{"title":"Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection attacks","authors":"Shichao Liu, Qingyang Li, Bo Chen","doi":"10.1049/cps2.12011","DOIUrl":null,"url":null,"abstract":"<p>While most existing works ignore securing the communication of control signals in microgrids' centralized secondary frequency control, here, a stochastic game between the microgrid control centre (MGCC) and the attacker for enhancing the vulnerability of the MGCC to false data injection (FDI) attack (wireless spoof attack) is proposed. The vulnerability to wireless spoof attack is assessed based on the controllability Gramian when the FDI attack is modelled as the malicious control input that aims to drive the microgrid state to undesired values. In the formulated zero-sum two-player Markov game, the state is uniquely associated with the vulnerability index defined by the trace of the controllability Gramian with respect to the attack input. Moreover, the utility function of the stochastic game includes not only the costs related to conducting spoof attack and encryption actions but also the possible remedy costs associated with the resulted vulnerability levels. In turn, the potential impacts of the cyber-layer action choices on the performance of the physical power system are considered when designing the optimal attack and defence strategies. A distribution feeder system with four distributed generators (DGs) is used for simulation studies. The vulnerability assessment results show that the vulnerability level increases when the attacker compromises more on the communication links between the MGCC and DGs. In the simulated game, mixed stationary attack and defence strategies are predominate when considering the uncertainty of the other player.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7000,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12011","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Cyber-Physical Systems: Theory and Applications","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cps2.12011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 2
Abstract
While most existing works ignore securing the communication of control signals in microgrids' centralized secondary frequency control, here, a stochastic game between the microgrid control centre (MGCC) and the attacker for enhancing the vulnerability of the MGCC to false data injection (FDI) attack (wireless spoof attack) is proposed. The vulnerability to wireless spoof attack is assessed based on the controllability Gramian when the FDI attack is modelled as the malicious control input that aims to drive the microgrid state to undesired values. In the formulated zero-sum two-player Markov game, the state is uniquely associated with the vulnerability index defined by the trace of the controllability Gramian with respect to the attack input. Moreover, the utility function of the stochastic game includes not only the costs related to conducting spoof attack and encryption actions but also the possible remedy costs associated with the resulted vulnerability levels. In turn, the potential impacts of the cyber-layer action choices on the performance of the physical power system are considered when designing the optimal attack and defence strategies. A distribution feeder system with four distributed generators (DGs) is used for simulation studies. The vulnerability assessment results show that the vulnerability level increases when the attacker compromises more on the communication links between the MGCC and DGs. In the simulated game, mixed stationary attack and defence strategies are predominate when considering the uncertainty of the other player.