Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review
Abstract
:1. Introduction
2. Adverse Impacts of Physical Attacks on Power Systems
2.1. Load Interruptions
2.2. Unserved Load Costs
2.3. Cascading Failures
3. Defending Actions against Physical Attacks
3.1. Detection Methods for Attacks on Power Systems
3.2. Estimating Attack Characteristics
- (a)
- Single or Multiple Attacks
- (b)
- Multi-Period Considerations
3.3. Uncertainty Considerations
3.4. System Restoration after Physical Attacks
3.5. Expansion Planning
3.6. DG Units
3.7. Reconfigurable Systems
4. Objective Functions and Optimization Methods
4.1. Single-Objective Models
4.2. Multi-Objective Models
4.3. Competitive Models
4.4. Multi-Level Models
5. Conclusions
- The role of different players in a defensive plan against physical attacks has not been well-discussed. Each defensive plan includes several players, such as the system planner, system operator, disruptive agent, customers, policy-maker, power grid, etc.
- Dynamic aspects of power systems, when TLs are targeted by physical attacks, have not been studied.
- The cost of the unserved load has not been well-focused on in the literature of the understudied context.
- Few research studies have considered a practical multi-period time horizon. Most of them have been focused on a single time interval. Multi-period time horizons should be more studied in future research studies.
- Multi-objective models mainly include bi-objective models, whereas, in practical problems, more than two objectives may be needed to be taken into account.
- Considerations of distributed energy resources only have included diesel generators, whereas renewable energy sources will be the main distributed energy systems in the near future.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bompard, E.; Huang, T.; Wu, Y.; Cremenescu, M. Classification and trend analysis of threats origins to the security of power systems. Int. J. Electr. Power Energy Syst. 2013, 50, 50–64. [Google Scholar] [CrossRef]
- Xiang, Y.; Zhang, X.; Shi, D.; Diao, R.; Wang, Z. Robust optimization for transmission defense against multi-period attacks with uncertainties. Int. J. Electr. Power Energy Syst. 2020, 121, 106154. [Google Scholar] [CrossRef]
- Mohammadi, F.; Nazri, G.A.; Saif, M. A fast fault detection and identification approach in power distribution systems. In Proceedings of the 5th International Conference on Power Generation Systems and Renewable Energy Technologies, Istanbul, Turkey, 26–27 August 2019; pp. 1–4. [Google Scholar]
- Bompard, E.; Gao, C.; Masera, M.; Napoli, R.; Russo, A.; Stefanini, A.; Xue, F. Approaches to the Security Analysis of Power Systems: Defence Strategies Against Malicious Threats; Office for Official Publications of the European Communities: Luxembourg, 2007. [Google Scholar]
- Mohammadi, F.; Rashidzadeh, R. An Overview of IoT-Enabled Monitoring and Control Systems for Electric Vehicles. IEEE Instrum. Meas. Mag. 2021, 24, 91–97. [Google Scholar] [CrossRef]
- Nemati, H.; Latify, M.A.; Reza Yousefi, G. Optimal Coordinated Expansion Planning of Transmission and Electrical Energy Storage Systems under Physical Intentional Attacks. IEEE Syst. J. 2020, 14, 793–802. [Google Scholar] [CrossRef]
- Arcila, E.L.; López-Lezama, J.M.; Muñoz-Galeano, N. An Approach to the Power System Interdiction Problem Considering Reconfiguration. Int. J. Eng. Res. Technol. 2020, 13, 2313–2317. [Google Scholar] [CrossRef]
- Qi, H.; Wang, X.; Tolbert, L.M.; Li, F.; Peng, F.Z.; Ning, P.; Amin, M. A resilient real-time system design for a secure and reconfigurable power grid. IEEE Trans. Smart Grid 2011, 2, 770–781. [Google Scholar] [CrossRef]
- Holmgren, Å.J. Using graph models to analyze the vulnerability of electric power networks. Risk Anal. 2006, 26, 955–969. [Google Scholar] [CrossRef] [PubMed]
- Mohammadi, F.; Rashidzadeh, R. Impact of stealthy false data injection attacks on power flow of power transmission lines—A mathematical verification. Int. J. Electr. Power Energy Syst. 2022, 142, 108293. [Google Scholar] [CrossRef]
- Mohammadi, F.; Sanjari, M.; Saif, M. A Real-Time Blockchain-Based Multifunctional Integrated Smart Metering System. In Proceedings of the 2022 IEEE Kansas Power and Energy Conference (KPEC), Manhattan, KS, USA; 2022; pp. 1–3. [Google Scholar]
- Ranjbar, M.H.; Kheradmandi, M.; Pirayesh, A. A Linear Game Framework for Defending Power Systems against Intelligent Physical Attacks. IEEE Trans. Smart Grid 2019, 10, 6592–6594. [Google Scholar] [CrossRef]
- Fu, J.; Wang, L.; Hu, B.; Xie, K.; Chao, H.; Zhou, P. A Sequential Coordinated Attack Model for Cyber-Physical System Considering Cascading Failure and Load Redistribution. In Proceedings of the 2nd IEEE Conference on Energy Internet and Energy System Integration, EI2, Beijing, China, 20–22 October 2018. [Google Scholar]
