Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

New Optimization and Security Approaches to

Enhance the Smart Grid Performance and Reliability


Mohamed Attia, Sidi Mohammed Senouci and El-Hassane Aglzim
DRIVE EA1859, Univ. Bourgogne Franche Comté, F58000, Nevers France
Contact authors:{mohamed.attia,, Sidi-Mohammed.Senouci, el-hassane.aglzim }@u-bourgogne.fr

Abstract—Nowadays, the Smart Grid (SG) is becoming smarter


thanks to the integration of different information and II. PROPOSED GAME MODEL TO OPTIMALLY INTEGRATE EVS
communication technologies to enhance the reliability and INTO THE SG
efficiency of the power grid. However, several issues should be met In this section, we define the proposed theoretic game model
to ensure high SG performance. Among these issues, we cite the
problem of electric vehicles (EVs) integration into the SG to avoid
to integrate EVs into the SG. We provide the payoff matrix of
electricity intermittence due to the important load that EVs can the game related to our two players, which are: the SG as
create. Another issue is the SG communication network security electricity supplier and the EV as consumer.
that can be attempted by malicious intruders in order to create
A. Game formulation
damages and make the power grid instable. In this context, we
propose at a first level a Bayesian game-theory model that aims to In our approach, we consider two players: the SG and the
integrate optimally EVs into the SG and maintain the equilibrium EV. Each player chooses to perform a specific action (i.e.
between the offer and the demand. At a second level, we propose strategy) in order to maximize its payoff [3]. We note that, in
an Intrusion Detection System (IDS) to protect the SG from game theory concept, players are rational and want to maximize
attacks that aim to disturb the state estimation. Numerical results their own payoff [4][5]. JSG and JEV denote the SG and the EV
prove the efficiency and robustness of our proposed models. players, respectively. The SG can perform one of these two pure
Keywords—Smart Grid, Game Theory, Bayesian Nash
strategies: deliver the electricity or not deliver. the EV can
Equilibrium, Electric Vehicles, Intrusion Detection System. choose one of these two pure strategies: charge or not charge. In
this game, we divide time into regular intervals called time-slots;
I. INTRODUCTION each one of them represents a stage. However, at each stage there
The smart grid, known as next-generation power system, has is an interaction between the SG and an EV. Therefore, with the
the ambition to greatly enhance efficiency and reliability of help of Bayesian game concept, we model the different strategies
future power systems with renewable energy resources. The that could occur between an EV and the SG. The future state
emergence of Electric Vehicles (EVs) in the power grid has prediction for the behavior of each one is determined thanks to
created a fear of falling into the electricity intermittence due to the Bayesian Nash Equilibrium (BNE). In the following, we
the huge number of vehicles, which can be deployed in the grid. present the payoff matrix of the game between the SG and the
Furthermore, others consider this integration as a favor; thanks EV (see Table 1), where some notations are defined as follows:
to the capacity of EVs to store the electricity in their batteries. In 1. X(t): amount of requested electricity at the time t.
this paper, we propose a Bayesian game model for the 2. P(t): price of electricity at the time t.
integration of EVs into the SG, where several parameters and 3. C(t): electricity production cost at the time t.
criteria are taken into account such as satisfaction, pollution rate, 4. GSSG1(t): satisfaction gain for the SG at time t.
cost and electricity selling price. 5. GSEV1(t): satisfaction gain for the EV at time t.
As far as the smart grid has more features, as more it will be 6. BL(t): battery level into the EV at time t.
vulnerable to several lethal attacks. As mentioned in [1] and [2], 7. LE(t): amount of not used electricity at time t.
availability, integrity and confidentiality are the main security The payoff equation of each player is as follows:
objectives in the smart grid. In this paper, we are dealing with • X11 = X(t).(P(t) – C(t)) + GSSG1(t)
the attacks targeting the integrity issue in the smart grid since • Y11 = BL(t) – P(t).X(t) + GSEV1 (t)
they can cause great damages, perturbations and losses. We • X12 = - (LE(t).C(t) + GSSG2(t))
propose a rule-based detection algorithm to detect this kind of
• Y12 = BL(t)
attacks with a focus on blackhole attack, which consists in
dropping messages exchanged between nodes. We accord also • X21 = 0
importance to the time delay attack, which is characterized by • Y21 = BL(t) – GSEV2 (t)
adding delays before sending packets. • X22 = 0
The remainder of this paper is organized as follows: the
proposed game model as well as the attack model and its • Y22 = BL(t)
countermeasures are defined in Sections II and III, respectively. Where:

