Optimal Deception Strategies in Power System Fortification against Deliberate Attacks
<p>Various types of attacks against the modern power grid [<a href="#B5-energies-12-00342" class="html-bibr">5</a>].</p> "> Figure 2
<p>Demonstration of deception strategies in power system fortification: (<b>a</b>) original power system; (<b>b</b>) candidate deception branch set; (<b>c</b>) deceived power system shown to the adversary; (<b>d</b>) deliberate attack plan; (<b>e</b>) expected power system by the terrorist after attack; (<b>f</b>) actual power system after attack.</p> "> Figure 3
<p>Demonstration of protection strategies in power system fortification: (<b>a</b>) original power system; (<b>b</b>) candidate protection branch set; (<b>c</b>) enhanced power system shown to the adversary; (<b>d</b>) deliberate attack plan; (<b>e</b>) expected power system by the terrorist after attack; (<b>f</b>) actual power system after attack.</p> "> Figure 4
<p>Performance of the optimal deception and protection strategies on the 6-bus system under different defense and attack budgets.</p> "> Figure 5
<p>Intermediate systems for the deception strategy with <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mi>A</mi> </msub> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>N</mi> <mi>B</mi> </msub> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p> "> Figure 6
<p>Single line diagram of the IEEE 57-bus system.</p> "> Figure 7
<p>Power imbalance with the protection strategy under different defense and attack budgets.</p> "> Figure 8
<p>Power imbalance with the deception strategy under different defense and attack budgets.</p> "> Figure 9
<p>Difference of power imbalance with various fortification strategies under different defense and attack budgets.</p> "> Figure 10
<p>Convergence property of deception and protection strategies.</p> ">
Abstract
:1. Introduction
- In the first stage (upper-level problem), the defender determines an optimal defensive plan with the goal of minimizing system power imbalance/mismatch, where the reaction of attacker should be considered and the defensive resource is limited.
- In the second stage (middle-level problem), the attacker is faced with an enhanced system where the defensive plan generated in the first stage has been implemented, and whose goal is maximizing the unserved energy of the confronted network with restricted attack resources.
- In the third stage (lower-level problem), both initial defensive plan and subsequent attack scheme have been carried out, leading to a partially destroyed system, whose power imbalance will be minimized in this stage via system redispatch.
2. Problem Formulation
2.1. Differences between Deception and Protection Strategies
2.2. Mathematical Formulation
- Change the definition of binary decision variables . Let represent the protection of line l, and vice versa.
- Delete the constraint (8). Since all the lines are visible for the adversary, each line l is attackable no matter or not.
- Revise the constraint (11). It is assumed that the protected line cannot be destroyed, i.e., if , the power flow of line l is guaranteed to be nonzero whatever the attack is conducted or not. Therefore, constraint (11) can be reformulated as
