The analysis of information impacts in coordinating defense against malicious attacks for interconnected power systems

Ettore Bompard, George Gross, Roberto Napoli, Fei Xue

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

The heightened concern for possible physical or cyber attacks on electricity networks has received considerable attention recently. Coordination among the different system operators (SO) of interconnected power systems in developing effective measures against such attacks has become a critically important problem in power system security. This paper presents an analytic tool for the assessment of information impacts in the management of the operational reliability after the onset of a malicious attack. The tool uses multi-agent modeling and casts the problem into a game theoretic context with the equilibrium of a fictitious play being used to analyze the impacts of various levels of information available to the SOs on the outcomes of the decision-making process to respond to the attack. We illustrate the capabilities of the proposed tool on a 34-bus test system that represents a three-area interconnection. We compare the impacts of different information scenarios in terms of the response formulations and discuss the salient aspects of the key findings.

Original languageEnglish
Title of host publication16th Power Systems Computation Conference, PSCC 2008
PublisherPower Systems Computation Conference ( PSCC )
ISBN (Electronic)9780947649289
Publication statusPublished - 2008
Externally publishedYes
Event16th Power Systems Computation Conference, PSCC 2008 - Glasgow, United Kingdom
Duration: 14 Jul 200818 Jul 2008

Publication series

Name16th Power Systems Computation Conference, PSCC 2008

Conference

Conference16th Power Systems Computation Conference, PSCC 2008
Country/TerritoryUnited Kingdom
CityGlasgow
Period14/07/0818/07/08

Keywords

  • Equilibrium analysis
  • Multi-agent systems
  • Operational reliability
  • Physical and cyber security
  • Power system security

Cite this