Skip to main content
Log in

Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The security of cyber-physical systems (CPS) has become an active research area in recent years. Autonomous micro-grid, an important component of smart grid and essentially a cyber-physical system, extends the attack surface and undermines system security. This paper proposes a game-theoretic approach to describe the plausible attack-defense dynamics for autonomous micro-grid. The game is a kind of two-player, one shot, non-cooperative, and Zero-sum game, where the goal of attackers in this game is to gain the maximum payoff under a certain cost. The behavior of attackers includes two steps, intrusion and disruption, whereas the defenders can improve their defense performance by updation or reinforcement of cyber component. The optimal strategy of attackers is deduced based on the dynamic model. Finally, the case studies validate the proposed method and demonstrate its feasibility.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Duan C, Feng J, Chang H, Pan J, Duan L (2019) Research on sensor network coverage enhancement based on non-cooperative games. Comput Mater Continua 60(3)

  • Farraj A, Hammad E, Daoud AA, Kundur D (2016) A game-theoretic analysis of cyber switching attacks and mitigation in smart grid systems. IEEE Trans Smart Grid 7(4):1846–1855

    Article  Google Scholar 

  • Gu Y, Li W, He X (2015) Frequency-coordinating virtual impedance for autonomous power management of dc microgrid. IEEE Trans Power Electron 30(4):2328–2337

    Article  Google Scholar 

  • Guerrero JM, Vasquez JC, Matas J, Vicuna LGd, Castilla M (2011) Hierarchical control of droop-controlled ac and dc microgrids-a general approach toward standardization. IEEE Trans Ind Electron 58(1):158–172

    Article  Google Scholar 

  • Huang S, Zhou CJ, Yang SH, Qin YQ (2015) Cyber-physical system security for networked industrial processes. Int J Automat Comput 12(6):567–578

    Article  Google Scholar 

  • Ji X, Liu Q, Liu Z, Xie Y, Zhai J (2019) Coordinated control and power management of diesel-pv-battery in hybrid stand-alone microgrid system. J Eng 18:5245–5249

    Article  Google Scholar 

  • Johansson J, Hassel H (2012) Modelling, simulation and vulnerability analysis of interdependent technical infrastructures. Risk and interdependencies in critical infrastructures: a guideline for analysis. Springer, London, pp 49–65

    Chapter  Google Scholar 

  • Liu B, Zhuo F, Zhu Y, Yi H (2015) System operation and energy management of a renewable energy-based dc micro-grid for high penetration depth application. IEEE Trans Smart Grid 6(3):1147–1155

    Article  Google Scholar 

  • Maamar A, Benahmed K (2019) A hybrid model for anomalies detection in ami system combining k-means clustering and deep neural network. Comput Mater Continua 60(1)

  • Motevasel M, Seifi AR (2014) Expert energy management of a micro-grid considering wind energy uncertainty. Energy Conv Manag 83:58–72

    Article  Google Scholar 

  • Orojloo H, Azgomi MA (2017) A game-theoretic approach to model and quantify the security of cyber-physical systems. Comput Ind 88:44–57

    Article  Google Scholar 

  • Ouyang M, Zhao L, Pan Z, Hong L (2014) Comparisons of complex network based models and direct current power flow model to analyze power grid vulnerability under intentional attacks. Physica A Stat Mech Appl 403:45–53

    Article  Google Scholar 

  • Pasqualetti F, Dörfler F, Bullo F (2013) Attack detection and identification in cyber-physical systems. IEEE Trans Auto Control 58(11):2715–2729

    Article  MathSciNet  Google Scholar 

  • Robinson M, Jones K, Janicke H (2015) Cyber warfare: issues and challenges. Comput Secur 49:70–94

    Article  Google Scholar 

  • Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defence framework against dos/ddos cyber attacks. Comput Secur 38:39–50

    Article  Google Scholar 

  • Tian W, Ji X, Liu W, Liu G, Lin R, Zhai J, Dai Y (2019) Defense strategies against network attacks in cyber-physical systems with analysis cost constraint based on honeypot game model. Comput Mater Contin 60(1)

  • Wang W, Lu Z (2013) Cyber security in the smart grid: survey and challenges. Comput Netw 57(5):1344–1371

    Article  Google Scholar 

  • Wang D, Ge S, Jia H, Wang C, Zhou Y, Lu N, Kong X (2014) A demand response and battery storage coordination algorithm for providing microgrid tie-line smoothing services. IEEE Trans Sustain Energy 5(2):476–486

    Article  Google Scholar 

  • Wang C, Hou Y, Ten C (2017) Determination of nash equilibrium based on plausible attack-defense dynamics. IEEE Trans Power Syst 32(5):3670–3680

    Article  Google Scholar 

  • Yan J, He H, Zhong X, Tang Y (2017) Q-learning-based vulnerability analysis of smart grid against sequential topology attacks. IEEE Trans Inform Foren Secur 12(1):200–210

    Article  Google Scholar 

  • Yanine FF, Caballero FI, Sauma EE, Córdova FM (2014) Building sustainable energy systems: homeostatic control of grid-connected microgrids, as a means to reconcile power supply and energy demand response management. Renew Sustain Energy Rev 40:1168–1191

    Article  Google Scholar 

  • Yu R, Liu Z, Wang J, Zhao M, Gao J, Yu M (2018) Analysis and application of the spatio-temporal feature in wind power prediction. Int J Comput Syst Sci Eng 33(4):267–274

    Google Scholar 

  • Zhang Y, Wang L, Xiang Y, Ten C (2015) Power system reliability evaluation with scada cybersecurity considerations. IEEE Trans Smart Grid 6(4):1707–1721

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-Peng Ji.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work was supported in part by the National Natural Science Foundation of China under Grant (U1836104, 61702235), and in part by the Fundamental Research Funds for the Central Universities under Grant 30918012204.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ji, XP., Tian, W., Liu, W. et al. Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model. J Ambient Intell Human Comput 12, 8859–8866 (2021). https://doi.org/10.1007/s12652-020-02678-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02678-5

Keywords

Navigation