3. Solution Methodology
3.1. Subproblem
3.2. Master Problem
4. Numerical Experiments
4.1. The 6-Bus System
4.2. IEEE 57-Bus System
4.2.1. Performance Evaluation
4.2.2. Convergence Analysis
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
AD | Attacker–Defender |
AMI | Advanced Metering Infrastructure |
CCG | Column-and-Constraint Generation |
DAD | Defender-Attacker-Defender |
FDIA | False Data Injection Attack |
IED | Intelligent Electronic Device |
KKT | Karush–Kuhn–Tucker |
LP | Linear Programming |
MILP | Mixed-Integer Linear Programming |
RO | Robust Optimization |
SCADA | Supervisory Control And Data Acquisition |
Nomenclature | |
System power imbalance, given . | |
e | Binary variable that is equal to 1 if line l is hidden for deception; being 0 otherwise. |
L | Set of branch indexes. |
Maximum number of lines can be hidden for deception. | |
Maximum level of system power imbalance. | |
System power imbalance, given , and . | |
Binary variable that is equal to 1 if line l is attacked; being 0 otherwise. | |
Maximum number of lines can be attacked. | |
Power output of generator i. | |
The bus that generator i is connected to. | |
Power flow of line l. | |
Sending or origin bus of line l. | |
Receiving or destination bus of line l. | |
Power surplus at bus b. | |
Power deficit at bus b. | |
Demand at bus b. | |
N | Set of bus indexes. |
Suspectance of line l. | |
Phase angle at bus b. | |
Power flow capacity of line l. | |
Capacity of generator i. | |
I | Set of generator indexes. |
Appendix A. The Dataset of IEEE 57-Bus System
Bus No. | (MW) | (MW) | Bus No. | (MW) | (MW) | Bus No. | (MW) | (MW) |
---|---|---|---|---|---|---|---|---|
1 | 575.88 | 55 | 20 | 0 | 2.3 | 39 | 0 | 0 |
2 | 100 | 3 | 21 | 0 | 0 | 40 | 0 | 0 |
3 | 140 | 41 | 22 | 0 | 0 | 41 | 0 | 6.3 |
4 | 0 | 0 | 23 | 0 | 6.3 | 42 | 0 | 7.1 |
5 | 0 | 13 | 24 | 0 | 0 | 43 | 0 | 2 |
6 | 100 | 75 | 25 | 0 | 6.3 | 44 | 0 | 12 |
7 | 0 | 0 | 26 | 0 | 0 | 45 | 0 | 0 |
8 | 550 | 150 | 27 | 0 | 9.3 | 46 | 0 | 0 |
9 | 100 | 121 | 28 | 0 | 4.6 | 47 | 0 | 29.7 |
10 | 0 | 5 | 29 | 0 | 17 | 48 | 0 | 0 |
11 | 0 | 0 | 30 | 0 | 3.6 | 49 | 0 | 18 |
12 | 410 | 377 | 31 | 0 | 5.8 | 50 | 0 | 21 |
13 | 0 | 18 | 32 | 0 | 1.6 | 51 | 0 | 18 |
14 | 0 | 10.5 | 33 | 0 | 3.8 | 52 | 0 | 4.9 |
15 | 0 | 22 | 34 | 0 | 0 | 53 | 0 | 20 |
16 | 0 | 43 | 35 | 0 | 6 | 54 | 0 | 4.1 |
17 | 0 | 42 | 36 | 0 | 0 | 55 | 0 | 6.8 |
18 | 0 | 27.2 | 37 | 0 | 0 | 56 | 0 | 7.6 |
19 | 0 | 3.3 | 38 | 0 | 14 | 57 | 0 | 6.7 |
From–To | Re. (p.u.) | (MW) | From–To | Re. (p.u.) | (MW) | From–To | Re. (p.u.) | (MW) |
---|---|---|---|---|---|---|---|---|
1–2 | 0.0280 | 72 | 14–15 | 0.0547 | 76 | 41–42 | 0.3520 | 79 |
2–3 | 0.0850 | 71 | 18–19 | 0.6850 | 73 | 41–43 | 0.4120 | 75 |
3–4 | 0.0366 | 79 | 19–20 | 0.4340 | 78 | 38–44 | 0.0585 | 70 |
4–5 | 0.1320 | 71 | 21–20 | 0.7767 | 73 | 15–45 | 0.1042 | 77 |
4–6 | 0.1480 | 74 | 21–22 | 0.1170 | 80 | 14–46 | 0.0735 | 74 |
6–7 | 0.1020 | 79 | 22–23 | 0.0152 | 77 | 46–47 | 0.0680 | 78 |
6–8 | 0.1730 | 77 | 23–24 | 0.2560 | 80 | 47–48 | 0.0233 | 72 |
8–9 | 0.0505 | 75 | 24–25 | 1.1820 | 79 | 48–49 | 0.1290 | 77 |
9–10 | 0.1679 | 70 | 24–25 | 1.2300 | 72 | 49–50 | 0.1280 | 75 |
