Protecting Power System Infrastructure Against Disruptive Agents Considering Demand Response
Abstract
1. Introduction
1.1. Background and Motivation
- False data injection: where incorrect measurements or control signals are introduced into the system to mislead operators or automated control systems.
- Denial of service: aimed at overwhelming communication channels or control centers to prevent legitimate commands or data from being processed.
- Command injection attacks: where unauthorized control actions are sent to critical components such as breakers or generators.
- Phishing and credential theft: which can grant attackers access to control systems or sensitive operational data.
1.2. Evolution of the Interdiction Problem Formulation and Related Work
1.3. Contributions and Paper Organization
- The effect of DR is integrated in the interdiction problem, proving that the strategic behavior of the disruptive agent is modified by its inclusion. Specifically, DR reduces the amount of load shedding and compels the attacker to adopt less impactful strategies, enhancing the system’s resilience.
- Unlike most attack-defense interdiction models, a full AC power flow formulation is presented to accurately capture the physical behavior and operational constraints of the power system. Furthermore, the model considers coordinated attacks on lines, transformers, and generators, offering a more comprehensive and realistic framework for vulnerability assessment.
2. Game Theory Approach and Mathematical Modeling
2.1. Stackelberg Equilibrium and Bilevel Problem Formulation
2.2. Hypotheses and Codification of the Interdiction Vector
- The disruptive agent can attack lines, transformers, and generators, but has a limited budget, which limits the number of elements to attack.
- Every attack is assumed to be 100% effective, i.e., it renders the targeted device out of service (either line, transformer or generator).
- Transient effects of the attack are not considered; only steady-state power flow equations are taken into account.
- The Stackelberg game assumes complete information at the upper level—i.e., the attacker is aware of all relevant data from the operator and can anticipate the defender’s response. This assumption is consistent with standard formulations in interdiction literature, where the attacker is typically modeled as a strategic leader with full knowledge.
- For the sake of simplicity, cascading failures, outage duration, and network reconfiguration are not considered in the proposed model.
2.3. Impact of DR in the Interdiction Problem
2.4. Upper-Level Optimization Problem
2.5. Lower-Level Optimization Problem
2.5.1. Objective Function
2.5.2. Equality Constraints
2.5.3. Inequality Constraints
2.6. Information Exchange Between Leader and Follower
3. Solution Approach
3.1. Iterated Local Search
3.2. Greedy Randomized Adaptive Search Procedure (GRASP)
4. Tests and Results
4.1. Results Without DR
4.2. Results Considering DR
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Corsi, S.; Sabelli, C. General blackout in Italy Sunday September 28, 2003, h. 03:28:00. In Proceedings of the IEEE Power Engineering Society General Meeting, Denver, CO, USA, 6–10 June 2004; pp. 1691–1702. [Google Scholar] [CrossRef]
