Security games for voltage control in smart grid

Information and communication technologies bring significant improvements to power grid and help building a “smart grid”. At the same time, they cause novel vulnerabilities making the power grid, which is a critical infrastructure, susceptible to malicious cyber attacks such as false data injection. This paper develops a game-theoretic approach to smart grid security by combining quantitative risk concepts with decision making on protective measures. Specifically, the interaction between malicious attackers and grid defense systems is modeled as a security game, where the attackers choose the intensity of false data injection and defenders determine the detection threshold level. The consequences of data injection attacks are quantified using a risk assessment process based on realistic system simulations. The simulation results are used as an input to a stochastic game model, where the decisions on defensive measures are made taking into account resource constraints represented by cost values. Thus, security games provide a framework for choosing the best response strategies against attackers in order to minimize potential risks. The framework developed is also useful to analyse different types of attacks and defensive measures. The theoretical results obtained are demonstrated using numerical examples.

[1]  Pravin Varaiya,et al.  Smart Operation of Smart Grid: Risk-Limiting Dispatch , 2011, Proceedings of the IEEE.

[2]  Tansu Alpcan,et al.  Network Security , 2010 .

[3]  J.J. Paserba,et al.  Secondary voltage-VAr controls applied to static compensators (STATCOMs) for fast voltage control and long term VAr management , 2002, IEEE Power Engineering Society Summer Meeting,.

[4]  Chen-Ching Liu,et al.  Risk Analysis of Coordinated Cyber Attacks on Power Grid , 2012 .

[5]  Douglas W. Hubbard,et al.  The Failure of Risk Management: Why It's Broken and How to Fix It , 2009 .

[6]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[7]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[8]  Richard Kissel,et al.  Glossary of Key Information Security Terms , 2014 .

[9]  G. Manimaran,et al.  Data integrity attack and its impacts on voltage control loop in power grid , 2011, 2011 IEEE Power and Energy Society General Meeting.

[10]  Jack Wiles Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure , 2008 .

[11]  Deepa Kundur,et al.  Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.

[12]  Wenxia Liu,et al.  Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM , 2010, IEEE Transactions on Power Delivery.

[13]  Thierry Van Cutsem,et al.  Voltage Stability of Electric Power Systems , 1998 .

[14]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[15]  John Lygeros,et al.  A robust policy for Automatic Generation Control cyber attack in two area power network , 2010, 49th IEEE Conference on Decision and Control (CDC).

[16]  Matthew Leitch,et al.  ISO 31000:2009—The New International Standard on Risk Management , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[17]  L. Nordstrom,et al.  Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams , 2009, IEEE Transactions on Power Delivery.

[18]  Tansu Alpcan,et al.  Security Risk Management via Dynamic Games with Learning , 2011, 2011 IEEE International Conference on Communications (ICC).

[19]  Tansu Alpcan,et al.  Dynamic Control and Mitigation of Interdependent IT Security Risks , 2010, 2010 IEEE International Conference on Communications.

[20]  R. Belmans,et al.  Penetration level of distributed energy resources with anti-islanding criteria and secure operation of power system , 2006, 2006 IEEE Power Engineering Society General Meeting.

[21]  G. Manimaran,et al.  Cyber Attack Exposure Evaluation Framework for the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[22]  Xiao-Ping Zhang,et al.  Flexible AC Transmission Systems: Modelling and Control , 2006 .

[23]  G. Sybille,et al.  Modeling and simulation of a distribution STATCOM using Simulink's Power System Blockset , 2001, IECON'01. 27th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.37243).

[24]  Marimuthu Palaniswami,et al.  Security Games and Risk Minimization for Automatic Generation Control in Smart Grid , 2012, GameSec.

[25]  T. Van Cutsem,et al.  Undervoltage load shedding scheme for the Hydro-Quebec system , 2004, IEEE Power Engineering Society General Meeting, 2004..

[26]  P. Kundur,et al.  Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions , 2004, IEEE Transactions on Power Systems.

[27]  Jason Stamp,et al.  Reliability impacts from cyber attack on electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.