Simulation results are discussed in Section IV. Finally, we • GSSG1(t) =

conclude this paper in Section V.

978-1-5090-4671-3/16/$31.00 ©2016 IEEE


where the attacker makes some delays to sent packets and so, the
• GSEV1 (t)=
Jitter (i.e. the delay between exchanged packets) will deviate
from normal distribution. To detect the blackhole and time delay
• GSSG2(t) = 1 – GSSG1(t)
attacks, we monitor respectively the Number of Sent Packets
• GSEV2 (t)= 1 – GSEV1 (t) (NSP) and Jitter (i.e. the delay between the packets). Here, the
NSP and Jitter are monitored temporally over time and spatially
The payoff equations are selected according to the gain or compared to the neighborhood nodes.
loss that the player can have in each case like financial gain, B. Temporal and spatial based detection
purchased electricity cost, satisfaction/dissatisfaction rate, etc.
Our proposed model is based on rule-based approach to take
• PAYOFF MATRIX BETWEEN THE SMART GRID AND THE advantages from its benefits namely the low complexity
ELECTRIC VEHICLE requirements with the least false positive rate compared to the
anomaly based detection algorithm [6]. Moreover, we added
some features to enhance the accuracy of our model in order to
be as near as possible to the learning algorithm's performance
namely in terms of detection rate. We note by l
x T , x T , x T , … x T the node i's vector where k
represents the number of Time slots T. x(T) denotes either the
NSP or the Jitter. In normal situation, each node follows normal
distribution characterized by the couple (μ1(i),σ1(i)) where μ1(i)
is the mean vector of the node i and σ1(i) is the standard
deviation. μ1(i) and σ1(i) are calculated as follows:
∑ (1)
B. Equilibrium determination
The utility of Bayesian Nash Equilibrium (BNE) is to
predict the future behavior of the SG and the EV, and determine ∑ (2)
the permanent state, i.e. each player has an interest in
performing the same action [6]. According to Nash, there is a
mixed strategy BNE {player1 (action1, p*), player2 (action2, 1: IDS monitors the Features (F) NSP or/and JITTER of the
q*)} in which both players do not change their actions. As a Node (i.e. smart meter, actuator, control center)
result, we use the BNE concept to predict the stage when the 2:// Temporal detection:
SG and the EV do not change their strategies, which are deliver 3:Monitor F’ distribution of a over time
and charge, respectively. 4:if _ [( _ -3* _ ) && ( _ +3* _ )]then
Theorem 5:// is suspected as an attacker
There is a mixed strategy BNE {JSG (deliver, p1*), JEV (charge, 6://Spatial detection:
q1*)} in which the SG chooses deliver action when the 7:Compares the NSP’ distribution of a with its
probability p1 > p1* and the EV chooses charge action when q1 > neighbors
q1* where p1* = with 0< p1*≤ 1 and 8:if _ [( _ -3* _ ) && ( _ +3* _ )]then
.
. 9:// is detected as a black hole/time delay attack that
q1*= with 0< q1*≤ 1 target estimation energy
. .
10://Response:
III. ATTACKS MODEL AND PROPOSED COUNTERMEASURES 11: Send an Alert message (Attack’s id, NSP or/and JITTER,
This section contains a description of the attacks model then and detection time) to Control Center
the countermeasures to deal with blackhole and time delay Algo. 1. Attack detection rules for blackhole and time delay attacks
attacks.
IV. NUMERICAL ANALYSIS
A. Attack model In our simulation we use Matlab, the most used tool
In our work, we focus specifically on attacks that have as especially since it has some toolbox associated to game theory
goal the state estimation and aims to perturb or even break down and attack detection.
the utility system. There is a multitude of attacks that can lead to
this goal, for example, blackhole attack [7] which consists in A. Numerical results for the proposed game model to
