Optimal power grid protection through a defender-attacker-defender model

被引:152
|
作者
Yuan, Wei [1 ]
Zhao, Long [1 ]
Zeng, Bo [1 ]
机构
[1] Univ S Florida, Dept Ind & Management Syst Engn, Tampa, FL 33620 USA
关键词
Power grid protection; Defender-attacker-defender model; Column-and-Constraint Generation method; IDENTIFICATION; OPTIMIZATION; METHODOLOGY; SECURITY;
D O I
10.1016/j.ress.2013.08.003
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender-attacker-defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the developed algorithm identifies optimal solutions in a reasonable time, which significantly outperforms the existing exact algorithm; (ii) the attack solution obtained through solving the attacker-defender model does not lead to the optimal protection plan in general; and (iii) protection using the optimal solution from the defender-attacker-defender model always improves the grid survivability under contingencies. The proposed model and algorithm can be easily modified to accommodate for other critical infrastructure network protection problems. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:83 / 89
页数:7
相关论文
共 50 条
  • [31] PenQuest: a gamified attacker/defender meta model for cyber security assessment and education
    Robert Luh
    Marlies Temper
    Simon Tjoa
    Sebastian Schrittwieser
    Helge Janicke
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 19 - 61
  • [32] A Temporal Model for the Prisoner's Dilemma and an Iterated Attacker-Defender Network Game
    Kovach, Nicholas
    Lamont, Gary
    PROCEEDINGS OF THE 2021 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2021, : 261 - 268
  • [33] A Pilot Contamination Attacker-Defender Model for Wireless Networks Under Stackelberg Game
    Wang, Zhangnan
    Wang, Yichen
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [34] Optimal strategy for target protection with a defender in the pursuit-evasion scenario
    Sun, Qilong
    Qi, Naiming
    Huo, Mingying
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (03): : 289 - 301
  • [35] NIGA: A Novel Method for Investigating the Attacker-Defender Model within Critical Infrastructure Networks
    Ren, Jiaqi
    Liu, Jin
    Dong, Yibo
    Li, Zhe
    Li, Weili
    MATHEMATICS, 2024, 12 (16)
  • [36] A defender-attacker model and algorithm for maximizing weighted expected hitting time with application to conservation planning
    Sefair, Jorge A.
    Smith, J. Cole
    Acevedo, Miguel A.
    Fletcher, Robert J., Jr.
    IISE TRANSACTIONS, 2017, 49 (12) : 1112 - 1128
  • [37] An Intelligent Pilot Contamination Attacker-Defender Model for Wireless Networks: A Stackelberg Game Based Approach
    Zhangnan Wang
    Yichen Wang
    Mobile Networks and Applications, 2022, 27 : 2163 - 2169
  • [38] An Intelligent Pilot Contamination Attacker-Defender Model for Wireless Networks: A Stackelberg Game Based Approach
    Wang, Zhangnan
    Wang, Yichen
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (05): : 2163 - 2169
  • [39] Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems
    Reeves, Jason
    Smith, Sean W.
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 309 - 316
  • [40] Attacker-defender model against quantal response adversaries for cyber security in logistics management: An introductory study
    Cheung, Kam-Fung
    Bell, Michael G. H.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (02) : 471 - 481