3.8 Article

Game-theoretic cybersecurity analysis for false data injection attack on networked microgrids

期刊

出版社

WILEY
DOI: 10.1049/iet-cps.2019.0016

关键词

scheduling; integer programming; linear programming; power engineering computing; security of data; optimisation; distributed power generation; game theory; power system management; telecommunication security; energy management systems; power system security; DNO; attacker MG; attacked MG; successful attack; attacker-defender interaction; attacks; importance; game-theoretic cybersecurity analysis; false data injection attack; networked microgrids; global optimisation; networked MG architecture; microgrids communicates; distribution network operator; communication signals; potential cyber attackers; networked MGs; false power interchange schedule

向作者/读者索取更多资源

In well-managed coordinated networked microgrids (MGs) besides electricity interchange between MGs, global optimisation is fulfilled. Here the authors studied a networked MG architecture, in which the control centre of microgrids communicates with a distribution network operator (DNO) to fulfil their local requirements. However, communication signals are always vulnerable to cyberattacks. While the surplus/deficit powers are reported by one MG to DNO, other MGs can act as potential cyber attackers aimed at decreasing their own costs. This action may also lead to threat the global optimisation of networked MGs. When an attacker manipulates the signal sent from the attacked MG to DNO, it will result in a false power interchange schedule produced by DNO. The attacker MG in the next step, maliciously accesses and changes the signal sent from the DNO to the attacked MG. In case a successful attack executed, the operation cost of the attacker MG will be decreased. Furthermore, a game-theoretic model of attacker-defender interaction is proposed, while different behaviours of players are addressed. The optimal scheduling scheme of MGs is formulated as a mixed-integer linear programming problem and solved by CPLEX. Simulation results show the impacts of the attacks and importance of the defend strategies.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据