- Liao, W.; Li, P. Cascading Failure Attacks in the Power System. In Security of Cyber-Physical Systems; Springer: Cham, Switzerland, 2020; pp. 53–79. [Google Scholar]
- Lai, K.; Wang, Y.; Shi, D.; Illindala, M.S.; Zhang, X.; Wang, Z. A Resilient Power System Operation Strategy Considering Transmission Line Attacks. IEEE Access 2018, 6, 70633–70643. [Google Scholar] [CrossRef]
- Arroyo, J.M.; Fernández, F.J. A genetic algorithm approach for the analysis of electric grid interdiction with line switching. In Proceedings of the 2009 15th International Conference on Intelligent System Applications to Power Systems, Curitiba, Brazil, 8–12 November 2009; pp. 9–14. [Google Scholar]
- Simonoff, J.S.; Restrepo, C.E.; Zimmerman, R. Risk-management and risk-analysis-based decision tools for attacks on electric power. Risk Anal. 2007, 27, 547–570. [Google Scholar] [CrossRef] [PubMed]
- Kinney, R.; Crucitti, P.; Albert, R.; Latora, V. Modeling cascading failures in the North American power grid. Eur. Phys. J. B 2005, 46, 101–107. [Google Scholar] [CrossRef]
- Costa, A.; Georgiadis, D.; Ng, T.S.; Sim, M. An optimization model for power grid fortification to maximize attack immunity. Int. J. Electr. Power Energy Syst. 2018, 99, 594–602. [Google Scholar] [CrossRef]
- Chen, G.; Dong, Z.Y.; Hill, D.J.; Xue, Y.S. Exploring reliable strategies for defending power systems against targeted attacks. IEEE Trans. Power Syst. 2011, 26, 1000–1009. [Google Scholar] [CrossRef]
- Ding, T.; Yao, L.; Li, F. A multi-uncertainty-set based two-stage robust optimization to defender–attacker–defender model for power system protection. Reliab. Eng. Syst. Saf. 2018, 169, 179–186. [Google Scholar] [CrossRef]
- Carrión, M.; Arroyo, J.M.; Alguacil, N. Vulnerability-constrained transmission expansion planning: A stochastic programming approach. IEEE Trans. Power Syst. 2007, 22, 1436–1445. [Google Scholar] [CrossRef]
- Nemati, H.; Latify, M.A.; Yousefi, G.R. Tri-level transmission expansion planning under intentional attacks: Virtual attacker approach—Part I: Formulation. IET Gener. Transm. Distrib. 2019, 13, 390–398. [Google Scholar] [CrossRef]
- Nemati, H.; Latify, M.A.; Yousefi, G.R. Tri-level transmission Expansion planning under intentional attacks: Virtual attacker approach—Part II: Case studies. IET Gener. Transm. Distrib. 2019, 13, 399–408. [Google Scholar] [CrossRef]
- Alguacil, N.; Carrión, M.; Arroyo, J.M. Transmission network expansion planning under deliberate outages. In Handbook of Power Systems I. Energy Systems; Springer: Berlin/Heidelberg, Germany, 2010; pp. 365–389. ISBN 9780947649289. [Google Scholar]
- Lai, K.; Shi, D.; Li, H.; Illindala, M.; Peng, D.; Liu, L.; Wang, Z. A Robust Energy Storage System Siting Strategy Considering Physical Attacks to Transmission Lines. In Proceedings of the 2018 North American Power Symposium (NAPS), Fargo, ND, USA, 9–11 September 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Lin, Y.; Bie, Z. Tri-level optimal hardening plan for a resilient distribution system considering reconfiguration and DG islanding. Appl. Energy 2018, 210, 1266–1279. [Google Scholar] [CrossRef]
- Moradi-Sepahvand, M.; Amraee, T.; Nikoofard, A. A Game Framework to Confront Targeted Physical Attacks Considering Optimal Placement of Energy Storage. In Proceedings of the 2019 Smart Grid Conference (SGC), Tehran, Iran, 18–19 December 2019; pp. 1–6. [Google Scholar] [CrossRef]
- He, H.; Huang, S.; Liu, Y.; Zhang, T. A tri-level optimization model for power grid defense with the consideration of post-allocated DGs against coordinated cyber-physical attacks. Int. J. Electr. Power Energy Syst. 2021, 130, 106903. [Google Scholar] [CrossRef]
- Lei, H.; Huang, S.; Liu, Y.; Zhang, T. Robust Optimization for Microgrid Defense Resource Planning and Allocation against Multi-Period Attacks. IEEE Trans. Smart Grid 2019, 10, 5841–5850. [Google Scholar] [CrossRef]
- Jiang, P.; Huang, S.; Zhang, T. Optimal deception strategies in power system fortification against deliberate attacks. Energies 2019, 12, 342. [Google Scholar] [CrossRef]
- Xiang, Y.; Wang, L. An improved defender-attacker-defender model for transmission line defense considering offensive resource uncertainties. IEEE Trans. Smart Grid 2019, 10, 2534–2546. [Google Scholar] [CrossRef]
- Nemati, H.; Latify, M.A.; Yousefi, G.R. Coordinated generation and transmission expansion planning for a power system under physical deliberate attacks. Int. J. Electr. Power Energy Syst. 2018, 96, 208–221. [Google Scholar] [CrossRef]
- Arroyo, J.M.; Alguacil, N.; Carrión, M. A risk-based approach for transmission network expansion planning under deliberate outages. IEEE Trans. Power Syst. 2010, 25, 1759–1766. [Google Scholar] [CrossRef]
