Power system resilience through defender-attacker-defender models with uncertainty: an overview

Making a power system more operationally resilient to disruption is an important and hard problem. Modeling decisions must include careful consideration of the interaction between system defenders and potential disruptors, the complex operational nature of the system, and the availability and uncertainty of information. Multi-level optimization defender-attacker-defender models are a suitable choice here since they can express such considerations, quantify resilience, and output prescriptive decisions for reaching resilience. In this paper, we review such models employed by power systems applications, with the aim of demonstrating accessibility and applicability of various formulations. In particular, we highlight modeling choices and assumptions, algorithmic details, and where uncertainty is captured or can be injected within a model.

[1]  Gerald G. Brown,et al.  Solving Defender-Attacker-Defender Models for Infrastructure Defense , 2011, ICS 2011.

[2]  J. Cole Smith,et al.  A survey of network interdiction models and algorithms , 2020, Eur. J. Oper. Res..

[3]  Gerald G. Brown,et al.  Operational Models of Infrastructure Resilience , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[4]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[5]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[6]  J. Harsanyi Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .

[7]  José Fortuny-Amat,et al.  A Representation and Economic Interpretation of a Two-Level Programming Problem , 1981 .

[8]  Mojtaba Shivaie,et al.  A vulnerability-constrained quad-level model for coordination of generation and transmission expansion planning under seismic- and terrorist-induced events , 2020 .

[9]  Long Zhao,et al.  Solving two-stage robust optimization problems using a column-and-constraint generation method , 2013, Oper. Res. Lett..

[10]  Kalyanmoy Deb,et al.  A Review on Bilevel Optimization: From Classical to Evolutionary Approaches and Applications , 2017, IEEE Transactions on Evolutionary Computation.

[11]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[12]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[13]  Gerald G. Brown,et al.  Assessing and Improving Operational Resilience of Critical Infrastructures and Other Systems , 2014 .

[14]  Zhong Chen,et al.  Pessimistic Bilevel Optimization: A Survey , 2018, Int. J. Comput. Intell. Syst..

[15]  Melvyn Sim,et al.  The Price of Robustness , 2004, Oper. Res..

[16]  Bo An,et al.  GUARDS and PROTECT: next generation applications of security games , 2011, SECO.

[17]  Antonio J. Conejo,et al.  Robust Security Constrained ACOPF via Conic Programming: Identifying the Worst Contingencies , 2018, IEEE Transactions on Power Systems.

[18]  Xu Andy Sun,et al.  Adaptive Robust Optimization for the Security Constrained Unit Commitment Problem , 2013, IEEE Transactions on Power Systems.

[19]  Hiroshi Konno,et al.  A cutting plane algorithm for solving bilinear programs , 1976, Math. Program..

[20]  André Bardow,et al.  Robust multi-objective optimization for sustainable design of distributed energy supply systems , 2017, Comput. Chem. Eng..

[21]  Mingjian Cui,et al.  Multilevel Programming-Based Coordinated Cyber Physical Attacks and Countermeasures in Smart Grid , 2019, IEEE Access.

[22]  Yaoguang Hu,et al.  Multilevel decision-making: A survey , 2016, Inf. Sci..

[23]  A. Ruszczynski Stochastic Programming Models , 2003 .

[24]  Javier Salmerón,et al.  Deception tactics for network interdiction: A multiobjective approach , 2012, Networks.

[25]  Xiaojun Shan,et al.  A game-theoretic approach to modeling attacks and defenses of smart grids at three levels , 2020, Reliab. Eng. Syst. Saf..

[26]  Ross Baldick,et al.  Research on Resilience of Power Systems Under Natural Disasters—A Review , 2016, IEEE Transactions on Power Systems.

[27]  Constantine Caramanis,et al.  Theory and Applications of Robust Optimization , 2010, SIAM Rev..

[28]  Abdullah Abusorrah,et al.  Minimax-Regret Robust Defensive Strategy Against False Data Injection Attacks , 2019, IEEE Transactions on Smart Grid.

[29]  Antonio J. Conejo,et al.  Robust Transmission Expansion Planning Representing Long- and Short-Term Uncertainty , 2018, IEEE Transactions on Power Systems.

[30]  Arnab Bhattacharya,et al.  Learning and Information Manipulation: Repeated Hypergames for Cyber-Physical Security , 2020, IEEE Control Systems Letters.

[31]  Rigg Nj A storm to remember. , 2002 .

[32]  Jason R. W. Merrick,et al.  Stochastic network interdiction with incomplete preference , 2018, Networks.

[33]  Heinrich von Stackelberg Grundlagen einer reinen Kostentheorie , 1932 .

[34]  Nancy J Rigg A storm to remember. , 2002, Emergency medical services.

[35]  R. Alvarez,et al.  Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[36]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[37]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..