Abstract
The power grid, on which most economic activities rely, is a critical infrastructure that must be protected against potential threats. Advanced monitoring technologies at the center of smart grid evolution increase its efficiency but also make it more susceptible to malicious attacks such as false data injection. This paper develops a game-theoretic approach to smart grid security by combining quantitative risk management with decision making on protective measures. Specifically, the consequences of data injection attacks are quantified using a risk assessment process based on simulations. Then, the quantified risks are used as an input to a stochastic game model, where the decisions on defensive measures are made taking into account resource constraints. Security games provide the framework for choosing the best response strategies against attackers in order to minimize potential risks. The theoretical results obtained are demonstrated using numerical examples.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alpcan, T., BaÅŸar, T.: Network Security: A Decision and Game Theoretic Approach. Cambridge University Press (2011)
Andersson, G.: Dynamics and control of electric power systems. Lecture notes 227-0528-00, ETH Zürich (February 2010)
Australian Government: Critical infrastructure resilience strategy (2010), http://www.tisn.gov.au/
Bevrani, H.: Robust Power System Frequency Control. Power Electronics and Power Systems. Springer Science+Business Media LLC (2009)
Bommannavar, P., Alpcan, T., Bambos, N.: Security risk management via dynamic games with learning. In: 2011 IEEE International Conference on Communications (ICC), pp. 1–6 (June 2011)
Esfahani, P.M., Vrakopoulou, M., Margellos, K., Lygeros, J., Andersson, G.: A Robust Policy for Automatic Generation Control Cyber Attack in Two Area Power Network. In: IEEE Conference on Decision and Control (December 2010)
Esfahani, P.M., Vrakopoulou, M., Margellos, K., Lygeros, J., Andersson, G.: Cyber Attack in a Two-Area Power System: Impact Identification using Reachability. In: American Control Conference, Baltimore, MD, USA (June 2010)
Hahn, A., Govindarasu, M.: Cyber attack exposure evaluation framework for the smart grid. IEEE Transactions on Smart Grid 2(4), 835–843 (2011)
Hubbard, D.W.: The Failure of Risk Management: Why It’s Broken and How to Fix It. Wiley (2009)
Kundur, D., Feng, X., Mashayekh, S., Liu, S., Zourntos, T., Butler-Purry, K.L.: Towards modelling the impact of cyber attacks on a smart grid. International Journal of Security and Networks 6(1/2011), 2–13 (2011)
Kundur, P.: Power System Stability and Control. McGraw-Hill Professional (1994)
Lefebvre, D., Bernard, S., Cutsem, T.V.: Undervoltage load shedding scheme for the Hydro-Québec system. In: IEEE Power Engineering Society General Meeting, vol. 2, pp. 1619–1624 (June 2004)
Leitch, M.: ISO 31000:2009—The New International Standard on Risk Management. Risk Analysis 30(6), 887–892 (2010)
Liu, N., Zhang, J., Zhang, H., Liu, W.: Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM. IEEE Transactions on Power Delivery 25(3), 1492–1500 (2010)
Luo, C., Far, H., Banakar, H., Keung, P.K., Ooi, B.T.: Estimation of wind penetration as limited by frequency deviation. IEEE Transactions on Energy Conversion 22(3), 783–791 (2007)
Machowski, J., Bialek, J.W., Bumby, J.R.: Power System Dynamics: Stability and Control, 2nd edn. John Wiley and Sons, Ltd (2008)
Mounzer, J., Alpcan, T., Bambos, N.: Dynamic Control and Mitigation of Interdependent IT Security Risks. In: 2010 IEEE International Conference on Communications (ICC), pp. 1–6 (May 2010)
Mullen, S.K.: Plug-In Hybrid Electric Vehicles as a Source of Distributed Frequency Regulation. Ph.D. thesis, University of Minnesota (2009)
NIST: Glossary of key information security terms. IR 7298 Revision 1 (February 2011)
Sommestad, T., Ekstedt, M., Nordstrom, L.: Modeling security of power communication systems using defense graphs and influence diagrams. IEEE Transactions on Power Delivery 24(4), 1801–1808 (2009)
Sridhar, S., Govindarasu, M., Liu, C.-C.: Risk analysis of coordinated cyber attacks on power grid. In: Control and Optimization Methods for Electric Smart Grids. Power Electronics and Power Systems, vol. 3, pp. 275–294. Springer, US (2012)
Stamp, J., McIntyre, A., Ricardson, B.: Reliability impacts from cyber attack on electric power systems. In: IEEE/PES Power Systems Conference and Exposition (PSCE 2009), pp. 1–8 (March 2009)
Ten, C.W., Liu, C.C., Manimaran, G.: Vulnerability Assessment of Cybersecurity for SCADA Systems. IEEE Trans. Power Syst. 23(4), 1836–1846 (2008)
Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 40(4), 853–865 (2010)
Varaiya, P., Wu, F., Bialek, J.: Smart operation of smart grid: Risk-limiting dispatch. Proceedings of the IEEE 99(1), 40–57 (2011)
Wu, F., Moslehi, K., Bose, A.: Power system control centers: Past, present, and future. Proceedings of the IEEE 93(11), 1890–1908 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Law, Y.W., Alpcan, T., Palaniswami, M., Dey, S. (2012). Security Games and Risk Minimization for Automatic Generation Control in Smart Grid. In: Grossklags, J., Walrand, J. (eds) Decision and Game Theory for Security. GameSec 2012. Lecture Notes in Computer Science, vol 7638. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34266-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-34266-0_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34265-3
Online ISBN: 978-3-642-34266-0
eBook Packages: Computer ScienceComputer Science (R0)