- Ruiz, C.A.; Orrego, N.J.; Gutierrez, J.F. The Colombian 2007 black out. In Proceedings of the 2008 IEEE/PES Transmission and Distribution Conference and Exposition: Latin America, Bogota, Colombia, 13–15 August 2008; pp. 1–5. [Google Scholar] [CrossRef]
- Zhou, M.; Liu, C.; Jahromi, A.A.; Kundur, D.; Wu, J.; Long, C. Revealing Vulnerability of N-1 Secure Power Systems to Coordinated Cyber-Physical Attacks. IEEE Trans. Power Syst. 2023, 38, 1044–1057. [Google Scholar] [CrossRef]
- Kong, X.; Lu, Z.; Guo, X.; Zhang, J.; Li, H. Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks. IEEE Trans. Reliab. 2024, 73, 245–256. [Google Scholar] [CrossRef]
- Oyewole, P.A.; Jayaweera, D. Power System Security With Cyber-Physical Power System Operation. IEEE Access 2020, 8, 179970–179982. [Google Scholar] [CrossRef]
- Iqbal, A.; Honhaga, I.; Teffera, E.; Perry, A.; Baker, R.; Pearce, G.; Szabo, C. Vulnerability and Defence: A Case for Stackelberg Game Dynamics. Games 2024, 15, 32. [Google Scholar] [CrossRef]
- Salmeron, J.; Wood, K.; Baldick, R. Analysis of electric grid security under terrorist threat. IEEE Trans. Power Syst. 2004, 19, 905–912. [Google Scholar] [CrossRef]
- Salmerón, J.; Wood, K.; Baldick, R. Optimizing Electric Grid Design Under Asymmetric Threat (II); Technical Report NPS-OR-04-001; Naval Postgraduate School: Monterey, CA, USA, 2004. [Google Scholar]
- Arroyo, J.; Galiana, F. On the solution of the bilevel programming formulation of the terrorist threat problem. IEEE Trans. Power Syst. 2005, 20, 789–797. [Google Scholar] [CrossRef]
- Motto, A.; Arroyo, J.; Galiana, F. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat. IEEE Trans. Power Syst. 2005, 20, 1357–1365. [Google Scholar] [CrossRef]
- Arroyo, J.M. Bilevel programming applied to power system vulnerability analysis under multiple contingencies. IET Gener. Transm. Distrib. 2010, 4, 178–190. [Google Scholar] [CrossRef]
- Romero, N.; Xu, N.; Nozick, L.K.; Dobson, I.; Jones, D. Investment Planning for Electric Power Systems Under Terrorist Threat. IEEE Trans. Power Syst. 2012, 27, 108–116. [Google Scholar] [CrossRef]
- Wu, X.; Conejo, A.J. An Efficient Tri-Level Optimization Model for Electric Grid Defense Planning. IEEE Trans. Power Syst. 2017, 32, 2984–2994. [Google Scholar] [CrossRef]
- Alguacil, N.; Delgadillo, A.; Arroyo, J.M. A trilevel programming approach for electric grid defense planning. Comput. Oper. Res. 2014, 41, 282–290. [Google Scholar] [CrossRef]
- Lin, Y.; Bie, Z. Tri-level optimal hardening plan for a resilient distribution system considering reconfiguration and DG islanding. Appl. Energy 2018, 210, 1266–1279. [Google Scholar] [CrossRef]
- Nemati, H.; Latify, M.A.; Yousefi, G.R. Tri-level transmission expansion planning under intentional attacks: Virtual attacker approach—Part I: Formulation. IET Gener. Transm. Distrib. 2019, 13, 390–398. [Google Scholar] [CrossRef]
- Ma, C.Y.T.; Yau, D.K.Y.; Lou, X.; Rao, N.S.V. Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation. IEEE Trans. Power Syst. 2013, 28, 1676–1686. [Google Scholar] [CrossRef]
- Semertzis, I.; Ştefanov, A.; Presekal, A.; Kruimer, B.; Torres, J.L.R.; Palensky, P. Power System Stability Analysis From Cyber Attacks Perspective. IEEE Access 2024, 12, 113008–113035. [Google Scholar] [CrossRef]
- Ni, M.; Li, M.; Li, J.; Wu, Y.; Wang, Q. Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks. J. Mod. Power Syst. Clean Energy 2021, 9, 477–484. [Google Scholar] [CrossRef]
