kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A tri-level programming-based frequency regulation market equilibrium under cyber attacks
Southeast University, Nanjing, China.
China University of Mining and Technology, Xuzhou, China.
State Grid Jiangsu Electric Power Company Ltd. Research Institute, Nanjing, China.
KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering.
Show others and affiliations
2023 (English)In: Protection and Control of Modern Power Systems, ISSN 2367-2617, Vol. 8, no 1, article id 55Article in journal (Refereed) Published
Abstract [en]

Owing to their flexibility and rapid response, grid-connected distributed energy resources (DERs) are wielding growing influence in frequency regulation markets (FRMs). Nevertheless, compared with conventional large-scale generators, small-scale DERs are usually weakly shielded by cyber security measures. This offers attackers the opportunity of disrupting the clearing and settlement of FRMs by manipulating the bid information of DERs. In this paper, the frequency regulation market equilibrium is studied considering the dynamic gaming between attackers and defenders, both of which need the knowledge of FRMs for their interventions. Specifically, a tri-level programming model characterizing the attacker–defender–operator (ADO) interdiction problem in FRMs is developed and then analyzed using a column and constraint generation algorithm, thereby achieving market equilibrium representing the defender's best response to the attacker. The defense strategy in the market equilibrium can attenuate the negative influence of cyber attacks upon the FRMs to the maximum extent. Finally, based on the operating rules of the California Independent System Operator, the FRM process considering the ADO interdiction is simulated and the numerical equilibrium results are presented.

Place, publisher, year, edition, pages
Springer Nature , 2023. Vol. 8, no 1, article id 55
Keywords [en]
Cyber attack, Defender–attacker–operator interdiction, Frequency regulation market, Tri-level programming
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-339712DOI: 10.1186/s41601-023-00332-8ISI: 001095375600001Scopus ID: 2-s2.0-85175843508OAI: oai:DiVA.org:kth-339712DiVA, id: diva2:1813209
Note

QC 20231120

Available from: 2023-11-20 Created: 2023-11-20 Last updated: 2023-11-29Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Liu, Yilong
By organisation
Electrical Engineering
Other Electrical Engineering, Electronic Engineering, Information EngineeringComputer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 12 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf