期刊
IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS
卷 4, 期 4, 页码 365-373出版社
WILEY
DOI: 10.1049/iet-cps.2019.0016
关键词
scheduling; integer programming; linear programming; power engineering computing; security of data; optimisation; distributed power generation; game theory; power system management; telecommunication security; energy management systems; power system security; DNO; attacker MG; attacked MG; successful attack; attacker-defender interaction; attacks; importance; game-theoretic cybersecurity analysis; false data injection attack; networked microgrids; global optimisation; networked MG architecture; microgrids communicates; distribution network operator; communication signals; potential cyber attackers; networked MGs; false power interchange schedule
In well-managed coordinated networked microgrids (MGs) besides electricity interchange between MGs, global optimisation is fulfilled. Here the authors studied a networked MG architecture, in which the control centre of microgrids communicates with a distribution network operator (DNO) to fulfil their local requirements. However, communication signals are always vulnerable to cyberattacks. While the surplus/deficit powers are reported by one MG to DNO, other MGs can act as potential cyber attackers aimed at decreasing their own costs. This action may also lead to threat the global optimisation of networked MGs. When an attacker manipulates the signal sent from the attacked MG to DNO, it will result in a false power interchange schedule produced by DNO. The attacker MG in the next step, maliciously accesses and changes the signal sent from the DNO to the attacked MG. In case a successful attack executed, the operation cost of the attacker MG will be decreased. Furthermore, a game-theoretic model of attacker-defender interaction is proposed, while different behaviours of players are addressed. The optimal scheduling scheme of MGs is formulated as a mixed-integer linear programming problem and solved by CPLEX. Simulation results show the impacts of the attacks and importance of the defend strategies.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据