- Liu, D.; Tse, C.K. Cascading Failure of Cyber-Coupled Power Systems Considering Interactions Between Attack and Defense. IEEE Trans. Circuits Syst. I Regul. Pap. 2019, 66, 4323–4336. [Google Scholar] [CrossRef]
- Li, P.; Fu, J.; Xie, K.; Hu, B.; Wang, Y.; Shao, C.; Sun, Y.; Huang, W. A Defense Planning Model for a Power System Against Coordinated Cyber-Physical Attack. Prot. Control Mod. Power Syst. 2024, 9, 84–95. [Google Scholar] [CrossRef]
- Rao, N.S.V.; Ma, C.Y.T.; He, F. Game-Theoretic Strategies for Cyber-Physical Infrastructures Under Component Disruptions. IEEE Trans. Reliab. 2023, 72, 483–497. [Google Scholar] [CrossRef]
- Tatipatri, N.; Arun, S.L. A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security. IEEE Access 2024, 12, 18147–18167. [Google Scholar] [CrossRef]
- Agudelo, L.; López-Lezama, J.M.; Muñoz-Galeano, N. Vulnerability assessment of power systems to intentional attacks using a specialized genetic algorithm. Dyna 2015, 82, 78–84. [Google Scholar] [CrossRef]
- López-Lezama, J.M.; Gómez, J.C.; Muñoz-Galeano, N. A Cuckoo Search Algorithm Applied to the Electric Grid Interdiction Problem. WSEAS Trans. Power Syst. 2018, 13, 181–187. [Google Scholar]
- Yaghmaee, M.H. Incentive-Based Demand Response Program for Blockchain Network. IEEE Syst. J. 2024, 18, 134–145. [Google Scholar] [CrossRef]
- Parizy, E.S.; Bahrami, H.R.; Choi, S. A Low Complexity and Secure Demand Response Technique for Peak Load Reduction. IEEE Trans. Smart Grid 2019, 10, 3259–3268. [Google Scholar] [CrossRef]
- Khonji, M.; Chau, C.K.; Elbassioni, K. Optimal Power Flow With Inelastic Demands for Demand Response in Radial Distribution Networks. IEEE Trans. Control Netw. Syst. 2018, 5, 513–524. [Google Scholar] [CrossRef]
- Safdarian, A.; Degefa, M.Z.; Lehtonen, M.; Fotuhi-Firuzabad, M. Distribution network reliability improvements in presence of demand response. IET Gener. Transm. Distrib. 2014, 8, 2027–2035. [Google Scholar] [CrossRef]
- Lakshminarayana, S.; Maple, C.; Larkins, A.; Flack, D.; Few, C.; David, K.A.; Srivastava, A.K. Cybersecurity Threats to Power Grid Operations from the Demand-Side Response Ecosystem. arXiv 2023, arXiv:2310.18820. [Google Scholar]
- Tuo, M.; Ramesh, A.V.; Li, X. Benefits and Cyber-Vulnerability of Demand Response System in Real-Time Grid Operations. arXiv 2020, arXiv:2005.13207. [Google Scholar]
- Li, C.; Zhang, W.; Liu, M.; Ma, J.; Qian, Y. Data-driven Distributionally Robust Scheduling of Community Integrated Energy Systems Considering Demand Response and Renewable Uncertainty. Appl. Energy 2023, 341, 120936. [Google Scholar] [CrossRef]
- Ming, P.; Xiao, J.; Fang, J. Scenario-Based Economic Dispatch Considering Demand Response Uncertainty. Energies 2017, 10, 406. [Google Scholar] [CrossRef]
- Deng, Y.; Shukla, S. Vulnerabilities and countermeasures-A survey on the cyber security issues in the transmission subsystem of a smart grid. J. Cyber Secur. Mobil. 2012, 1, 251–276. [Google Scholar]
- Mojica-Nava, E.; Ruiz, F. Stackelberg Population Dynamics: A Predictive-Sensitivity Approach. Games 2021, 12, 88. [Google Scholar] [CrossRef]
- Pardalos, P.; Birge, J.R.; Du, D.Z.; Floudas, C.A.; Mockus, J.; Sherali, H.D.; Stavroulakis, G. Nonconvex Optimization and Its Applications, 1st ed.; Springer: Berlin/Heidelberg, Germany, 1994; Volume 30. [Google Scholar]
