Professional Documents
Culture Documents
calculated iteratively until the lower bound and upper bound (20)
merge, which means that the convergence is achieved and the (1 ( )) ( ) {0,1} (21)
obtained value is an optimal solution. () ( ) () ( )
( )= + ( ) (s)
The ULP and the LLP are explained in detail as follows.
, ( ( )) (22)
REFERENCES
[1] A. J. Wood, B. F. Wollenberg, and G. B. Shebl, Power generation,
operation, and control. 2nd ed. New York: John Wiley & Sons, Inc.;
1996.
[2] J. Salmeron, K. Wood, and R. Baldick, Analysis of Electric Grid
Security Under Terrorist Threat, IEEE Trans. Power Syst., vol. 19, no.
2, pp. 905912, May 2004.
[3] J. M. Arroyo and F. D. Galiana, On the Solution of the Bilevel
Programming Formulation of the Terrorist Threat Problem, IEEE
Trans. Power Syst., vol. 20, no. 2, pp. 789797, May 2005.
[4] W. Yuan, L. Zhao and B. Zeng, Optimal power grid protection
through a defenderattackerdefender model, Reliability Engineering
& System Safety, vol. 121, pp. 83-89, Jan. 2014.
[5] N. Alguacil, A. Delgadillo, and J. M. Arroyo, A trilevel programming
Fig. 3 Illustration of the attack and defense strategies for case 2. approach for electric grid defense planning, Computers & Operations
The optimal defense strategy is to protect lines {4-9, 6- Research, vol. 41, pp. 282-290, Jan. 2014.
10, 14-16}, {11-14, 16-17, 16-19}, {11-13, 14-16, 15-21} [6] B. Zeng, and L. Zhao, Solving two-stage robust optimization
problems using a column-and-constraint generation method,
and {10-12, 12-23, 14-16} for defending against single attack Operations Research Letters, vol. 141, pp. 457-461, Sept. 2013.
scenarios 1 (offensive resource is 2), scenarios 2 (offensive [7] Y. Xiang, and L. Wang, A game-theoretic approach to optimal defense
resource is 3), scenarios 3 (offensive resource is 4), scenarios strategy against load redistribution attack, in IEEE Power & Energy
4 (offensive resource is 5), respectively. Similar to case 1, Society General Meeting, 2015.
[8] L. Wei, A. Sarwat, W. Saad, and S. Biswas, Stochastic Games for
comparative study results are provided to show the Power Grid Protection Against Coordinated Cyber-Physical Attacks,
performance of different defense strategies under different IEEE Trans. on Smart Grid, 2016, in press.
attack scenarios, as shown in Table IV. [9] C. Y. T. Ma, D. K. Y. Yau, X. Lou, N. S. V. Rao, "Markov Game
Table IV. Comparative studies for case 2 Analysis for Attack-Defense of Power Networks Under Possible
Load loss (MW) Misinformation", IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1676-
Defended Attack Attack Attack Attack 1686, 2012.
lines scenario scenario scenario scenario Expected [10] C. Liu, C. Lee, H. Chen, and S. Mehrotra, Stochastic robust
1 2 3 4 mathematical programming model for power system optimization,
IEEE Trans. Power Syst., 2016, in press.
14-16, 15-
1.36 1.8 3.42 6.48 2.828 [11] H. Ye, J. Wang, and Z. Li, MIP Reformulation for Max-min Problems
21, 16-19
in Two-stage Robust SCUC, IEEE Trans. Power Syst., 2016, in press.
4-9, 6-10,
0.71 3.09 3.87 6.48 3.265 [12] H. Ye, J. Wang, Y. Ge, J. Li, and Z. li, Robust Integration of High-
14-16
level Dispatchable Renewables in Power System Operation, IEEE
11-14, 16-
1.360 1.80 5.16 8.42 3.718 Trans. Sustainable Energy, 2016, in press.
17, 16-19
[13] G. Chen, Z. Y. Dong, D. J. Hill, and Y. S. Xue, Exploring Reliable
11-13, 14-
1.36 3.09 3.22 6.48 3.145 Strategies for Defending Power Systems Against Targeted Attacks,
16, 15-21
IEEE Trans. Power Syst., vol. 26, no. 3, pp. 10001009, Aug. 2011.
10-12, 12-
1.36 3.09 3.87 4.48 3.195 [14] G. P. McCormick, Computability of global solutions to factorable
23, 14-16
nonconvex programs: Part I Convex underestimating problems,
By comparing the expected load loss, which is calculated Mathematical Programming, vol. 10, pp. 146175, 1976.
considering all the four attack scenarios and the related [15] P. M. Subcommittee, IEEE reliability test system, IEEE
probabilities, it is concluded that the proposed MAS Transactions on Power Apparatus and Systems, vol. PAS-98, no. 6, pp.
2047-2054, Nov. 1979.