Cascading Failure Attacks in the Power System: A Stochastic Game Perspective

Electric power systems are critical infrastructure and are vulnerable to contingencies including natural disasters, system errors, malicious attacks, etc. These contingencies can affect the world’s economy and cause great inconvenience to our daily lives. Therefore, security of power systems has received enormous attention for decades. Recently, the development of the Internet of Things (IoT) enables power systems to support various network functions throughout the generation, transmission, distribution, and consumption of energy with IoT devices (such as sensors, smart meters, etc.). On the other hand, it also incurs many more security threats. Cascading failures, one of the most serious problems in power systems, can result in catastrophic impacts such as massive blackouts. More importantly, it can be taken advantage by malicious attackers to launch physical or cyber attacks on the power system. In this paper, we propose and investigate cascading failure attacks (CFAs) from a stochastic game perspective. In particular, we formulate a zero-sum stochastic attack/defense game for CFAs while considering the attack/defense costs, budget constraints, diverse load shedding costs, and dynamic states in the system. Then, we develop a Q-CFA learning algorithm that works efficiently in power systems without any a priori information. We also formally prove that the convergence of the proposed algorithm achieves a Nash equilibrium. Simulation results validate the efficacy and efficiency of the proposed scheme by comparisons with other state-of-the-art approaches.

[1]  Yasir Saleem,et al.  Internet of Things-Aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions , 2017, IEEE Access.

[2]  Ian Dobson,et al.  Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model , 2005 .

[3]  Haibo He,et al.  Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Zhejing Bao,et al.  Analysis of cascading failure in electric grid based on power flow entropy , 2009 .

[5]  Elizondo de la Garza,et al.  Hidden Failures in Protection Systems and its Impact on Power System Wide-area Disturbances , 2000 .

[6]  David K. Y. Yau,et al.  Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.

[7]  James S. Thorp,et al.  Analysis of electric power system disturbance data , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.

[8]  J. Salmeron,et al.  Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.

[9]  Bart De Schutter,et al.  A Comprehensive Survey of Multiagent Reinforcement Learning , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[10]  Benjamin A Carreras,et al.  Complex systems analysis of series of blackouts: cascading failure, critical points, and self-organization. , 2007, Chaos.

[11]  Csaba Szepesvári,et al.  A Unified Analysis of Value-Function-Based Reinforcement-Learning Algorithms , 1999, Neural Computation.

[12]  James S. Thorp,et al.  Anatomy of power system blackouts: preventive relaying strategies , 1996 .

[13]  Fei He,et al.  Cyber and physical information fusion for infrastructure protection: A game-theoretic approach , 2013 .

[14]  Michael L. Littman,et al.  Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.

[15]  Åke J. Holmgren,et al.  Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.

[16]  Peter Xiaoping Liu,et al.  Denial-of-Service (dos) attacks on load frequency control in smart grids , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[17]  Ross Baldick,et al.  Interdiction Analysis of Electric Grids Combining Cascading Outage and Medium-Term Impacts , 2014, IEEE Transactions on Power Systems.

[18]  James S. Thorp,et al.  Anatomy of power system disturbances : importance sampling , 1998 .

[19]  Zhao Yang Dong,et al.  Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks , 2011, IEEE Transactions on Power Systems.

[20]  H. T. Kung,et al.  Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[21]  J. Filar,et al.  Competitive Markov Decision Processes , 1996 .

[22]  John C. Harsanyi,et al.  Общая теория выбора равновесия в играх / A General Theory of Equilibrium Selection in Games , 1989 .

[23]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[24]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[25]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[26]  Zuyi Li,et al.  Optimal budget deployment strategy against power grid interdiction , 2013, 2013 Proceedings IEEE INFOCOM.

[27]  Michael P. Wellman,et al.  Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm , 1998, ICML.

[28]  T. E. S. Raghavan,et al.  Algorithms for stochastic games — A survey , 1991, ZOR Methods Model. Oper. Res..

[29]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[30]  Nasir Ghani,et al.  Stochastic Analysis of Cascading-Failure Dynamics in Power Grids , 2014, IEEE Transactions on Power Systems.

[31]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[32]  Sylvain Sorin,et al.  Stochastic Games and Applications , 2003 .

[33]  Haibo He,et al.  Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks , 2017, IEEE Transactions on Information Forensics and Security.

[34]  Adilson E Motter,et al.  Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[35]  A. Ashok,et al.  Cyber attacks on power system state estimation through topology errors , 2012, 2012 IEEE Power and Energy Society General Meeting.