- Liu, X.; Ren, K.; Yuan, Y.; Li, Z.; Wang, Q. Optimal budget deployment strategy against power grid interdiction. In Proceedings of the Proceedings—IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 1160–1168. [Google Scholar]
- Wang, C.; Wei, W.; Wang, J.; Liu, F.; Qiu, F.; Correa-Posada, C.M.; Mei, S. Robust Defense Strategy for Gas-Electric Systems Against Malicious Attacks. IEEE Trans. Power Syst. 2017, 32, 2953–2965. [Google Scholar] [CrossRef]
- Liao, W.; Salinas, S.; Li, M.; Li, P.; Loparo, K.A. Cascading Failure Attacks in the Power System: A Stochastic Game Perspective. IEEE Internet Things J. 2017, 4, 2247–2259. [Google Scholar] [CrossRef]
- Bier, V.M.; Gratz, E.R.; Haphuriwat, N.J.; Magua, W.; Wierzbicki, K.R. Methodology for identifying near-optimal interdiction strategies for a power transmission system. Reliab. Eng. Syst. Saf. 2007, 92, 1155–1161. [Google Scholar] [CrossRef]
- Ouyang, M. Review on modeling and simulation of interdependent critical infrastructure systems. Reliab. Eng. Syst. Saf. 2014, 121, 43–60. [Google Scholar] [CrossRef]
- Bao, Z.J.; Cao, Y.J.; Wang, G.Z.; Ding, L.J. Analysis of cascading failure in electric grid based on power flow entropy. Phys. Lett. Sect. A Gen. At. Solid State Phys. 2009, 373, 3032–3040. [Google Scholar] [CrossRef]
- Koc, Y.; Warnier, M.; Kooij, R.E.; Brazier, F.M.T. A robustness metric for cascading failures by targeted attacks in power networks. In Proceedings of the 2013 10th IEEE International Conference on Networking, Sensing and Control, Evry, France, 10–12 April 2013; pp. 48–53. [Google Scholar]
- Paul, S.; Ni, Z. Vulnerability analysis for simultaneous attack in smart grid security. In Proceedings of the 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, Washington, DC, USA, 23–26 April 2017. [Google Scholar]
- Yan, J.; He, H.; Zhong, X.; Tang, Y. Q-Learning-Based Vulnerability Analysis of Smart Grid against Sequential Topology Attacks. IEEE Trans. Inf. Forensics Secur. 2017, 12, 200–210. [Google Scholar] [CrossRef]
- Sadeghian, O.; Nazari-Heris, M.; Abapour, M.; Taheri, S.S.; Zare, K. Improving reliability of distribution networks using plug-in electric vehicles and demand response. J. Mod. Power Syst. Clean Energy 2019, 7, 1189–1199. [Google Scholar] [CrossRef]
- Sadeghian, O.; Oshnoei, A.; Mohammadi-ivatloo, B.; Vahidinasab, V. A comprehensive review on electric vehicles smart charging: Solutions, strategies, technologies, and challenges. J. Energy Storage 2022, 54, 105241. [Google Scholar] [CrossRef]
- Sadeghian, O.; Mohammadpour Shotorbani, A.; Mohammadi-Ivatloo, B.; Sadiq, R.; Hewage, K. Risk-averse maintenance scheduling of generation units in combined heat and power systems with demand response. Reliab. Eng. Syst. Saf. 2021, 216, 107960. [Google Scholar] [CrossRef]
- Sadeghian, O.; Oshnoei, A.; Mohammadi-Ivatloo, B.; Vahidinasab, V. Concept, Definition, Enabling Technologies, and Challenges of Energy Integration in Whole Energy Systems To Create Integrated Energy Systems. In Whole Energy Systems; Springer: Cham, Switzerland, 2022; pp. 1–21. [Google Scholar]
- Sadeghian, O.; Moradzadeh, A.; Mohammadi-Ivatloo, B.; Vahidinasab, V. Active Buildings Demand Response: Provision and Aggregation. In Active Building Energy Systems; Springer: Cham, Switzerland, 2022; pp. 355–380. [Google Scholar]
- Sadeghian, O.; Oshnoei, A.; Khezri, R.; Muyeen, S.M. Risk-constrained stochastic optimal allocation of energy storage system in virtual power plants. J. Energy Storage 2020, 31, 101732. [Google Scholar] [CrossRef]
- Tan, S.; Guerrero, J.M.; Xie, P.; Han, R.; Vasquez, J.C. Brief Survey on Attack Detection Methods for Cyber-Physical Systems. IEEE Syst. J. 2020, 14, 5329–5339. [Google Scholar] [CrossRef]
- Dörfler, F.; Pasqualetti, F.; Bullo, F. Distributed detection of cyber-physical attacks in power networks: A waveform relaxation approach. In Proceedings of the 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Allerton, Monticello, IL, USA, 28–30 September 2011; pp. 1486–1491. [Google Scholar]
- Do, V.L.; Fillatre, L.; Nikiforov, I. A statistical method for detecting cyber/physical attacks on SCADA systems. In Proceedings of the 2014 IEEE Conference on Control Applications (CCA), Juan Les Antibes, France, 8–10 October 2014; pp. 364–369. [Google Scholar]
- Bi, W.; Zhang, K.; Li, Y.; Yuan, K.; Wang, Y. Detection Scheme against Cyber-Physical Attacks on Load Frequency Control Based on Dynamic Characteristics Analysis. IEEE Syst. J. 2019, 13, 2859–2868. [Google Scholar] [CrossRef]
- Li, Z.; Shahidehpour, M.; Alabdulwahab, A.; Abusorrah, A. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems. IEEE Trans. Smart Grid 2016, 7, 2260–2272. [Google Scholar] [CrossRef]
