A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks

Price tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Rong Fu, Jie Chen, Xiaofei Zhang, Jie Zhang
Formato: article
Lenguaje:EN
Publicado: Frontiers Media S.A. 2021
Materias:
A
Acceso en línea:https://doaj.org/article/881eb0e5f27b4fd295668824b98023c1
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:881eb0e5f27b4fd295668824b98023c1
record_format dspace
spelling oai:doaj.org-article:881eb0e5f27b4fd295668824b98023c12021-11-30T23:00:18ZA Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks2296-598X10.3389/fenrg.2021.763260https://doaj.org/article/881eb0e5f27b4fd295668824b98023c12021-11-01T00:00:00Zhttps://www.frontiersin.org/articles/10.3389/fenrg.2021.763260/fullhttps://doaj.org/toc/2296-598XPrice tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a space-based cumulative intrusion detection method is proposed to pick up the discrepancy under tampering attacks. To verify the practicability of the proposed method, intrusion detection experiments are tested in the Principal Information and Safety Laboratory. Then, comprehensively considering the purchase of electricity from the power grid, self-generation, and load shedding, a quantitative model of attack consequences is established based on the allocation coefficient. Thus, the intrusion detection algorithm is used as a defense resource, and a demand-side defense protection strategy is formed to find an optimal deployment method based on non-cooperative game theory. The defensive protection strategy takes the quantitative model of attack consequences as the solution target, and solves the Nash equilibrium solution under different attack modes. Finally, in the IEEE-33 node system simulations, the defense resource is deployed using intrusion detection strategy, and the defense decision is executed to show the effectiveness of the comprehensive protection strategies.Rong FuJie ChenXiaofei ZhangJie ZhangFrontiers Media S.A.articlecyber-physical systemdemand side defenseprice tampering attackgame theoryload sheddingGeneral WorksAENFrontiers in Energy Research, Vol 9 (2021)
institution DOAJ
collection DOAJ
language EN
topic cyber-physical system
demand side defense
price tampering attack
game theory
load shedding
General Works
A
spellingShingle cyber-physical system
demand side defense
price tampering attack
game theory
load shedding
General Works
A
Rong Fu
Jie Chen
Xiaofei Zhang
Jie Zhang
A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks
description Price tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a space-based cumulative intrusion detection method is proposed to pick up the discrepancy under tampering attacks. To verify the practicability of the proposed method, intrusion detection experiments are tested in the Principal Information and Safety Laboratory. Then, comprehensively considering the purchase of electricity from the power grid, self-generation, and load shedding, a quantitative model of attack consequences is established based on the allocation coefficient. Thus, the intrusion detection algorithm is used as a defense resource, and a demand-side defense protection strategy is formed to find an optimal deployment method based on non-cooperative game theory. The defensive protection strategy takes the quantitative model of attack consequences as the solution target, and solves the Nash equilibrium solution under different attack modes. Finally, in the IEEE-33 node system simulations, the defense resource is deployed using intrusion detection strategy, and the defense decision is executed to show the effectiveness of the comprehensive protection strategies.
format article
author Rong Fu
Jie Chen
Xiaofei Zhang
Jie Zhang
author_facet Rong Fu
Jie Chen
Xiaofei Zhang
Jie Zhang
author_sort Rong Fu
title A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks
title_short A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks
title_full A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks
title_fullStr A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks
title_full_unstemmed A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks
title_sort comprehensive game theoretical defense strategy in demand side management against price tampering attacks
publisher Frontiers Media S.A.
publishDate 2021
url https://doaj.org/article/881eb0e5f27b4fd295668824b98023c1
work_keys_str_mv AT rongfu acomprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks
AT jiechen acomprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks
AT xiaofeizhang acomprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks
AT jiezhang acomprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks
AT rongfu comprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks
AT jiechen comprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks
AT xiaofeizhang comprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks
AT jiezhang comprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks
_version_ 1718406213412061184