9–11 | 0.0848 | 70 | 24–26 | 0.0473 | 73 | 50–51 | 0.2200 | 73 |
9–12 | 0.2950 | 78 | 26–27 | 0.2540 | 77 | 10–51 | 0.0712 | 71 |
9–13 | 0.1580 | 70 | 27–28 | 0.0954 | 70 | 13–49 | 0.1910 | 70 |
13–14 | 0.0434 | 70 | 28–29 | 0.0587 | 80 | 29–52 | 0.1870 | 75 |
13–15 | 0.0869 | 75 | 7–29 | 0.0648 | 76 | 52–53 | 0.0984 | 79 |
1–15 | 0.0910 | 72 | 25–30 | 0.2020 | 76 | 53–54 | 0.2320 | 79 |
1–16 | 0.2060 | 79 | 30–31 | 0.4970 | 72 | 54–55 | 0.2265 | 77 |
1–17 | 0.1080 | 76 | 31–32 | 0.7550 | 72 | 11–43 | 0.1530 | 72 |
3–15 | 0.0530 | 71 | 32–33 | 0.0360 | 78 | 44–45 | 0.1242 | 77 |
4–18 | 0.5550 | 72 | 34–32 | 0.9530 | 75 | 40–56 | 1.1950 | 72 |
4–18 | 0.4300 | 70 | 34–35 | 0.0780 | 76 | 56–41 | 0.5490 | 78 |
5–6 | 0.0641 | 73 | 35–36 | 0.0537 | 74 | 56–42 | 0.3540 | 71 |
7–8 | 0.0712 | 80 | 36–37 | 0.0366 | 73 | 39–57 | 1.3550 | 77 |
10–12 | 0.1262 | 72 | 37–38 | 0.1009 | 72 | 57–56 | 0.2600 | 78 |
11–13 | 0.0732 | 71 | 37–39 | 0.0379 | 77 | 38–49 | 0.1770 | 77 |
12–13 | 0.0580 | 73 | 36–40 | 0.0466 | 73 | 38–48 | 0.0482 | 74 |
12–16 | 0.0813 | 72 | 22–38 | 0.0295 | 73 | 9–55 | 0.1205 | 75 |
12–17 | 0.1790 | 73 | 11–41 | 0.7490 | 78 |
References
- Boyer, S.A. SCADA: Supervisory Control and Data Acquisition; International Society of Automation: Pittsburgh, PA, USA, 2009. [Google Scholar]
- Chen, C.; Wang, J.; Qiu, F.; Zhao, D. Resilient distribution system by microgrids formation after natural disasters. IEEE Trans. Smart Grid 2016, 7, 958–966. [Google Scholar] [CrossRef]
- Yuan, W.; Wang, J.; Qiu, F.; Chen, C.; Kang, C.; Zeng, B. Robust optimization-based resilient distribution network planning against natural disasters. IEEE Trans. Smart Grid 2016, 7, 2817–2826. [Google Scholar] [CrossRef]
- Xu, X.; Mitra, J.; Cai, N.; Mou, L. Planning of reliable microgrids in the presence of random and catastrophic events. Int. Trans. Electr. Energy Syst. 2014, 24, 1151–1167. [Google Scholar] [CrossRef]
- Xiang, Y.; Wang, L.; Liu, N. Coordinated attacks on electric power systems in a cyber-physical environment. Electr. Power Syst. Res. 2017, 149, 156–168. [Google Scholar] [CrossRef]
- Pasqualetti, F.; Dörfler, F.; Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 2013, 58, 2715–2729. [Google Scholar] [CrossRef]
- Bilis, E.I.; Kröger, W.; Nan, C. Performance of electric power systems under physical malicious attacks. IEEE Syst. J. 2013, 7, 854–865. [Google Scholar] [CrossRef]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-Physical System Security for the Electric Power Grid. Proc. IEEE 2012, 100, 210–224. [Google Scholar] [CrossRef]
- Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 2017, 8, 1630–1638. [Google Scholar] [CrossRef]
- Zhu, Y.; Yan, J.; Tang, Y.; Sun, Y.L.; He, H. Joint substation-transmission line vulnerability assessment against the smart grid. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1010–1024. [Google Scholar] [CrossRef]
- Wang, Z.; He, J.; Nechifor, A.; Zhang, D.; Crossley, P. Identification of critical transmission lines in complex power networks. Energies 2017, 10, 1294. [Google Scholar] [CrossRef]
- Zhang, G.; Li, Z.; Zhang, B.; Qiu, D.; Halang, W.A. Cascading failures of power grids caused by line breakdown. Int. J. Circuit Theory Appl. 2015, 43, 1807–1814. [Google Scholar] [CrossRef]
