMENT; DATA INJECTION ATTACKS; CYBER SECURITY; ROBUST;
D O I
10.1007/s10207-019-00460-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The introduction of advanced communication infrastructure into the power grid raises a plethora of new opportunities to tackle climate change. This paper is concerned with the security of energy management systems which are expected to be implemented in the future smart grid. The existence of a novel class of false data injection attacks that are based on modifying forecasted demand data is demonstrated, and the impact of the attacks on a typical system's parameters is identified, using a simulated scenario. Monitoring strategies that the utility company may employ in order to detect the attacks are proposed, and a game-theoretic approach is used to support the utility company's decision-making process for the allocation of their defence resources. Informed by these findings, a generic security game is devised and solved, revealing the existence of several Nash equilibrium strategies. The practical outcomes of these results for the utility company are discussed in detail, and a proposal is made, suggesting how the generic model may be applied to other scenarios.
引用
收藏
页码:427 / 443
页数:17
相关论文
共 52 条
[1]  
Alpcan T., 2010, NETWORK SECURITY, DOI DOI 10.1017/CBO97805117607782-S2.0-84924666047
[2]  
[Anonymous], 2015, SOUTHEASTCON 2015
[3]  
Auman RJ, 1985, FRONTIERS EC, P5
[4]   EPISTEMIC CONDITIONS FOR NASH EQUILIBRIUM [J].
AUMANN, R ;
BRANDENBURGER, A .
ECONOMETRICA, 1995, 63 (05) :1161-1180
[5]   Enumeration of Nash equilibria for two-player games [J].
Avis, David ;
Rosenberg, Gabriel D. ;
Savani, Rahul ;
von Stengel, Bernhard .
ECONOMIC THEORY, 2010, 42 (01) :9-37
[6]   How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games [J].
Bao, Tiffany ;
Shoshitaishvili, Yan ;
Wang, Ruoyu ;
Kruegel, Christopher ;
Vigna, Giovanni ;
Brumley, David .
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, :7-21
[7]   Secure Smart Homes: Opportunities and Challenges [J].
Batalla, Jordi Mongay ;
Vasilakos, Athanasios ;
Gajewski, Mariusz .
ACM COMPUTING SURVEYS, 2017, 50 (05)
[8]   Combining forecasts in short term load forecasting: Empirical analysis and identification of robust forecaster [J].
Bichpuriya, Yogesh K. ;
Soman, S. A. ;
Subramanyam, A. .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2016, 41 (10) :1123-1133
[9]   An Evolutionary Game for Integrity Attacks and Defences for Advanced Metering Infrastructure [J].
Boudko, Svetlana ;
Abie, Habtamu .
ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
[10]  
Chen H, 2017, POWER SYSTEM OPTIMIS