IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v94y2009i6p1087-1094.html
   My bibliography  Save this article

Assessment of information impacts in power system security against malicious attacks in a general framework

Author

Listed:
  • Bompard, E.
  • Napoli, R.
  • Xue, F.

Abstract

In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios.

Suggested Citation

  • Bompard, E. & Napoli, R. & Xue, F., 2009. "Assessment of information impacts in power system security against malicious attacks in a general framework," Reliability Engineering and System Safety, Elsevier, vol. 94(6), pages 1087-1094.
  • Handle: RePEc:eee:reensy:v:94:y:2009:i:6:p:1087-1094
    DOI: 10.1016/j.ress.2009.01.002
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832009000179
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2009.01.002?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Patterson, S.A. & Apostolakis, G.E., 2007. "Identification of critical locations across multiple infrastructures for terrorist actions," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1183-1203.
    2. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    3. Balducelli, C. & Bologna, S. & Lavalle, L. & Vicoli, G., 2007. "Safeguarding information intensive critical infrastructures against novel types of emerging failures," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1218-1229.
    4. Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
    5. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    6. Zio, E., 2009. "Reliability engineering: Old problems and new challenges," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 125-141.
    7. Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
    8. Bier, Vicki M. & Gratz, Eli R. & Haphuriwat, Naraphorn J. & Magua, Wairimu & Wierzbicki, Kevin R., 2007. "Methodology for identifying near-optimal interdiction strategies for a power transmission system," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1155-1161.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. D. Thorleuchter & D. Van Den Poel, 2012. "Improved Multilevel Security with Latent Semantic Indexing," Working Papers of Faculty of Economics and Business Administration, Ghent University, Belgium 12/811, Ghent University, Faculty of Economics and Business Administration.
    2. Wang, Shuliang & Zhang, Jianhua & Yue, Xin, 2018. "Multiple robustness assessment method for understanding structural and functional characteristics of the power network," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 510(C), pages 261-270.
    3. Ouyang, Min, 2014. "Review on modeling and simulation of interdependent critical infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 43-60.
    4. Hong, Liu & Ouyang, Min & Peeta, Srinivas & He, Xiaozheng & Yan, Yongze, 2015. "Vulnerability assessment and mitigation for the Chinese railway system under floods," Reliability Engineering and System Safety, Elsevier, vol. 137(C), pages 58-68.
    5. Hong, Liu & Yan, Yongze & Ouyang, Min & Tian, Hui & He, Xiaozheng, 2017. "Vulnerability effects of passengers' intermodal transfer distance preference and subway expansion on complementary urban public transportation systems," Reliability Engineering and System Safety, Elsevier, vol. 158(C), pages 58-72.
    6. Ouyang, Min & Pan, ZheZhe & Hong, Liu & He, Yue, 2015. "Vulnerability analysis of complementary transportation systems with applications to railway and airline systems in China," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 248-257.
    7. Gao, Guibing & Wang, Junshen & Yue, Wenhui & Ou, Wenchu, 2020. "Structural-vulnerability assessment of reconfigurable manufacturing system based on universal generating function," Reliability Engineering and System Safety, Elsevier, vol. 203(C).
    8. Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
    9. Guibing, Gao & Wenhui, Yue & Wenchu, Ou & Hao, Tang, 2018. "Vulnerability evaluation method applied to manufacturing systems," Reliability Engineering and System Safety, Elsevier, vol. 180(C), pages 255-265.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Fang, Yiping & Sansavini, Giovanni, 2017. "Optimizing power system investments and resilience against attacks," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 161-173.
    2. Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
    3. Yuan, Wei & Zhao, Long & Zeng, Bo, 2014. "Optimal power grid protection through a defender–attacker–defender model," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 83-89.
    4. Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
    5. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    6. R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
    7. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    8. Paola Cappanera & Maria Paola Scaparra, 2011. "Optimal Allocation of Protective Resources in Shortest-Path Networks," Transportation Science, INFORMS, vol. 45(1), pages 64-80, February.
    9. Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
    10. Talarico, Luca & Reniers, Genserik & Sörensen, Kenneth & Springael, Johan, 2015. "MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries," Reliability Engineering and System Safety, Elsevier, vol. 138(C), pages 105-114.
    11. Hausken, Kjell & Levitin, Gregory, 2009. "Minmax defense strategy for complex multi-state systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 577-587.
    12. Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
    13. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    14. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    15. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    16. Daniel G. Arce & Dan Kovenock J. & Brian Roberson, 2009. "Suicide Terrorism and the Weakest Link," CESifo Working Paper Series 2753, CESifo.
    17. Ben Yaghlane, Asma & Azaiez, M. Naceur, 2017. "Systems under attack-survivability rather than reliability: Concept, results, and applications," European Journal of Operational Research, Elsevier, vol. 258(3), pages 1156-1164.
    18. Dan Kovenock & Brian Roberson, 2018. "The Optimal Defense Of Networks Of Targets," Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
    19. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    20. Kjell Hausken & Gregory Levitin, 2008. "Efficiency of Even Separation of Parallel Elements with Variable Contest Intensity," Risk Analysis, John Wiley & Sons, vol. 28(5), pages 1477-1486, October.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:94:y:2009:i:6:p:1087-1094. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.