- Zio, E.; Golea, L.R. Analyzing the topological, electrical and reliability characteristics of a power transmission system for identifying its critical elements. Reliab. Eng. Syst. Saf. 2012, 101, 67–74. [Google Scholar] [CrossRef]
- Ma, C.Y.T.; Yau, D.K.Y.; Lou, X.; Rao, N.S.V. Markov game analysis for attack-defense of power networks under possible misinformation. IEEE Trans. Power Syst. 2013, 28, 1676–1686. [Google Scholar] [CrossRef]
- Delgadillo, A.; Arroyo, J.M.; Alguacil, N. Analysis of electric grid interdiction with line switching. IEEE Trans. Power Syst. 2010, 25, 633–641. [Google Scholar] [CrossRef]
- Zhao, L.; Zeng, B. Vulnerability analysis of power grids with line switching. IEEE Trans. Power Syst. 2013, 28, 2727–2736. [Google Scholar] [CrossRef]
- Yuan, W.; Zhao, L.; Zeng, B. Optimal power grid protection through a defender-attacker-defender model. Reliab. Eng. Syst. Saf. 2014, 121, 83–89. [Google Scholar] [CrossRef]
- Arroyo, J.M.; Galiana, F.D. On the solution of the bilevel programming formulation of the terrorist threat problem. IEEE Trans. Power Syst. 2005, 20, 789–797. [Google Scholar] [CrossRef]
- Gao, B.; Shi, L. Modeling an Attack-Mitigation Dynamic Game-Theoretic Scheme for Security Vulnerability Analysis in a Cyber-Physical Power System. IEEE Access 2020, 8, 30322–30331. [Google Scholar] [CrossRef]
- Zeraati, M.; Aref, Z.; Latify, M.A. Vulnerability Analysis of Power Systems under Physical Deliberate Attacks Considering Geographic-Cyber Interdependence of the Power System and Communication Network. IEEE Syst. J. 2018, 12, 3181–3190. [Google Scholar] [CrossRef]
- Fang, Y.; Sansavini, G. Optimizing power system investments and resilience against attacks. Reliab. Eng. Syst. Saf. 2017, 159, 161–173. [Google Scholar] [CrossRef]
- Jian, Z.; Shi, L.; Yao, L.; Masoud, B. Electric grid vulnerability assessment under attack-defense scenario based on game theory. In Proceedings of the Asia-Pacific Power and Energy Engineering Conference, Hong Kong, China, 8–11 December 2013; pp. 1–5. [Google Scholar]
- Nezamoddini, N.; Mousavian, S.; Erol-Kantarci, M. A risk optimization model for enhanced power grid resilience against physical attacks. Electr. Power Syst. Res. 2017, 143, 329–338. [Google Scholar] [CrossRef]
- Li, Z.; Shahidehpour, M.; Alabdulwahab, A.; Abusorrah, A. Analyzing locally coordinated cyber-physical attacks for undetectable line outages. IEEE Trans. Smart Grid 2018, 9, 35–47. [Google Scholar] [CrossRef]
- Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B. Optimization strategies for the vulnerability analysis of the electric power grid*. SIAM J. Optim. 2010, 20, 1786–1810. [Google Scholar] [CrossRef]
- Mohammadi, F. Emerging challenges in smart grid cybersecurity enhancement: A review. Energies 2021, 14, 1380. [Google Scholar] [CrossRef]
References | Methods for Minimzing Load Interruptions |
---|---|
[2] | Lower level of a bi-level optimization model after the attack |
[6] | First objective of a bi-objective model of a transmission expansion planning problem |
[7] | Lower level of a bi-level optimization model by reconfiguration after the attack |
[13,19,20,21] | The objective function was to minimize the amount of total interrupted loads. |
[15] | Lower level of a tri-level optimization model during the restoration process |
[22] | First objective of a tri-objective model of a transmission expansion planning problem |
[23,24] | Upper level of a tri-level model of a transmission expansion planning problem |
[25] | First objective of a bi-objective model of a transmission expansion planning problem |
[26] | Lower level of a tri-level optimization model during the restoration process |
[27] | Upper and lower levels of a tri-level optimization model for before and after the attack |
[28] | The first objective of a bi-objective optimization model for a resiliency problem |
[29] | The system defender minimizes the load interruption after the attack at the lower level of a tri-level optimization model |
[30] | The system defender minimizes the load interruption after the attack at the lower level of a tri-level optimization model |
[31] | Lower level of a tri-level optimization model after the attack |
[32] | Lower level of a tri-level optimization model after the attack |
References | Studied Cases |
---|---|
[13] | IEEE-39 bus system |
[14,37] | IEEE 9-bus system IEEE 30-bus system IEEE 118-bus system |
[42] | W&W 6-bus system IEEE 30-bus system |
[43] | IEEE 5-bus, IEEE RTS-79, IEEE 300-bus |
Types of Attack | References |
---|---|
Single attack | [12,55,56] |
