Defending mechanisms for protecting power systems against intelligent attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

24 Scopus citations

Abstract

The power system forms the backbone of a modern society, and its security is of paramount importance to nation's economy. However, the power system is vulnerable to intelligent attacks by attackers who have enough knowledge of how the power system is operated, monitored and controlled. This paper proposes a game theoretic approach to explore and evaluate strategies for the defender to protect the power systems against such intelligent attacks. First, a risk assessment is presented to quantify the physical impacts inflicted by attacks. Based upon the results of the risk assessment, this paper represents the interactions between the attacker and the defender by extending the current zero-sum game model to more generalized game models for diverse assumptions concerning the attacker's motivation. The attacker and defender's equilibrium strategies are attained by solving these game models. In addition, a numerical illustration is demonstrated to warrant the theoretical outcomes.

Original languageEnglish
Title of host publication2015 10th System of Systems Engineering Conference, SoSE 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages12-17
Number of pages6
ISBN (Electronic)9781479976119
DOIs
StatePublished - Jul 7 2015
Externally publishedYes
Event2015 10th System of Systems Engineering Conference, SoSE 2015 - San Antonio, United States
Duration: May 17 2015May 20 2015

Publication series

Name2015 10th System of Systems Engineering Conference, SoSE 2015

Conference

Conference2015 10th System of Systems Engineering Conference, SoSE 2015
Country/TerritoryUnited States
CitySan Antonio
Period05/17/1505/20/15

Keywords

  • Power system security
  • game theory
  • intelligent attacks
  • risk assessment

Fingerprint

Dive into the research topics of 'Defending mechanisms for protecting power systems against intelligent attacks'. Together they form a unique fingerprint.

Cite this