3,170 research outputs found
Equilibria in data injection attacks
International audience—Data injection attacks are studied in a game theoretic setting. Assuming that the network operator acquires the state variables via generalized least squares (GLS) estimation, different attack performance metrics are proposed. The scenarios defined by the performance metrics are then analyzed. In particular, closed form expressions for best response functions and Nash equilibria (NEs) are given. First the case in which the attack vector can be constructed without energy constraints is studied. It is shown that for unconstrained attacks infinitely many optimal attack vectors exist and that the construction requires knowledge of the state variables in the grid. Alternatively, when energy constraints are included, the attack vector construction does not depend on the state variables. As a consequence, the optimal energy constrained attack strategy follows a correlated multivariate Gaussian distribution. It is shown that for unconstrained attacks infinitely many NEs exist and that in the constrained case at least one NE exists
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks
This paper studies the vulnerability of large-scale power systems to false
data injection (FDI) attacks through their physical consequences. Prior work
has shown that an attacker-defender bi-level linear program (ADBLP) can be used
to determine the worst-case consequences of FDI attacks aiming to maximize the
physical power flow on a target line. This ADBLP can be transformed into a
single-level mixed-integer linear program, but it is hard to solve on large
power systems due to numerical difficulties. In this paper, four
computationally efficient algorithms are presented to solve the attack
optimization problem on large power systems. These algorithms are applied on
the IEEE 118-bus system and the Polish system with 2383 buses to conduct
vulnerability assessments, and they provide feasible attacks that cause line
overflows, as well as upper bounds on the maximal power flow resulting from any
attack.Comment: 6 pages, 5 figure
Catching Cheats: Detecting Strategic Manipulation in Distributed Optimisation of Electric Vehicle Aggregators
Given the rapid rise of electric vehicles (EVs) worldwide, and the ambitious
targets set for the near future, the management of large EV fleets must be seen
as a priority. Specifically, we study a scenario where EV charging is managed
through self-interested EV aggregators who compete in the day-ahead market in
order to purchase the electricity needed to meet their clients' requirements.
With the aim of reducing electricity costs and lowering the impact on
electricity markets, a centralised bidding coordination framework has been
proposed in the literature employing a coordinator. In order to improve privacy
and limit the need for the coordinator, we propose a reformulation of the
coordination framework as a decentralised algorithm, employing the Alternating
Direction Method of Multipliers (ADMM). However, given the self-interested
nature of the aggregators, they can deviate from the algorithm in order to
reduce their energy costs. Hence, we study the strategic manipulation of the
ADMM algorithm and, in doing so, describe and analyse different possible attack
vectors and propose a mathematical framework to quantify and detect
manipulation. Importantly, this detection framework is not limited the
considered EV scenario and can be applied to general ADMM algorithms. Finally,
we test the proposed decentralised coordination and manipulation detection
algorithms in realistic scenarios using real market and driver data from Spain.
Our empirical results show that the decentralised algorithm's convergence to
the optimal solution can be effectively disrupted by manipulative attacks
achieving convergence to a different non-optimal solution which benefits the
attacker. With respect to the detection algorithm, results indicate that it
achieves very high accuracies and significantly outperforms a naive benchmark
Maximum Distortion Attacks in Electricity Grids
Multiple attacker data-injection attack construction in electricity grids with minimum-mean-square-error state estimation is studied for centralized and decentralized scenarios. A performance analysis of the trade-off between the maximum distortion that an attack can introduce and the probability of the attack being detected by the network operator is considered. In this setting, optimal centralized attack construction strategies are studied. The decentralized case is examined in a game-theoretic setting. A novel utility function is proposed to model this trade-off and it is shown that the resulting game is a potential game. The existence and cardinality of the corresponding set of Nash equilibria of the game is analyzed. Interestingly, the attackers can exploit the correlation among the state variables to facilitate the attack construction. It is shown that attackers can agree on a data-injection vector construction that achieves the best trade-off between distortion and detection probability by sharing only a limited number of bits offline. For the particular case of two attackers, numerical results based on IEEE test systems are presented
- …