Security attacks on smart grid scheduling and their defences: a game-theoretic approach

The introduction of advanced communication infrastructure into the power grid raises a plethora of new opportunities to tackle climate change. This paper is concerned with the security of energy management systems which are expected to be implemented in the future smart grid. The existence of a novel class of false data injection attacks that are based on modifying forecasted demand data is demonstrated, and the impact of the attacks on a typical system’s parameters is identified, using a simulated scenario. Monitoring strategies that the utility company may employ in order to detect the attacks are proposed, and a game-theoretic approach is used to support the utility company’s decision-making process for the allocation of their defence resources. Informed by these findings, a generic security game is devised and solved, revealing the existence of several Nash equilibrium strategies. The practical outcomes of these results for the utility company are discussed in detail, and a proposal is made, suggesting how the generic model may be applied to other scenarios.

[1]  N. Panwar,et al.  Role of renewable energy sources in environmental protection: A review , 2011 .

[2]  Mehmet Necip Kurt,et al.  Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid , 2018, IEEE Transactions on Information Forensics and Security.

[3]  D. Avis,et al.  Enumeration of Nash equilibria for two-player games , 2010 .

[4]  Danda B. Rawat,et al.  Cyber security for smart grid systems: Status, challenges and perspectives , 2015, SoutheastCon 2015.

[5]  Abbe E. Forman,et al.  Smart Grid , 2013, Int. J. E Politics.

[6]  Robert Schober,et al.  Optimal and autonomous incentive-based energy consumption scheduling algorithm for smart grid , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[7]  Deepa Kundur,et al.  A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.

[8]  C.W. Gellings,et al.  The concept of demand-side management for electric utilities , 1985, Proceedings of the IEEE.

[9]  Farrokh Albuyeh,et al.  Grid of the future , 2009, IEEE Power and Energy Magazine.

[10]  Quanyan Zhu,et al.  Decision and Game Theory for Security , 2016, Lecture Notes in Computer Science.

[11]  Walid Saad,et al.  Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective , 2016, IEEE Transactions on Smart Grid.

[12]  Walid Saad,et al.  Game-Theoretic Methods for the Smart Grid: An Overview of Microgrid Systems, Demand-Side Management, and Smart Grid Communications , 2012, IEEE Signal Processing Magazine.

[13]  David Brumley,et al.  How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).

[14]  John S. Baras,et al.  Decision and Game Theory for Security , 2010, Lecture Notes in Computer Science.

[15]  H. T. Mouftah,et al.  User-Aware Game Theoretic Approach for Demand Management , 2015, IEEE Transactions on Smart Grid.

[16]  G. A. Dhomane,et al.  Smart Grid , 2021, Virtual Power Plant System Integration Technology.

[17]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[18]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[19]  Yogesh K. Bichpuriya,et al.  Combining forecasts in short term load forecasting: Empirical analysis and identification of robust forecaster , 2016 .

[20]  Florian Skopik,et al.  Improved software vulnerability patching techniques using CVSS and game theory , 2017, 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security).

[21]  Jean-Christophe Nebel,et al.  A Practical Approach to Energy Scheduling: A Game Worth Playing? , 2018, 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).

[22]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[23]  Nei Kato,et al.  A survey of game theoretic approaches in smart grid , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[24]  1 What Is Game Theory Trying to Accomplish ? , 1985 .

[25]  Song Tan,et al.  Survey of Security Advances in Smart Grid: A Data Driven Approach , 2017, IEEE Communications Surveys & Tutorials.

[26]  R. Aumann,et al.  Epistemic Conditions for Nash Equilibrium , 1995 .

[27]  Alberto Leon-Garcia,et al.  Game-Theoretic Demand-Side Management With Storage Devices for the Future Smart Grid , 2014, IEEE Transactions on Smart Grid.

[28]  Athanasios V. Vasilakos,et al.  Secure Smart Homes , 2017, ACM Comput. Surv..

[29]  Jie Xu,et al.  Real-Time Energy Storage Management for Renewable Integration in Microgrid: An Off-Line Optimization Approach , 2015, IEEE Transactions on Smart Grid.

[30]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[31]  Wei Wang,et al.  A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.

[32]  Gerhard Weiss,et al.  Multiagent Systems , 1999 .

[33]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[34]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[35]  Luluwah Al-Fagih,et al.  A Dynamic Game Approach for Demand-Side Management: Scheduling Energy Storage with Forecasting Errors , 2018, Dynamic Games and Applications.

[36]  Marimuthu Palaniswami,et al.  Security Games for Risk Minimization in Automatic Generation Control , 2015, IEEE Transactions on Power Systems.

[37]  Lingfeng Wang,et al.  A game-theoretic study of load redistribution attack and defense in power systems , 2017 .

[38]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[39]  Luluwah Al-Fagih,et al.  Recent Advances in Local Energy Trading in the Smart Grid Based on Game-Theoretic Approaches , 2017, IEEE Transactions on Smart Grid.

[40]  Rong Zheng,et al.  Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.

[41]  Chris Hankin,et al.  Cybersecurity Games and Investments: A Decision Support Approach , 2014, GameSec.

[42]  Peter Palensky,et al.  Demand Side Management: Demand Response, Intelligent Energy Systems, and Smart Loads , 2011, IEEE Transactions on Industrial Informatics.

[43]  Vincent W. S. Wong,et al.  Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid , 2010, IEEE Transactions on Smart Grid.

[44]  Tansu Alpcan,et al.  Network Security , 2010 .

[45]  Honwing Ngan,et al.  Power System Optimization: Large-scale Complex Systems Approaches , 2016 .

[46]  Xinyu Yang,et al.  A Game-Theoretic Model on Coalitional Attacks in Smart Grid , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[47]  Quanyan Zhu,et al.  Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.

[48]  Svetlana Boudko,et al.  An evolutionary game for integrity attacks and defences for advanced metering infrastructure , 2018, ECSA.

[49]  Maria Domenica Di Benedetto,et al.  Cyber-Physical Systems Security: a Systematic Mapping Study , 2016, J. Syst. Softw..

[50]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[51]  Luluwah Al-Fagih,et al.  Energy Storage Scheduling with an Advanced Battery Model: A Game–Theoretic Approach , 2017 .