Multiple attacks | 1 and 2 lines [28,35] 1, 2, and 3 lines [30] 1, 2, 3, and 5 lines [23,24] 1–7 lines [27] 1–12 lines [16,57,58,59] 2 lines [14,20,31,37] 2, 3, or 4 lines in each seasonal sample day [6] 2–5 lines [29] 2, 3, 4, and 6 lines [15] 2, 4, and 6 lines [7,63] 2 and 6 lines [33,64] 2, 10, and 28 lines [22] 3 lines [2,32,36,65,66] 3 lines and 5 [42] 4 lines [26,67] 5 lines [21,25] 6 lines [13,60,61] 6, 9, and 15 lines [43] 10 lines [62] 10 and 28 lines [34] 11 lines [38] All lines [19] |
References | Number of Time Periods |
---|---|
[2] | 3 time periods |
[6] | 96 time periods (for four seasonal days of the year) |
[13] | 14 stages |
[15] | 24 time periods (for hourly periods of the day) |
[26] | 24 time periods (for hourly periods of the day) |
[28] | 3 time periods (for base load, peak load, and mean load in a typical day of year) |
[30] | 3 time periods |
[33] | 12 time periods (for 12 months of the year) |
[36] | 4 time periods (each time period was 6 h in a 24-h horizon) |
[43] | 6, 8, and 5 time period respectively for case studies I, II, and III |
Uncertainty Sources | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
References | Expansion Budget | Defense Targets | Attack Targets | Investment Cost for Energy Storage | Total Capacity of Energy Storage to be Installed | Maximum Number of Buses for Energy Storage Installation | Investment for DG Units Allocation | Load Demand | Attacker Budget (Resources) | Defense Budget (Resources) | Total Number of Lines to be Attacked | Total Number of Lines to be Defended | Level of Load Shed by Attacker | Maximum Number of Lines to be Hidden for Deception | Fortification/Hardening Budget | Restoration Duration | Investment in TLs Switching | Maximum Number of Lines Allowed to be Switchable | Location (Bus) of Control Center | Success Probabilities of Attacks | The Proportion of Post-Allocated DG Units | Attack Time | Maximum Number of Components to be Simultaneously Attacked |
[2] | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||
[6,23,24] | ✓ | ||||||||||||||||||||||
[15] | ✓ | ✓ | |||||||||||||||||||||
[19,27] | ✓ | ✓ | |||||||||||||||||||||
[20,64] | ✓ | ||||||||||||||||||||||
[25,34] | ✓ | ||||||||||||||||||||||
[26] | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||||||||
[28] | ✓ | ||||||||||||||||||||||
[29] | ✓ | ✓ | ✓ | ||||||||||||||||||||
[30] | ✓ | ✓ | ✓ | ||||||||||||||||||||
[31] | ✓ | ✓ | |||||||||||||||||||||
[32] | ✓ | ||||||||||||||||||||||
[36] | ✓ | ✓ | |||||||||||||||||||||
[43] | ✓ | ||||||||||||||||||||||
[57] | ✓ | ||||||||||||||||||||||
[60] | ✓ | ||||||||||||||||||||||
[62] | ✓ | ✓ | ✓ | ||||||||||||||||||||
[63] | ✓ | ✓ | ✓ |
References | Generation Expansion | Transmission Expansion | Reinforcing Existing Lines | Switch Installation | Sensitivity Analysis of Investment Cost |
---|---|---|---|---|---|
[6] | ✓ | ✓ | |||
[22] | ✓ | ✓ | ✓ | ||
[23,24] | ✓ | ✓ | |||
[25] | ✓ | ✓ | ✓ | ||
[33] | ✓ | ✓ | ✓ | ||
[34] | ✓ | ✓ | ✓ | ||
[63] | ✓ | ✓ | ✓ |
References | Energy Resources | Energy Storage Systems | |
---|---|---|---|
Conventional Generators | Diesel Generator | ||
[6] | ✓ | ✓ | |
[15] | ✓ | ✓ | |
[26] | ✓ | ✓ | |
[27] | ✓ | ✓ | |
[28] | ✓ | ✓ | |
[29] | ✓ | ✓ | |
[30] | ✓ | ✓ | |
[36] | ✓ | ✓ |
Types of Objective Functions | References |
---|---|
Single-Objective Models | [12,13,19,20,21,37,38,42,43,55,65,66] |
Multiple Objectives Models | Bi-objective [6,25,28,34] Tri-objective [22] |
Competitive Models (Competitive between the operator and attacker) | [14,16,56,60,63,64,67] |
Multiple level | Bi-level [2,7,33,35,57,58,62] Tri-level [15,23,24,26,27,29,30,31,32,36,59,61] |
References | Objective Functions | Defender Budget | Attacker Budget | Optimization Methods | Test Systems |
---|---|---|---|---|---|
[12] | Minimum expected unserved load cost caused by attacking the critical TL | Protection budget, recovery budget | 1 TL was targeted | A game framework | A 5-bus system, IEEE 300-bus system |
[13] | Maximum load curtailment by the attacker (physical and load redistribution attack) | Without defense | 6 TLs were attacked in every stage | Gurobi solver under YALMIP toolbox of MATLAB (The DC optimal power flow was solved by Matpower6.0) | IEEE 39-bus system |
[19] | Minimum total load curtailment | Prevent the load interruption from exceeding a certain threshold | Non-limited | CPLEX solver under Python | IEEE 14-bus System, IEEE RTS 96, IEEE 30-bus system |
[20] | Minimizing the maximum expected unserved energy | Defense resource | Maximum 2 targets were targeted | A game theory framework | A 5-bus system, IEEE RTS 96 |
[21] | Minimum expected load interruption | 2 lines were defended | 5 lines were targeted as the worst-case attack | C&CG algorithm | IEEE RTS 96 |
[37] | Maximum total load curtailment cost | Without defense | 2 TLs were targeted | MATPOWER toolbox under MATLAB | IEEE 9-bus system, IEEE 30-bus system, IEEE 118-bus system |
