Visible to the public An Efficient Computational Strategy for Cyber-Physical Contingency Analysis in Smart Grids

TitleAn Efficient Computational Strategy for Cyber-Physical Contingency Analysis in Smart Grids
Publication TypeConference Paper
Year of Publication2021
AuthorsEmadi, Hamid, Clanin, Joe, Hyder, Burhan, Khanna, Kush, Govindarasu, Manimaran, Bhattacharya, Sourabh
Conference Name2021 IEEE Power & Energy Society General Meeting (PESGM)
KeywordsApproximation algorithms, Computing Theory, Cyber-Physical Contingency Analysis, cyber-security, Games, Measurement, Metrics, Power system protection, power transmission lines, pubcrawl, Real-time Systems, security games, security metrics, Smart grids, Transmission line measurements
AbstractThe increasing penetration of cyber systems into smart grids has resulted in these grids being more vulnerable to cyber physical attacks. The central challenge of higher order cyber-physical contingency analysis is the exponential blow-up of the attack surface due to a large number of attack vectors. This gives rise to computational challenges in devising efficient attack mitigation strategies. However, a system operator can leverage private information about the underlying network to maintain a strategic advantage over an adversary equipped with superior computational capability and situational awareness. In this work, we examine the following scenario: A malicious entity intrudes the cyber-layer of a power network and trips the transmission lines. The objective of the system operator is to deploy security measures in the cyber-layer to minimize the impact of such attacks. Due to budget constraints, the attacker and the system operator have limits on the maximum number of transmission lines they can attack or defend. We model this adversarial interaction as a resource-constrained attacker-defender game. The computational intractability of solving large security games is well known. However, we exploit the approximately modular behaviour of an impact metric known as the disturbance value to arrive at a linear-time algorithm for computing an optimal defense strategy. We validate the efficacy of the proposed strategy against attackers of various capabilities and provide an algorithm for a real-time implementation.
DOI10.1109/PESGM46819.2021.9637857
Citation Keyemadi_efficient_2021