- Wenli, F.; Zhigang, L.; Ping, H.; Shengwei, M. Cascading failure model in power grids using the complex network theory. IET Gener. Transm. Distrib. 2016, 10, 3940–3949. [Google Scholar] [CrossRef]
- Zhao, L.; Zeng, B. Vulnerability analysis of power grids with line switching. IEEE Trans. Power Syst. 2013, 28, 2727–2736. [Google Scholar] [CrossRef]
- Li, Z.; Shahidehpour, M.; Alabdulwahab, A.; Abusorrah, A. Bilevel model for analyzing coordinated cyber-physical attacks on power systems. IEEE Trans. Smart Grid 2016, 7, 2260–2272. [Google Scholar] [CrossRef]
- Tan, Y.; Li, Y.; Cao, Y.; Shahidehpour, M. Cyber-Attack on Overloading Multiple Lines: A Bilevel Mixed-Integer Linear Programming Model. IEEE Trans. Smart Grid 2018, 9, 1534–1536. [Google Scholar] [CrossRef]
- Lai, K.; Illindala, M.; Subramaniam, K. A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment. Appl. Energy 2019, 235, 204–218. [Google Scholar] [CrossRef]
- Yao, Y.; Edmunds, T.; Papageorgiou, D.; Alvarez, R. Trilevel optimization in power network defense. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2007, 37, 712–718. [Google Scholar] [CrossRef]
- Ding, T.; Yao, L.; Li, F. A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection. Reliab. Eng. Syst. Saf. 2018, 169, 179–186. [Google Scholar] [CrossRef]
- Zhao, L.; Zeng, B. Robust unit commitment problem with demand response and wind energy. In Proceedings of the 2012 IEEE Power and Energy Society General Meeting, San Diego, CA, USA, 22–26 July 2012; pp. 1–8. [Google Scholar]
- Zeng, B.; Zhao, L. Solving two-stage robust optimization problems using a column-and-constraint generation method. Oper. Res. Lett. 2013, 41, 457–461. [Google Scholar] [CrossRef]
- Ruiz, C.; Conejo, A.J. Robust transmission expansion planning. Eur. J. Oper. Res. 2015, 242, 390–401. [Google Scholar] [CrossRef]
- Lorca, A.; Sun, X.A. Adaptive robust optimization with dynamic uncertainty sets for multi-period economic dispatch under significant wind. IEEE Trans. Power Syst. 2015, 30, 1702–1713. [Google Scholar] [CrossRef]
- Huang, S.; Dinavahi, V. A comparison of implicit and explicit methods for contingency constrained unit commitment. In Proceedings of the 2017 North American Power Symposium (NAPS), Morgantown, WV, USA, 17–19 September 2017; pp. 1–6. [Google Scholar]
- Lee, C.; Liu, C.; Mehrotra, S.; Bie, Z. Robust Distribution Network Reconfiguration. IEEE Trans. Smart Grid 2015, 6, 836–842. [Google Scholar] [CrossRef]
- Costa, A.; Georgiadis, D.; Ng, T.S.; Sim, M. An optimization model for power grid fortification to maximize attack immunity. Int. J. Electr. Power Energy Syst. 2018, 99, 594–602. [Google Scholar] [CrossRef]
- Ouyang, M.; Xu, M.; Zhang, C.; Huang, S. Mitigating electric power system vulnerability to worst-case spatially localized attacks. Reliab. Eng. Syst. Saf. 2017, 165, 144–154. [Google Scholar] [CrossRef]
- Wu, X.; Conejo, A.J. An efficient tri-level optimization model for electric grid defense planning. IEEE Trans. Power Syst. 2017, 32, 2984–2994. [Google Scholar] [CrossRef]
- Bertsimas, D.; Brown, D.B.; Caramanis, C. Theory and applications of robust optimization. SIAM Rev. 2011, 53, 464–501. [Google Scholar] [CrossRef]