[38] | Minimum combined cost of generation and unserved loads | 15 TLs were hardened | 11 TLs were attacked | Greedy algorithm | IEEE RTS 96, IEEE Two Area RTS-96 |
[42] | Identification of the attack combination with the strongest damage | Without defense | Maximum 3 and 5 TLs were targeted, (respectively for test systems I and II) | DCSIMSEP cascading failure simulator | W&W 6-bus system, IEEE 30-bus system |
[43] | Identifying of the minimal attack sequence that caused cascading outages | Without defense | 6, 9, and 15 TLs were required for blackout (respectively for case studies I, II, and III) | A cascading failure simulator | IEEE 5-bus system, IEEE RTS 79, IEEE 300-bus system |
[55] | Identifying the most vulnerable TL | Without defense | Only 1 TL was targeted | The graph-theoretical (topological) network analysis | IEEE RTS 96 |
[65] | Minimum investment costs for increasing reliable protections of TLs | Investment based on load shed threshold | Maximum 3 lines were targeted | CPLEX Optimization Studio | IEEE 24-bus system, IEEE 57-bus system |
[66] | Maximizing the system risk from the viewpoint of attacker | Without defense | Maximum 3 lines were targeted | CPLEX solver under GAMS | A 6-bus system, IEEE RTS 96 |
References | Objective Functions | Defender Budget | Attacker Budget | Methods for Multi-Objective Optimization | Optimization Methods | Test Systems |
---|---|---|---|---|---|---|
[6] | (1) Minimum weighted average energy not supplied (2) Minimum total annual investment for new TLs and energy storage systems + cost of unserved loads + operation costs of energy storage systems and generators | Expansion budget for transmission and energy storage (i.e., 6 M$) | Maximum 2, 3, or 4 TLs were attacked in each sample seasonal day | Weighted sum | CPLEX solver under GAMS | IEEE 30-bus system |
[22] | (1) Minimum expected loss of load (2) Minimum expected cost of load shed (3) Minimum investment cost | Transmission expansion planning budget | 2, 10, and 28 TLs were attacked | Weighted sum | Branch-and-cut software | Two Area IEEE RTS-96 |
[25] | (1) Minimum load shed associated with each attack plan with its degree of importance (2) Minimum investment cost | Transmission expansion planning budget | Maximum 5 TLs were attacked | Weighted parameter | CPLEX solver under GAMS | The Garver’s six-node test system |
[28] | (1) Minimum unserved load (2) Minimum total cost (investment cost for energy storage and production cost of generators) | Investment for energy storage (i.e., 12 M$) | 1 or 2 TLs were attacked | Weighted sum | CPLEX solver under GAMS | A 5-bus system |
[34] | (1) Minimum risk of vulnerability of the transmission network against physical attacks (2) Minimum investment cost and the cost of nodal weighted average unserved demand | Transmission expansion planning budget | Maximum 10 TLs were targeted | Weighted sum | CPLEX solver under GAMS | The Two Area IEEE RTS-96 |
References | Objective Functions | Defender Budget | Attacker Budget | Methods for Multi-Objective Optimization | Optimization Methods | Test Systems |
---|---|---|---|---|---|---|
[14] | Attacker *: Maximum total unserved load cost Operator: Minimum total unserved load cost | 1 TL was defended | 2 TL was attacked | A zero-sum stochastic game | MATPOWER toolbox | IEEE 9-bus system, IEEE 30-bus system, IEEE 118 bus system |
[16] | Attacker: maximum total lost load for a given number of simultaneously destroyed TLs Defender: minimum load interruption under the combination of destroyed TLs (by lines’ switching plan) | Lines’ switching plan | Maximum 12 TLs were targeted | A proposed approach based on genetic algorithm | Genetic algorithm | IEEE RTS 96 |
[56] | Attacker: maximum unserved load by targeting TLs (even a damaged TL to increase the probability of recovery in a time period Defender: reinforcing healthy TLs and repairing damaged TLs | 1 TL was defended | 1 TL was attacked | Zero-sum Markov games | Markov decision processes | A 5-bus system, WECC 9-bus system, IEEE 14-bus system |
[60] | Attacker: minimum total number of TLs that must be destroyed in order to cause a minimum load interruption level Defender: minimum system load interruption by corrective actions | Redispatch of resources to minimize the lost load | A Specified loss of load level | Karush–Kuhn–Tucker optimality conditions | CPLEX solver under GAMS | A 5-bus system, IEEE RTS 96 |
[67] | Attacker: minimum attack cost of the maximum damage (finding a small group of TLs that could cause a severe blackout) Defender: minimum total unserved load | Without defense | 4 TLs were targeted | Zero-sum game theory | Spectral graph theory | IEEE 30-bus system |
