IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v169y2018icp179-186.html
   My bibliography  Save this article

A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection

Author

Listed:
  • Ding, Tao
  • Yao, Li
  • Li, Fangxing

Abstract

To handle rapidly growing threats from deliberate attacks, the critical components in power grid should be identified and protected. This paper proposed a defender–attacker–defender model to deal with power grid protection problem, in which the uncertain attacks and load types are considered. Furthermore, multiple uncertainty sets are introduced to characterize the possible realizations of disruptions caused by attackers, and the probabilities of the multiple uncertainty sets are estimated using analytic hierarchy process. Then, the problem is formulated as a multi-uncertainty-set based two-stage robust optimization model which can be termed as a mixed-integer tri-level programming and solved by column-and-constrains generation algorithm with a master-subproblem framework. The test results on a standard IEEE RTS 24-bus system show the effectiveness of the proposed model by considering multiple uncertainty sets and load types.

Suggested Citation

  • Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
  • Handle: RePEc:eee:reensy:v:169:y:2018:i:c:p:179-186
    DOI: 10.1016/j.ress.2017.08.020
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832016302563
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2017.08.020?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
    2. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    3. Ernest H. Forman & Saul I. Gass, 2001. "The Analytic Hierarchy Process---An Exposition," Operations Research, INFORMS, vol. 49(4), pages 469-486, August.
    4. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    5. Kjell Hausken & Jun Zhuang (ed.), 2015. "Game Theoretic Analysis of Congestion, Safety and Security," Springer Series in Reliability Engineering, Springer, edition 127, number 978-3-319-11674-7, February.
    6. Kjell Hausken & Jun Zhuang (ed.), 2015. "Game Theoretic Analysis of Congestion, Safety and Security," Springer Series in Reliability Engineering, Springer, edition 127, number 978-3-319-13009-5, February.
    7. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    8. Hausken, Kjell, 2006. "Income, interdependence, and substitution effects affecting incentives for security investment," Journal of Accounting and Public Policy, Elsevier, vol. 25(6), pages 629-665.
    9. Zio, E., 2009. "Reliability engineering: Old problems and new challenges," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 125-141.
    10. Reniers, Genserik & Soudan, Karel, 2010. "A game-theoretical approach for reciprocal security-related prevention investment decisions," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 1-9.
    11. Gregory Levitin & Kjell Hausken, 2012. "Resource Distribution in Multiple Attacks with Imperfect Detection of the Attack Outcome," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 304-318, February.
    12. G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
    13. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    14. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    15. Bier, Vicki M. & Gratz, Eli R. & Haphuriwat, Naraphorn J. & Magua, Wairimu & Wierzbicki, Kevin R., 2007. "Methodology for identifying near-optimal interdiction strategies for a power transmission system," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1155-1161.
    16. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Peng Jiang & Shengjun Huang & Tao Zhang, 2019. "Optimal Deception Strategies in Power System Fortification against Deliberate Attacks," Energies, MDPI, vol. 12(3), pages 1-20, January.
    2. Su, Wenjing & Blumsack, Seth & Webster, Mort, 2024. "A stochastic optimization framework to planing for geographically correlated failures in coupled natural gas and electric power systems," Reliability Engineering and System Safety, Elsevier, vol. 246(C).
    3. Chiou, Suh-Wen, 2018. "A traffic-responsive signal control to enhance road network resilience with hazmat transportation in multiple periods," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 105-118.
    4. Bellè, Andrea & Abdin, Adam F. & Fang, Yi-Ping & Zeng, Zhiguo & Barros, Anne, 2023. "A resilience-based framework for the optimal coupling of interdependent critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 237(C).
    5. Bellè, Andrea & Abdin, Adam F. & Fang, Yi-Ping & Zeng, Zhiguo & Barros, Anne, 2023. "A data-driven distributionally robust approach for the optimal coupling of interdependent critical infrastructures under random failures," European Journal of Operational Research, Elsevier, vol. 309(2), pages 872-889.
    6. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    7. Hasanzad, Fardin & Rastegar, Hasan, 2022. "Application of optimal hardening for improving resilience of integrated power and natural gas system in case of earthquake," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    8. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    9. Lai, Kexing & Illindala, Mahesh & Subramaniam, Karthikeyan, 2019. "A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment," Applied Energy, Elsevier, vol. 235(C), pages 204-218.
    10. Minhui Qian & Ning Chen & Yuge Chen & Changming Chen & Weiqiang Qiu & Dawei Zhao & Zhenzhi Lin, 2021. "Optimal Coordinated Dispatching Strategy of Multi-Sources Power System with Wind, Hydro and Thermal Power Based on CVaR in Typhoon Environment," Energies, MDPI, vol. 14(13), pages 1-35, June.
    11. Omid Sadeghian & Behnam Mohammadi-Ivatloo & Fazel Mohammadi & Zulkurnain Abdul-Malek, 2022. "Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review," Sustainability, MDPI, vol. 14(19), pages 1-24, September.
    12. Santing He & Mingchu Li & Runfa Zhang, 2024. "Signaling Security Games with Attack Planner Deception," Mathematics, MDPI, vol. 12(16), pages 1-28, August.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    2. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    3. Gao, Xing & Zhong, Weijun & Mei, Shue, 2013. "A game-theory approach to configuration of detection software with decision errors," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 35-43.
    4. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    5. Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
    6. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    7. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    8. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    9. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    10. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    11. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense And Attack For Series And Parallel Reliability Systems: Comment," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 507-515, October.
    12. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    13. Paola Cappanera & Maria Paola Scaparra, 2011. "Optimal Allocation of Protective Resources in Shortest-Path Networks," Transportation Science, INFORMS, vol. 45(1), pages 64-80, February.
    14. Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
    15. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    16. Ouyang, Min, 2017. "A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks," European Journal of Operational Research, Elsevier, vol. 262(3), pages 1072-1084.
    17. Kjell Hausken, 2012. "Game Theoretic Analysis of Standby Systems," Chapters, in: Yair Holtzman (ed.), Advanced Topics in Applied Operations Management, IntechOpen.
    18. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    19. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    20. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:169:y:2018:i:c:p:179-186. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.