IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v12y2019i3p342-d200028.html
   My bibliography  Save this article

Optimal Deception Strategies in Power System Fortification against Deliberate Attacks

Author

Listed:
  • Peng Jiang

    (College of Systems Engineering, National University of Defense Technology, Changsha 410073, China
    Energy Internet Research Center, China Aerospace Science and Technology Corporation, Beijing 100048, China)

  • Shengjun Huang

    (College of Systems Engineering, National University of Defense Technology, Changsha 410073, China)

  • Tao Zhang

    (College of Systems Engineering, National University of Defense Technology, Changsha 410073, China
    State Key Laboratory of High Performance Computing, National University of Defense Technology, Changsha 410073, China)

Abstract

As a critical infrastructure, the modern electrical network is faced with various types of threats, such as accidental natural disaster attacks and deliberate artificial attacks, thus the power system fortification has attracted great concerns in the community of academic, industry, and military. Nevertheless, the attacker is commonly assumed to be capable of accessing all information in the literature (e.g., network configuration and defensive plan are explicitly provided to the attacker), which might always be the truth since the grid data access permission is usually restricted. In this paper, the information asymmetry between defender and attacker is investigated, leading to an optimal deception strategy problem for power system fortification. Both the proposed deception and traditional protection strategies are formulated as a tri-level mixed-integer linear programming (MILP) problem and solved via two-stage robust optimization (RO) framework and the column-and-constraint generation (CCG) algorithm. Comprehensive case studies on the 6-bus system and IEEE 57-bus system are implemented to reveal the difference between these two strategies and identify the significance of information deception. Numerical results indicate that deception strategy is superior to protection strategy. In addition, detailed discussions on the performance evaluation and convergence analysis are presented as well.