[63] | Network planner: minimum total investment cost and operation cost before a physical attack Attacker: maximum system disruptions (i.e., unserved load) System operator: re-dispatching resources through healthy TLs to minimize unserved load after the attack | Investment budget on transmission expansion and switching | Maximum 6 TLs were targeted | Karush-Kuhn-Tucker optimality conditions and C&CG algorithm | CPLEX Optimization Studio | A modified version of IEEE 14-bus system |
[64] | Attacker: maximum unserved demand Defender: minimum total unserved load | 2–6 units as defense resources | 2–6 TLs were attacked | Game theory | Game theory | A 5-bus system |
References | Objective Functions | Defender Budget | Attacker Budget | Methods for Multi-Level Optimization | Optimization Methods | Test Systems |
---|---|---|---|---|---|---|
[2] | Upper level (Attacker) *: identify the critical TLs Lower level (Operator): minimizing the maximum lost load caused by a set of attacks | Maximum 0–9 (Case I) and 1–6 (Case II) TLs in each time period/dimension | Maximum 2–7 (Case I) and 7 (Case II) TLs in each time period | C&CG method | CPLEX solver under MATLAM toolbox | IEEE RTS 79, IEEE 118-bus system |
[7] | Upper level (Attacker): conducting the greatest load interruption Lower level (Defender): minimum unserved load by reconfiguration (line switching) and redispatch of available resources | ✕ | 2, 4, and 6 TLs were attacked | Not specified | Genetic algorithm | IEEE RTS 96 |
[33] | Upper level (Attacker): maximum lost load Lower level (system operator): multi-objective 1: minimum EENS 2: minimum investment cost + operation cost + EENS cost | Generation and transmission expansion budget | 2 and 6 TLs were targeted | Weighted sum | CPLEX solver under GAMS | IEEE RTS 96 |
[35] | Upper level (Attacker): identifying the minimum total number of attacked TLs to cause the damage effect greater than a specified value LS Lower level (Control center): minimum operation cost plus load interruption penalty | Retain the damage effect cost ($/h) in a minimum level i.e., 78,000 $/h (16,539.2$ defense budget was required) | 140 units of disruptive cost (1 or 2 TLs were sufficient for damage cost of 78,000 $/h) | Primal-dual interior-point method | Primal-dual interior-point method | IEEE 5-bus system |
[57] | Upper level (disruptive agent): maximum load shed for a given number of simultaneously destroyed TLs Lower level (system operator): minimum load interruption under the destroyed TLs | ✕ | Maximum 12 TLs could be targeted | Benders decomposition | CPLEX solver under GAMS | IEEE RTS 96 |
[58] | Upper level (Attacker): minimum load interruption Lower-level (system operator): maximum unserved load | ✕ | Attack budget indexes 5, 12, 6, and 2 (respectively for case studies I, II, III, and IV) | C&CG algorithm | CPLEX Optimization Studio | A 7-bus system, IEEE RTS-96 system, IEEE Three-Area RTS-96 system, IEEE 118-Bus system |
[62] | Upper level (attacker): maximum total load interruption Lower level (defender): minimum load shedding + change in the production of generation units | ✕ | Maximum 10 TLs could be attacked | Karush–Kuhn–Tucker optimality conditions and duality theory | Upper level: The Genetic algorithm Lower level: CPLEX solver under GAMS | IEEE RTS 96 |
References | Objective Functions | Defender Budget | Attacker Budget | Methods for Multi-Level Optimization | Optimization Methods | Test Systems |
---|---|---|---|---|---|---|
[15] | Upper level (operator before the attack) *: minimum generation fuel cost, energy storage operating cost, and unserved load cost Middle level (disruptive agent): maximum unserved energy Lower level (operator following the attack): minimum unserved energy during the restoration process | ✕ | Maximum number of concurrent attacks (2, 3, and 4 TLs were attacked) | A duality theorem together with C&CG method | CPLEX solver under GAMS | The WSCC 9-bus system, IEEE 57-bus system |
[23,24] | Upper level (network planner): Multi-objective (1) minimum vulnerability of the system (load shed amount) (2) minimum TL construction cost and operation cost (unserved load cost and operating cost of generators) Middle level (disruptive agents): Multi-objective (1) maximum network vulnerability (load interruption)(2) maximum network operation cost Lower level (system operator): minimizing the same objective of attacker | Case I: 60 M$ Case II: 100 M$ | Case 1: All TLs could be attacked Case II: maximum 3 TLs could be attacked | Primal-dual transformation | CPLEX solver under GAMS | The Garver network, A modified version of IEEE 30-bus network |
[26] | Upper level (system defender): minimum system operation cost, installation cost of energy storage, and lost load cost caused by physical attacks Middle level (Attacker): maximum lost load during restoration process Lower level (Operator): minimum lost load during restoration process | Maximum number of buses for energy storage installation (5 buses) | Maximum number of concurrent attacks (2, 3, and 4 TLs were attacked) | A duality theorem | C&CG method | IEEE 57-bus systems. |
