IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v12y2019i15p3002-d254571.html
   My bibliography  Save this article

A Game Theory-Based Approach for Vulnerability Analysis of a Cyber-Physical Power System

Author

Listed:
  • Keren Chen

    (School of Electrical Engineering, Zhejiang University, Hangzhou 310027, China)

  • Fushuan Wen

    (Department for Management of Science and Technology Development, Ton Duc Thang University, Ho Chi Minh City 800010, Vietnam
    Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 800010, Vietnam)

  • Chung-Li Tseng

    (UNSW Business School, The University of New South Wales, Sydney, NSW 2052, Australia)

  • Minghui Chen

    (Guangzhou Power Supply Company Limited, Guangzhou 510620, China)

  • Zeng Yang

    (Guangzhou Power Supply Company Limited, Guangzhou 510620, China)

  • Hongwei Zhao

    (Guangzhou Power Supply Company Limited, Guangzhou 510620, China)

  • Huiyu Shang

    (Guangzhou Power Supply Company Limited, Guangzhou 510620, China)

Abstract

In a Cyber-Physical Power System (CPPS), the interaction between the power cyber system and the power physical system becomes more extensive and more in-depth. The failure of a cyber component could have an impact on the security and reliability of the power physical system. Existing publications have focused on the impacts of the power cyber network on the power physical network, while a general CPPS model considering the mutual impacts of these two networks is less studied. Given this background, a game-theoretic approach for a cyber-physical power system vulnerability analysis is proposed. First, a CPPS interactive model framework is structured, consisting of five types of elements: P-nodes, PP-links, C-nodes, CC-links and CP-links. The interactions among these elements are considered. On this basis, the system cascading failure under potential attacks is analyzed, followed with an optimal load curtailment operation when in an emergency. To further illustrate the system vulnerability, a bi-level optimization model under a game-theoretic framework is presented to describe the interactions between a CPPS attacker and a system defender. Optimal resource allocation by the system defender for maintaining system reliability can be obtained by solving the problem. The feasibility and effectiveness of the proposed method are demonstrated by a revised version of the IEEE 14-bus power system.