Suggested Citation

  • Peng Jiang & Shengjun Huang & Tao Zhang, 2019. "Optimal Deception Strategies in Power System Fortification against Deliberate Attacks," Energies, MDPI, vol. 12(3), pages 1-20, January.
  • Handle: RePEc:gam:jeners:v:12:y:2019:i:3:p:342-:d:200028
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/12/3/342/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/12/3/342/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Ding, Tao & Yao, Li & Li, Fangxing, 2018. "A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 179-186.
    2. Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
    3. Ruiz, C. & Conejo, A.J., 2015. "Robust transmission expansion planning," European Journal of Operational Research, Elsevier, vol. 242(2), pages 390-401.
    4. Ziqi Wang & Jinghan He & Alexandru Nechifor & Dahai Zhang & Peter Crossley, 2017. "Identification of Critical Transmission Lines in Complex Power Networks," Energies, MDPI, vol. 10(9), pages 1-19, August.
    5. Lai, Kexing & Illindala, Mahesh & Subramaniam, Karthikeyan, 2019. "A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment," Applied Energy, Elsevier, vol. 235(C), pages 204-218.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Fakhry, Ramy & Hassini, Elkafi & Ezzeldin, Mohamed & El-Dakhakhni, Wael, 2022. "Tri-level mixed-binary linear programming: Solution approaches and application in defending critical infrastructure," European Journal of Operational Research, Elsevier, vol. 298(3), pages 1114-1131.
    2. Omid Sadeghian & Behnam Mohammadi-Ivatloo & Fazel Mohammadi & Zulkurnain Abdul-Malek, 2022. "Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review," Sustainability, MDPI, vol. 14(19), pages 1-24, September.
    3. Rasa Smaliukiene & Gintaras Labutis & Ausrius Juozapavicius, 2020. "Pro-Environmental Energy Behavior in the Military: Assessing Behavior Change Factors at a Selected Military Unit," Energies, MDPI, vol. 13(1), pages 1-12, January.
    4. Peng Jiang & Shengjun Huang & Tao Zhang, 2020. "Asymmetric Information in Military Microgrid Confrontations—Evaluation Metric and Influence Analysis," Energies, MDPI, vol. 13(8), pages 1-21, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bellè, Andrea & Abdin, Adam F. & Fang, Yi-Ping & Zeng, Zhiguo & Barros, Anne, 2023. "A resilience-based framework for the optimal coupling of interdependent critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 237(C).
    2. Bellè, Andrea & Abdin, Adam F. & Fang, Yi-Ping & Zeng, Zhiguo & Barros, Anne, 2023. "A data-driven distributionally robust approach for the optimal coupling of interdependent critical infrastructures under random failures," European Journal of Operational Research, Elsevier, vol. 309(2), pages 872-889.
    3. Hasanzad, Fardin & Rastegar, Hasan, 2022. "Application of optimal hardening for improving resilience of integrated power and natural gas system in case of earthquake," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    4. Baringo, Luis & Boffino, Luigi & Oggioni, Giorgia, 2020. "Robust expansion planning of a distribution system with electric vehicles, storage and renewable units," Applied Energy, Elsevier, vol. 265(C).
    5. Fauzan Hanif Jufri & Jun-Sung Kim & Jaesung Jung, 2017. "Analysis of Determinants of the Impact and the Grid Capability to Evaluate and Improve Grid Resilience from Extreme Weather Event," Energies, MDPI, vol. 10(11), pages 1-17, November.
    6. Peng, Rui & Wu, Di & Xiao, Hui & Xing, Liudong & Gao, Kaiye, 2019. "Redundancy versus protection for a non-reparable phased-mission system subject to external impacts," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    7. Grimm, Veronika & Schewe, Lars & Schmidt, Martin & Zöttl, Gregor, 2017. "Uniqueness of market equilibrium on a network: A peak-load pricing approach," European Journal of Operational Research, Elsevier, vol. 261(3), pages 971-983.
    8. Zou, Qiling & Chen, Suren, 2019. "Enhancing resilience of interdependent traffic-electric power system," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    9. Jinwoo Jeong & Heewon Shin & Hwachang Song & Byongjun Lee, 2018. "A Countermeasure for Preventing Flexibility Deficit under High-Level Penetration of Renewable Energies: A Robust Optimization Approach," Sustainability, MDPI, vol. 10(11), pages 1-16, November.
    10. Zhao, Bo & Ren, Junzhi & Chen, Jian & Lin, Da & Qin, Ruwen, 2020. "Tri-level robust planning-operation co-optimization of distributed energy storage in distribution networks with high PV penetration," Applied Energy, Elsevier, vol. 279(C).
    11. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    12. Skolfield, J. Kyle & Escobedo, Adolfo R., 2022. "Operations research in optimal power flow: A guide to recent and emerging methodologies and applications," European Journal of Operational Research, Elsevier, vol. 300(2), pages 387-404.
    13. Yan, Chao & Geng, Xinbo & Bie, Zhaohong & Xie, Le, 2022. "Two-stage robust energy storage planning with probabilistic guarantees: A data-driven approach," Applied Energy, Elsevier, vol. 313(C).
    14. Chen, Cong & Sun, Hongbin & Shen, Xinwei & Guo, Ye & Guo, Qinglai & Xia, Tian, 2019. "Two-stage robust planning-operation co-optimization of energy hub considering precise energy storage economic model," Applied Energy, Elsevier, vol. 252(C), pages 1-1.
    15. Antonio J. Conejo & Nicholas G. Hall & Daniel Zhuoyu Long & Runhao Zhang, 2021. "Robust Capacity Planning for Project Management," INFORMS Journal on Computing, INFORMS, vol. 33(4), pages 1533-1550, October.
    16. Ambrosius, M. & Egerer, J. & Grimm, V. & Weijde, A.H. van der, 2020. "Uncertain bidding zone configurations: The role of expectations for transmission and generation capacity expansion," European Journal of Operational Research, Elsevier, vol. 285(1), pages 343-359.
    17. Li, Tao & Rong, Lili & Yan, Kesheng, 2019. "Vulnerability analysis and critical area identification of public transport system: A case of high-speed rail and air transport coupling system in China," Transportation Research Part A: Policy and Practice, Elsevier, vol. 127(C), pages 55-70.
    18. Li, Qing & Li, Mingchu & Tian, Yuan & Gan, Jianyuan, 2023. "A risk-averse tri-level stochastic model for locating and recovering facilities against attacks in an uncertain environment," Reliability Engineering and System Safety, Elsevier, vol. 229(C).
    19. Munoz, Francisco D. & van der Weijde, Adriaan Hendrik & Hobbs, Benjamin F. & Watson, Jean-Paul, 2017. "Does risk aversion affect transmission and generation planning? A Western North America case study," Energy Economics, Elsevier, vol. 64(C), pages 213-225.
    20. Zhang, Bingying & Li, Qiqiang & Wang, Luhao & Feng, Wei, 2018. "Robust optimization for energy transactions in multi-microgrids under uncertainty," Applied Energy, Elsevier, vol. 217(C), pages 346-360.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:12:y:2019:i:3:p:342-:d:200028. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.