Optimal Strategy of Attack-Defense Interaction Over Load Frequency Control Considering Incomplete Information

被引:19
作者
Bi, Wenjun [1 ]
Chen, Chunyu [1 ]
Zhang, Kaifeng [1 ]
机构
[1] Southeast Univ, Sch Automat, Key Lab Measurement & Control CSE, Nanjing 210096, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Load frequency control; attack-defense interaction; optimal strategy; zero-sum game; incomplete information; CYBER; MITIGATION; SECURITY; DESIGN;
D O I
10.1109/ACCESS.2019.2921603
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Studying cyber attack-defense interaction over load frequency control (LFC) had become critical for guaranteeing the frequency quality and safety operation of power systems. It was revealed that both the attacker and the defender have multiple alternatives from strategy pools, which results in optimal strategy selection in pursuit of optimal payoff. In this paper, game theory model is introduced to analyze optimal strategy of attack-defense interaction over LFC. As to payoff calculation, we consider the comprehensive evaluating metric containing both the application effect and implementation cost of specific strategies, and propose a fuzzy logic-based calculation method. Considering the incomplete information in the attack-defense interaction game, we propose a mixed strategy method to obtain the optimal strategy. The simulation results show the effectiveness of the proposed optimal strategies.
引用
收藏
页码:75342 / 75349
页数:8
相关论文
共 25 条
  • [1] [Anonymous], 1992, PRIMER GAME THEORY
  • [2] Detection Scheme Against Cyber-Physical Attacks on Load Frequency Control Based on Dynamic Characteristics Analysis
    Bi, Wenjun
    Zhang, Kaifeng
    Li, Yaping
    Yuan, Kun
    Wang, Ying
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2859 - 2868
  • [3] Novel Detection Scheme Design Considering Cyber Attacks on Load Frequency Control
    Chen, Chunyu
    Zhang, Kaifeng
    Yuan, Kun
    Zhu, Lingzhi
    Qian, Minhui
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (05) : 1932 - 1941
  • [4] Esfahani PM, 2010, IEEE DECIS CONTR P, P5973, DOI 10.1109/CDC.2010.5717285
  • [5] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467
  • [6] Grodzevich O., 2006, P FIELDS MITACS IND, P87
  • [7] Robust Load Frequency Controller Design Based on a New Strict Model
    Huang, Chongxin
    Zhang, Kaifeng
    Dai, Xianzhong
    Zang, Qiang
    [J]. ELECTRIC POWER COMPONENTS AND SYSTEMS, 2013, 41 (11) : 1075 - 1099
  • [8] Security Games for Risk Minimization in Automatic Generation Control
    Law, Yee Wei
    Alpcan, Tansu
    Palaniswami, Marimuthu
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (01) : 223 - 232
  • [9] Detecting False Data Injection Attacks on Power Grid by Sparse Optimization
    Liu, Lanchao
    Esmalifalak, Mohammad
    Ding, Qifeng
    Emesih, Valentine A.
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (02) : 612 - 621
  • [10] Masking Transmission Line Outages via False Data Injection Attacks
    Liu, Xuan
    Li, Zhiyi
    Liu, Xingdong
    Li, Zuyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) : 1592 - 1602