- Zimmerman, R.D.; Murillo-Sanchez, C.E.; Thomas, R.J. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education. IEEE Trans. Power Syst. 2011, 26, 12–19. [Google Scholar] [CrossRef] [Green Version]
- Löfberg, J. YALMIP: A Toolbox for Modeling and Optimization in MATLAB. In Proceedings of the 2004 IEEE International Conference on Robotics and Automation, New Orleans, LA, USA, 2–4 September 2004; pp. 284–289. [Google Scholar]
Explanation | |||
---|---|---|---|
0 | 0 | Line is neither hidden nor attacked. | |
0 | 1 | 0 | Line is attacked. |
1 | 0 | Line is hidden. | |
1 | 1 | Line is hidden and attacked. |
Bus No. | Generation (MW) | Load (MW) | Bus No. | Generation (MW) | Load (MW) |
---|---|---|---|---|---|
1 | 180 | 0 | 4 | 0 | 70 |
2 | 150 | 0 | 5 | 0 | 70 |
3 | 0 | 70 | 6 | 0 | 80 |
From–To | Reactance (p.u.) | Capacity (MW) | From–To | Reactance (p.u.) | Capacity (MW) |
---|---|---|---|---|---|
1–2 | 0.20 | 80 | 2–4 | 0.10 | 120 |
1–5 | 0.30 | 120 | 3–4 | 0.26 | 80 |
1–6 | 0.30 | 80 | 4–5 | 0.40 | 80 |
2–3 | 0.25 | 80 | 5–6 | 0.30 | 60 |
Attack Plans | Node Power Imbalance (MW) | System Power Imbalance (MW) |
---|---|---|
1–6 | 20 | |
1–6 & 1–2 | 20 | |
1–6 & 3–4 | 20 | |
1–6 & 4–5 | , | 30 |
1–6 & 5–6 | 80 | |
Average | 34 |
Power Imbalance (MW) | |||||||||
---|---|---|---|---|---|---|---|---|---|
0.00, D | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00, C | ||
66.96 | 48.42 | 46.13 | 41.93 | 41.61 | 31.04 | 17.67 | 14.23 | ||
115.29 | 104.52 | 99.75 | 90.70 | 79.51 | 51.73 | 46.02 | 39.00 | ||
Protection | 171.23 | 162.78 | 148.01 | 131.82 | 108.05 | 77.23 | 65.73 | 55.47 | |
Strategy | 226.82 | 219.86 | 200.78 | 158.60 | 123.24 | 114.65 | 81.91 | 81.11 | |
295.74 | 274.45 | 228.60 | 187.60 | 167.58 | 138.34 | 114.43 | 100.10 | ||
305.60 | 297.60 | 257.60 | 221.68 | 180.13 | 162.60 | 143.93 | 131.02 | ||
376.6, A | 327.80 | 279.60 | 236.60 | 212.44 | 188.80 | 168.47 | 151.9, B | ||
0.00, D | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00, C | ||
66.96 | 46.13 | 41.61 | 41.61 | 31.04 | 3.68 | 3.68 | 0.00 | ||
115.29 | 104.52 | 90.83 | 79.51 | 35.63 | 35.63 | 24.96 | 3.68 | ||
Deception | 171.23 | 159.35 | 147.20 | 95.35 | 85.53 | 58.00 | 34.16 | 14.02 | |
Strategy | 226.82 | 219.86 | 153.60 | 145.60 | 109.76 | 70.31 | 35.84 | 40.29 | |
295.74 | 226.60 | 221.60 | 172.80 | 124.15 | 70.31 | 38.34 | 41.23 | ||
305.60 | 297.60 | 248.80 | 185.80 | 124.15 | 70.86 | 48.38 | 44.34 | ||
376.6, A | 324.80 | 261.80 | 185.80 | 125.20 | 79.72 | 69.61 | 46.72, B |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jiang, P.; Huang, S.; Zhang, T. Optimal Deception Strategies in Power System Fortification against Deliberate Attacks. Energies 2019, 12, 342. https://doi.org/10.3390/en12030342
Jiang P, Huang S, Zhang T. Optimal Deception Strategies in Power System Fortification against Deliberate Attacks. Energies. 2019; 12(3):342. https://doi.org/10.3390/en12030342
Chicago/Turabian StyleJiang, Peng, Shengjun Huang, and Tao Zhang. 2019. "Optimal Deception Strategies in Power System Fortification against Deliberate Attacks" Energies 12, no. 3: 342. https://doi.org/10.3390/en12030342