Robust and Scalable Game-Theoretic Security Investment Methods for Voltage Stability of Power Systems

Lu An, Pratishtha Shukla, Aranya Chakrabortty, Alexandra Duel-Hallen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We develop investment approaches to secure electric power systems against load attacks where a malicious intruder (the attacker) covertly changes reactive power setpoints of loads to push the grid towards voltage instability while the system operator (the defender) employs reactive power compensation (RPC) to prevent instability. Extending our previously reported Stackelberg game formulation for this problem, we develop a robust-defense sequential algorithm and a novel genetic algorithm that provides scalability to large-scale power system models. The proposed methods are validated using IEEE prototype power system models with time-varying load uncertainties, demonstrating that reliable and robust defense is feasible unless the operator's RPC investment resources are severely limited relative to the attacker's resources.

Original languageEnglish
Title of host publication2023 62nd IEEE Conference on Decision and Control, CDC 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages7061-7066
Number of pages6
ISBN (Electronic)9798350301243
DOIs
StatePublished - 2023
Event62nd IEEE Conference on Decision and Control, CDC 2023 - Singapore, Singapore
Duration: Dec 13 2023Dec 15 2023

Publication series

NameProceedings of the IEEE Conference on Decision and Control
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Conference

Conference62nd IEEE Conference on Decision and Control, CDC 2023
Country/TerritorySingapore
CitySingapore
Period12/13/2312/15/23

Keywords

  • Game Theory
  • Load attacks
  • Power Systems
  • Robust defense
  • Security investment
  • Voltage stability

Fingerprint

Dive into the research topics of 'Robust and Scalable Game-Theoretic Security Investment Methods for Voltage Stability of Power Systems'. Together they form a unique fingerprint.

Cite this