Suggested Citation

  • Keren Chen & Fushuan Wen & Chung-Li Tseng & Minghui Chen & Zeng Yang & Hongwei Zhao & Huiyu Shang, 2019. "A Game Theory-Based Approach for Vulnerability Analysis of a Cyber-Physical Power System," Energies, MDPI, vol. 12(15), pages 1-15, August.
  • Handle: RePEc:gam:jeners:v:12:y:2019:i:15:p:3002-:d:254571
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/12/15/3002/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/12/15/3002/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Yampolskiy, Mark & Horváth, Péter & Koutsoukos, Xenofon D. & Xue, Yuan & Sztipanovits, Janos, 2015. "A language for describing attacks on cyber-physical systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 8(C), pages 40-52.
    2. Sergey V. Buldyrev & Roni Parshani & Gerald Paul & H. Eugene Stanley & Shlomo Havlin, 2010. "Catastrophic cascade of failures in interdependent networks," Nature, Nature, vol. 464(7291), pages 1025-1028, April.
    3. Alessandro Vespignani, 2010. "The fragility of interdependency," Nature, Nature, vol. 464(7291), pages 984-985, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Shekhtman, Louis M. & Danziger, Michael M. & Havlin, Shlomo, 2016. "Recent advances on failure and recovery in networks of networks," Chaos, Solitons & Fractals, Elsevier, vol. 90(C), pages 28-36.
    2. Ji, Xingpei & Wang, Bo & Liu, Dichen & Dong, Zhaoyang & Chen, Guo & Zhu, Zhenshan & Zhu, Xuedong & Wang, Xunting, 2016. "Will electrical cyber–physical interdependent networks undergo first-order transition under random attacks?," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 460(C), pages 235-245.
    3. Wang, Jianwei & Jiang, Chen & Qian, Jianfei, 2014. "Robustness of interdependent networks with different link patterns against cascading failures," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 393(C), pages 535-541.
    4. Zhou, Shenghua & Yang, Yifan & Ng, S. Thomas & Xu, J. Frank & Li, Dezhi, 2020. "Integrating data-driven and physics-based approaches to characterize failures of interdependent infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 31(C).
    5. Dong, Shangjia & Wang, Haizhong & Mostafizi, Alireza & Song, Xuan, 2020. "A network-of-networks percolation analysis of cascading failures in spatially co-located road-sewer infrastructure networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 538(C).
    6. Alla Kammerdiner & Alexander Semenov & Eduardo L. Pasiliao, 2023. "Flight from COVID-19: Multiscale and Multilayer Analyses of the Epidemic-Induced Network Adaptations," SN Operations Research Forum, Springer, vol. 4(2), pages 1-22, June.
    7. Fang Zhou & Xiang He & Yongbo Yuan & Mingyuan Zhang, 2020. "Influence of Interlink Topology on Multilayer Network Robustness," Sustainability, MDPI, vol. 12(3), pages 1-19, February.
    8. Kai Gong & Jia-Jian Wu & Ying Liu & Qing Li & Run-Ran Liu & Ming Tang, 2019. "The Effective Healing Strategy against Localized Attacks on Interdependent Spatially Embedded Networks," Complexity, Hindawi, vol. 2019, pages 1-10, May.
    9. David J. Yu & Michael L. Schoon & Jason K. Hawes & Seungyoon Lee & Jeryang Park & P. Suresh C. Rao & Laura K. Siebeneck & Satish V. Ukkusuri, 2020. "Toward General Principles for Resilience Engineering," Risk Analysis, John Wiley & Sons, vol. 40(8), pages 1509-1537, August.
    10. Liu, Kai & Wang, Ming & Zhu, Weihua & Wu, Jinshan & Yan, Xiaoyong, 2018. "Vulnerability analysis of an urban gas pipeline network considering pipeline-road dependency," International Journal of Critical Infrastructure Protection, Elsevier, vol. 23(C), pages 79-89.
    11. Ji, Xingpei & Wang, Bo & Liu, Dichen & Chen, Guo & Tang, Fei & Wei, Daqian & Tu, Lian, 2016. "Improving interdependent networks robustness by adding connectivity links," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 444(C), pages 9-19.
    12. Wang, Jianwei & Wang, Siyuan & Wang, Ziwei, 2022. "Robustness of spontaneous cascading dynamics driven by reachable area," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 585(C).
    13. Bellè, Andrea & Abdin, Adam F. & Fang, Yi-Ping & Zeng, Zhiguo & Barros, Anne, 2023. "A data-driven distributionally robust approach for the optimal coupling of interdependent critical infrastructures under random failures," European Journal of Operational Research, Elsevier, vol. 309(2), pages 872-889.
    14. Xu, Luo & Guo, Qinglai & Sheng, Yujie & Muyeen, S.M. & Sun, Hongbin, 2021. "On the resilience of modern power systems: A comprehensive review from the cyber-physical perspective," Renewable and Sustainable Energy Reviews, Elsevier, vol. 152(C).
    15. Ruiming, Fang & Minling, Wu & xinhua, Guo & Rongyan, Shang & Pengfei, Shao, 2020. "Identifying early defects of wind turbine based on SCADA data and dynamical network marker," Renewable Energy, Elsevier, vol. 154(C), pages 625-635.
    16. Zhang, Jianhua & Song, Bo & Zhang, Zhaojun & Liu, Haikuan, 2014. "An approach for modeling vulnerability of the network of networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 412(C), pages 127-136.
    17. Wang, Shuliang & Hong, Liu & Chen, Xueguang, 2012. "Vulnerability analysis of interdependent infrastructure systems: A methodological framework," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 391(11), pages 3323-3335.
    18. Wang, Xin-Wei & Chen, Zhen & Han, Chao, 2016. "Scheduling for single agile satellite, redundant targets problem using complex networks theory," Chaos, Solitons & Fractals, Elsevier, vol. 83(C), pages 125-132.
    19. Williams, James Bryan, 2021. "Critical flow centrality measures on interdependent networks with time-varying demands," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    20. Lv, Chang-Chun & Si, Shu-Bin & Duan, Dong-Li & Zhan, Ren-Jun, 2017. "Dynamical robustness of networks against multi-node attacked," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 471(C), pages 837-844.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:12:y:2019:i:15:p:3002-:d:254571. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.