[27] | Upper level (system defender): minimum load interruption by reconfiguration Middle level (Attacker): finding the attack scenario with maximum load interruption Lower level (Operator): finding the optimal islanding operation to maintain the minimal load interruption | 0–4 and 2–4 TLs were defended (respectively for cases I and II) | 1–5 and 3–7 TLs were attacked (respectively for cases I and II) | C&CG method | A proposed algorithm | IEEE-33-bus distribution system, 94-bus distribution system of Taiwan Power Company |
[29] | Upper level (system defender): Investment for TLs and DG units Middle level (Attacker): identifying a set of attacked lines with the highest load interruption Lower level (Operator): redispatch of resources and the placement of post-allocated DG units on the healthy part of microgrid with the aim of minimum lost interruption | Maximum 2–5 TLs were defended | Maximum 2–5 TLs were targeted | Karush-Kuhn-Tucker optimality conditions and Nested C&CG method | YALMIP toolbox of MATLAB (CPLEX solver) | IEEE 14-bus distribution system, IEE RTS 79 |
[30] | Top level (defender): Protecting TLs and allocating DG units before identifying the attack Middle level (attacker): maximum unserved load by disconnecting a set of TLs Bottom level (operator): minimum unserved load by redispatch of resources | Maximum 4 TLs were defended with the defending budgets (TLs budget: 0–6 unit DG: 0–8 units) | 3–5 units of attack budget | Customized C&CG technique | CPLEX solver under MATLAB toolbox | IEEE 30-bus distribution system |
[31] | Upper level (Defender): minimum power imbalance caused by the most destructive action of attacker Middle level (Attacker): maximum level of system power imbalance Lower level (Defender): minimum unserved energy after deception and attack | 3 TLs are protected | 2 TLs were targeted | A master-subproblem solution framework using C&CG strategy | CPLEX solver under the YALMIP toolbox of MATLAB | A 6-bus system, IEEE 57-bus system |
[32] | Upper level (security personnel): minimum unserved load considering the optimal attack strategy made by the intelligent attackers Middle level: (Attacker): maximum damage (i.e., load interruption) Lower level (operator): minimum unserved load | Maximum 2 and 3 TLs were defended (respectively for case study I and II) | Maximum 3 TLs were targeted | C&CG algorithm | CPLEX solver under MATLAB toolbox | IEEE RTS 79, IEEE 57-bus system |
[36] | Upper level (system defender): reinforcing the vulnerable TLs and increasing the system resilience Middle level (attacker): identifying the most threatening attack on the coupled physical infrastructures Lower level (operator): minimum total cost (including unserved power and gas costs and operational costs | Maximum 3 TLs were defensed | Maximum 3 TLs were attacked | Nested C&CG algorithm | YALMIP toolbox of MATLAB | A hybrid 6-bus power system with 7-node gas system |
[59] | Upper level (defender): allocating defensive resources to protect TLs before the attack Middle level (attacker): maximum unserved load by disconnecting a set of TLs Lower level (operator): reacts to disruption redispatch of resources | Budget of protecting TLs (4 lines) | Budget of attacking TLs (1–12 lines) | C&CG algorithm | CPLEX solver under GAMS | IEEE RTS 96 |
[61] | Lower level (defender based on the in-danger elements): minimum load interruption Middle level (attacker based on the defender strategy): maximum load interruption and the recovery time by allocating attack resources Upper level (defender based on the attacked TLs): minimum unserved load through allocating defense resources | Maximum 6 TLs were defended | Maximum 6 TLs were attacked | Dynamic game theory | Lower level: sequential quadratic programming Middle level: sequential quadratic programming Upper level: particle swarm optimization algorithm | A 5-bus system, IEEE 39-bus system |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sadeghian, O.; Mohammadi-Ivatloo, B.; Mohammadi, F.; Abdul-Malek, Z. Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review. Sustainability 2022, 14, 12345. https://doi.org/10.3390/su141912345
Sadeghian O, Mohammadi-Ivatloo B, Mohammadi F, Abdul-Malek Z. Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review. Sustainability. 2022; 14(19):12345. https://doi.org/10.3390/su141912345
Chicago/Turabian StyleSadeghian, Omid, Behnam Mohammadi-Ivatloo, Fazel Mohammadi, and Zulkurnain Abdul-Malek. 2022. "Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review" Sustainability 14, no. 19: 12345. https://doi.org/10.3390/su141912345