Optimal power grid protection through a defender-attacker-defender model

نویسندگان

  • Wei Yuan
  • Long Zhao
  • Bo Zeng
چکیده

Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender-attacker-defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attacker-defender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defender-attacker-defender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achieving Cost-Effective Power Grid Hardening through Transmission Network Topology Control

Vulnerability of power grid is a critical issue in power industry. In order to understand and reduce power grid vulnerability under threats, existing research often employs defender-attacker-defender (DAD) models to derive effective protection plans and evaluate grid performances under various contingencies. Transmission line switching (also known as topology control) is an effective operation ...

متن کامل

Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility

W e present a game-theoretic model to explore how uncertainty about terrorist preferences can affect optimal resource allocations for infrastructure protection. We consider a dynamic game with incomplete information , in which the defender chooses how to allocate her defensive resources, and then an attacker chooses which target to attack according to a multiattribute utility function. Our mode...

متن کامل

Jamming Attack in Smart Grid with Dynamic Gaming Theory

As the current power grid system is upgrading to smart grid, it becomes more vulnerable to security attacks such as Denial-of-Service attacks. One type of such attacks is jamming attack. In this paper, we analyze the scenario in which the attacker can jam specific signal channels in order to change the electricity prices to create the opportunity for profit, and the defender protect a limited n...

متن کامل

Preventive Strike vs. False Targets in Defense Strategy

Abstract: A defender allocates its resource between defending an object passively by deploying false targets, and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender allocates its entire resource to deploying false targets, which the attacker cannot distinguish from the genuine object. If the defender strikes preventively, the attacker...

متن کامل

Optimal Deceptive Strategies in Security Games: A Preliminary Study

Attacker-defender Stackelberg games have been used in several deployed applications of game theory for infrastructure security. Security resources of the defender are game-theoretically allocated to prevent a strategic attacker from using surveillance to learn and exploit patterns in the allocation. Existing work on security games assumes that the defender honestly displays her real security re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Rel. Eng. & Sys. Safety

دوره 121  شماره 

صفحات  -

تاریخ انتشار 2014