- López-Lezama, J.M.; Contreras, J.; Padilha-Feltrin, A. Location and contract pricing of distributed generation using a genetic algorithm. Int. J. Electr. Power Energy Syst. 2012, 36, 117–126. [Google Scholar] [CrossRef]
- Zimmerman, R.D.; Murillo-Sanchez, C.E.; Thomas, R.J. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education. IEEE Trans. Power Syst. 2011, 26, 12–19. [Google Scholar] [CrossRef]
- Yang, Y.; Guang, J.; Zhengqiang, P.; Rui, G. An iterated local coordinate-exchange algorithm for constructing experimental designs for multi-dimensional constrained spaces. J. Syst. Eng. Electron. 2021, 32, 1212–1220. [Google Scholar] [CrossRef]
- da Silva Arruda, T.; Dias, U.; Dias, Z. A GRASP-Based Heuristic for the Sorting by Length-Weighted Inversions Problem. IEEE/ACM Trans. Comput. Biol. Bioinform. 2018, 15, 352–363. [Google Scholar] [CrossRef]
M | AG [24] | CS [25] | GRASP | ILS |
---|---|---|---|---|
2 | 194 | - | 194.00 | 194.00 |
3 | 309 | - | 309.00 | 309.00 |
4 | 442 | 559.8 | 725.63 | 725.63 |
5 | 842 | - | 896.17 | 896.17 |
6 | 1017 | 1022.9 | 1115.4 | 1115.4 |
Metric | GRASP | ILS |
---|---|---|
Best solution (max) | 1115.4 | 1115.4 |
Worst solution (min) | 1017.0 | 1017.0 |
Mean solution | 1105.56 | 1100.64 |
Standard Deviation | 29.52 | 35.20 |
Average computation time (s) | 228.4 | 237.2 |
M | Attack Plan | Load Shedding [MW] | Load Shedding [%] |
---|---|---|---|
2 | 11–14, 14–16 | 194.00 | 6.81 |
3 | 16–19, 20–23, 20–23 | 309.00 | 10.84 |
4 | G13, G23 | 725.63 | 25.46 |
5 | 7–8, G13, G23 | 896.17 | 31.44 |
6 | 12–23, 13–23, 14–16, 15–24, G13 | 1115.40 | 39.14 |
DR Capacity [%] | Available DR [MW] | Interdiction Vector | Load Shedding [MW] |
---|---|---|---|
0 | 0.00 | 16–19, 20–23, 20–23 | 309.00 |
5 | 15.45 | 7–8, G23 | 293.79 |
10 | 30.90 | 7–8, G23 | 278.66 |
20 | 61.80 | 3–24, 9–11, 9–12 | 251.58 |
DR Capacity [%] | Available DR [MW] | Interdiction Vector | Load Shedding [MW] |
---|---|---|---|
0 | 0.00 | 12–23, 13–23, 14–16, 15–24, G13 | 1115.40 |
5 | 41.45 | G13, G18, G23 | 1072.30 |
10 | 82.90 | G13, G18, G23 | 1030.90 |
20 | 165.80 | 7–8, 11–13, 12–13, 12–23, 14–16, 15–24 | 907.50 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
López-Lezama, J.M.; Muñoz-Galeano, N.; Saldarriaga-Zuluaga, S.D.; Bustamante-Mesa, S. Protecting Power System Infrastructure Against Disruptive Agents Considering Demand Response. Computers 2025, 14, 308. https://doi.org/10.3390/computers14080308
López-Lezama JM, Muñoz-Galeano N, Saldarriaga-Zuluaga SD, Bustamante-Mesa S. Protecting Power System Infrastructure Against Disruptive Agents Considering Demand Response. Computers. 2025; 14(8):308. https://doi.org/10.3390/computers14080308
Chicago/Turabian StyleLópez-Lezama, Jesús M., Nicolás Muñoz-Galeano, Sergio D. Saldarriaga-Zuluaga, and Santiago Bustamante-Mesa. 2025. "Protecting Power System Infrastructure Against Disruptive Agents Considering Demand Response" Computers 14, no. 8: 308. https://doi.org/10.3390/computers14080308
APA StyleLópez-Lezama, J. M., Muñoz-Galeano, N., Saldarriaga-Zuluaga, S. D., & Bustamante-Mesa, S. (2025). Protecting Power System Infrastructure Against Disruptive Agents Considering Demand Response. Computers, 14(8), 308. https://doi.org/10.3390/computers14080308