1. Introduction
The military force of a country is founded primarily for protecting national territory and global interests from aggression and loss, but its task has gone far beyond that in recent years, including emergency rescue, humanitarian aid, public order maintenance, and so forth. Therefore, the intensity and scope of military operations keep increasing, resulting in the consumption of all sorts of fossil fuel skyrocketed to great heights [
1]. It has been reported that the United States Department of Defense (DOD) is the largest single energy consumer in the country [
2]. In order to deliver petroleum products to forward operation and stationary bases, soldiers need to risk their lives in midway due to unexpected explosions caused by the enemy. Furthermore, a considerable amount of fuel will be exhausted during the transportation trip. On the other hand, consisting of various energy sources and storage units that may work in a coordinated manner to support loads, a microgrid provides a lot of prominent benefits, for example, island ability, reliability, security, and utilization of Renewable Energy Sources (RES), and so forth. Of which the most crucial is providing continuous energy supply during long-duration electrical outage, which is of great significance in real warfare since the domestic electric grid is always the first to be hit as critical infrastructures. Therefore, driven by the motivation to improve security and efficiency, a lot of demonstration projects are implemented by DOD [
3], including the Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Joint Capability Technology Demonstration (JCTD) [
4], Fort Sill Microgrid Demonstration [
5], and Environmental Security and Technology Certification Program (ESTCP) [
3]. Due to profound advantages of microgrid and the vast leading effects of US DOD, microgrid has been constructed in a lot of countries for military utilization in the last five years [
1,
6,
7].
Generally, microgrid is immune to unforeseen cascading failures in central grid due to its island capability. Nevertheless, it is still vulnerable when faced with targeted attacks, for example, cyber and physical (CP) actions to cut the real-time balance between energy generation and consumption. Compared with domestic grid, microgrid has a smaller capacity and inertia, thus it is more sensitive to power imbalance. Therefore, microgrid security concern has been proposed and investigated in the community of academic, industry, and military.
In Reference [
8], the CP attack was categorized into three types: physical attack, cyberattack, and human attack. The operation through or against people who are related to power system is termed as ‘human attack’, including bribery, threat, and social engineering, and so forth. Cyberattack launches action to disrupt the availability, integrity, and confidentiality of Supervisory Control and Data Acquisition (SCADA) system, of which the most popular ones are: denial of service/distributed denial of service (DoS/DDoS) attack [
9], false data injection attack [
10], load redistribution attack [
11], traffic analysis, and cracking password, and so forth. Physical attack affects the system via invaliding component and equipment, such as tripping line [
12], isolating bus, disconnecting generator, and damaging transformer, and so forth. For more details, the interested reader is referred to References [
13,
14]. In addition to CP attack, natural disasters, such as hurricane and flood, are popular factors to induce power outage [
15]. A comprehensive review of the impacts of natural disasters on power system is generated in Reference [
16].
Although cyberattack gained the most attention in the literature, physical attack is the most popular method in military microgrid confrontation between defenders and attackers due to the following two reasons: (1) The communication network of military microgrid is physically isolated with the Internet, thus cyberattack is very hard or almost impossible to implement; (2) Human attack is also very difficult since the spy is trained to gain more valuable information. Consequently, tripping a line with a bomb turns to be a direct and the most effective method, which is then regarded as the type of attack for consideration in this paper.
Concentrated on a fixed type of attack, there is a zero-sum game between two opposite agents: defender and attacker. A tri-level optimization model is proposed to identify the optimal allocation strategy of defending resources in Reference [
17], where coordinated attacks including physical short-circuiting of transmission lines and intruding of communication network are considered. In Reference [
18], malicious attack is alleviated via optimal Distributed Generator (DG) islanding and network topology reconfiguration, where a Defender-Attacker-Defender (DAD) model is developed and addressed by the Column and Constraint Generation (CCG) method [
19]. Following on from the combination of DAD and CCG, the single wave of attack is extended to multi-period by Reference [
20], where defensive transmission lines and DGs are respectively planned and allocated to mitigate the multi-period attack damage. In Reference [
21], the role of Battery Energy Storage Systems (BESSs) in enhancing microgrid robustness in overcoming attacks is investigated, where four participants are included in a framework involving interactions between a robustness-oriented economic dispatch model and a bilevel Attacker-Defender (AD) model. In Reference [
22], the problem of allocating fortification resources in power grid for the purpose of maximizing its immunity against malicious attack is investigated, resulting in a two-stage optimization model with the capability of generalizing several other network fortification problems and the corresponding exact solution algorithm.
Although sophisticated problems, models, and algorithms are reported in the above literature, there is an implicit assumption that the attacker is informed with full information of the target system, for example, the topology, generator capacity, load amount, branch distribution, and other component parameters, and so forth, which is impossible in most cases of real confrontation. Actually, there is an information gap between attacker and defender in military microgrid confrontation since deception strategies are ubiquitous in the battlefield. In order to highlight this information mismatch to appeal for community attention and evaluate its capability to improve defensive performance, the information possessed by defender and attacker is defined as symmetric and asymmetric information in this paper, and the impact of asymmetric information in military microgrid confrontation is comprehensively investigated.
Since asymmetric information in military microgrid confrontation has not been numerically investigated before, an assessment metric should be defined, which consists the first contribution of this paper. The asymmetric and symmetric information are abstracted as binary vectors, then the distance between them is naturally determined as assessment metric. However, after testing on a 6-bus demo system, various traditional vector distance definitions, for example, Minkowski distance, Hamming distance, and Jaccard distance, and so forth, are not suitable for the case in this paper since they cannot identify full characteristic of information mismatch. Therefore, a novel definition of binary vector distance combining coverage rate and deviation rate is proposed in this paper as the assessment metric of asymmetric information.
In order to analyze the influence of asymmetric information in military microgrid confrontation, the game between defender and attacker is formulated as an AD model. Based on dual theory and big-M method, the bilinear AD model is evolved into a single level Mixed Integer Linear Programming (MILP) problem and tackled with commercial solver Cplex. Set the symmetric information of 6-bus, 24-bus, and 57-bus systems as benchmark, the influence of asymmetric information is quantitatively analyzed based on a lot of numerical experiments, which is the second contribution of this paper. Based on simulation results on various levels of attack strength and asymmetric information across all three systems, the effectiveness and significance of asymmetric information in eliminating attack damage and improving defensive performance have been validated.
The rest of this paper is organized as follows.
Section 2 reveals the information involved in military microgrid confrontation and proposes assessment metric on the basis of comparison and analyses. Based on the AD model of microgrid confrontation, solution methodology to analyze the influence of asymmetric information is provided in
Section 3. Three cases including 6-bus, 24-bus, and 57-bus systems are employed for numerical experiment in
Section 4, with results are presented and discussed.
Section 5 concludes this paper.