A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks
Price tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Frontiers Media S.A.
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/881eb0e5f27b4fd295668824b98023c1 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:881eb0e5f27b4fd295668824b98023c1 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:881eb0e5f27b4fd295668824b98023c12021-11-30T23:00:18ZA Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks2296-598X10.3389/fenrg.2021.763260https://doaj.org/article/881eb0e5f27b4fd295668824b98023c12021-11-01T00:00:00Zhttps://www.frontiersin.org/articles/10.3389/fenrg.2021.763260/fullhttps://doaj.org/toc/2296-598XPrice tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a space-based cumulative intrusion detection method is proposed to pick up the discrepancy under tampering attacks. To verify the practicability of the proposed method, intrusion detection experiments are tested in the Principal Information and Safety Laboratory. Then, comprehensively considering the purchase of electricity from the power grid, self-generation, and load shedding, a quantitative model of attack consequences is established based on the allocation coefficient. Thus, the intrusion detection algorithm is used as a defense resource, and a demand-side defense protection strategy is formed to find an optimal deployment method based on non-cooperative game theory. The defensive protection strategy takes the quantitative model of attack consequences as the solution target, and solves the Nash equilibrium solution under different attack modes. Finally, in the IEEE-33 node system simulations, the defense resource is deployed using intrusion detection strategy, and the defense decision is executed to show the effectiveness of the comprehensive protection strategies.Rong FuJie ChenXiaofei ZhangJie ZhangFrontiers Media S.A.articlecyber-physical systemdemand side defenseprice tampering attackgame theoryload sheddingGeneral WorksAENFrontiers in Energy Research, Vol 9 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
cyber-physical system demand side defense price tampering attack game theory load shedding General Works A |
spellingShingle |
cyber-physical system demand side defense price tampering attack game theory load shedding General Works A Rong Fu Jie Chen Xiaofei Zhang Jie Zhang A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks |
description |
Price tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a space-based cumulative intrusion detection method is proposed to pick up the discrepancy under tampering attacks. To verify the practicability of the proposed method, intrusion detection experiments are tested in the Principal Information and Safety Laboratory. Then, comprehensively considering the purchase of electricity from the power grid, self-generation, and load shedding, a quantitative model of attack consequences is established based on the allocation coefficient. Thus, the intrusion detection algorithm is used as a defense resource, and a demand-side defense protection strategy is formed to find an optimal deployment method based on non-cooperative game theory. The defensive protection strategy takes the quantitative model of attack consequences as the solution target, and solves the Nash equilibrium solution under different attack modes. Finally, in the IEEE-33 node system simulations, the defense resource is deployed using intrusion detection strategy, and the defense decision is executed to show the effectiveness of the comprehensive protection strategies. |
format |
article |
author |
Rong Fu Jie Chen Xiaofei Zhang Jie Zhang |
author_facet |
Rong Fu Jie Chen Xiaofei Zhang Jie Zhang |
author_sort |
Rong Fu |
title |
A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks |
title_short |
A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks |
title_full |
A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks |
title_fullStr |
A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks |
title_full_unstemmed |
A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks |
title_sort |
comprehensive game theoretical defense strategy in demand side management against price tampering attacks |
publisher |
Frontiers Media S.A. |
publishDate |
2021 |
url |
https://doaj.org/article/881eb0e5f27b4fd295668824b98023c1 |
work_keys_str_mv |
AT rongfu acomprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks AT jiechen acomprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks AT xiaofeizhang acomprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks AT jiezhang acomprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks AT rongfu comprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks AT jiechen comprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks AT xiaofeizhang comprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks AT jiezhang comprehensivegametheoreticaldefensestrategyindemandsidemanagementagainstpricetamperingattacks |
_version_ |
1718406213412061184 |