dropping messages sent or received from one node to another optimally integrate EVs into the SG
(i.e. delete them or do not send them). This attack is In this simulation, we show the probability convergence of
characterized by the fluctuation of the number of sent packets our two players: the SG as electricity supplier and the EV as
[7]. Therefore, this number of sent packets will no longer follow consumer.
a normal distribution like in the case of natural situation. As indicated before, p1* represents the optimal probability of
Another attack will be envisaged, the time delay attack [8], the SG above which the latter chooses the electricity delivery
action; q1* represents the optimal probability of the EV above follows:
which it decides to charge its battery as chosen action. As shown • Detection Rate (DR): the ratio of correctly identified
in Fig. 1., the probability p1* converges to 0.51. This means that malicious nodes over total number of attackers,
the SG will not change its strategy when its probability is higher • False Positive Rate (FPR): the ratio of normal nodes that
than 0.51. For the EV, its probability q1* converge to 0.61, where are classified as malicious over total number of normal
it will not change its strategy when its probability is up than this nodes.
value. As illustrated in Fig. 2, in terms of detection rate, our
proposed model called hybrid detection model has a good
performance. This proposed algorithm is still robust with more
than 95% of DR when the malicious nodes do not exceed 25%.
Moreover, it has the lowest FPR (False Positive Rate) among all
the other algorithms. Furthermore, given that our algorithm is
based on rules, it requires less computation capacity and energy
consumption compared to anomaly based detection algorithms
like SVM which is more sophisticated but also computationally
and energetically expensive.
V. CONCLUSION
In this paper, we proposed a Bayesian game models to
integrate optimally EVs into the SG. We proposed also a new
detection policy that aims to combine the advantages of spatial
and temporal-based detection techniques to detect the most
Fig. 1. Probability convergence lethal attacks that aim to disturb the state estimation of the smart
grid with a high accuracy. Simulation results show the efficiency
B. Numerical results for the proposed IDS model and good performance of the proposed models.
In this section, we show the evaluation of our proposed
detection model, which is a combination between spatial-based ACKNOWLEDGMENT
and temporal-based detections. We compare its performances This work is funded by the European Project ITEA FUSE-
with a temporal-based detection, a spatial-based detection, and IT (http://www.itea2-fuse-it.com/).
one of the most popular learning algorithms SVM (Support
REFERENCES
Vector Machines).
[1] W. Wang, Z. Lu, "Cyber security in the Smart Grid: Survey and
challenges". Computer Networks, 57(5), pp. 1344-1371, 2013.
[2] N.Komninos, E.Philippou,A.Pitsillides, ,"Survey in Smart Grid and Smart
Home Security: Issues, Challenges and Countermeasures", IEEE
Communications Surveys & Tutorials, 16(4), pp. 1933-1954, 2014.
[3] W Saad, Z Han, HV Poor, T Basar, “Game Theoretic Methods for the
Smart Grid: An Overview of Microgrid Systems, Demand-Side
Management, and Smart Grid Communications”, IEEE Signal Processing
Magazine,Vol. 29, Issue.5, pp.86-105, 2012
(a) [4] H. Sedjelmaci, T. Bouali, SM. Senouci, "Detection and prevention from
misbehaving intruders in vehicular networks", IEEE GLOBECOM’2014,
Austin, USA, 2014.
[5] N. B. Mahantesh, S. M. Sunilkumar and K. D. Sajal, “Reliable resources
brokering scheme in wireless grids based on non-cooperative bargaining
game”, Journal of Network and Computer Applications Vol.39, pp.266-
279, 2014
[6] D. Li, S.K. Jayaweera, “Distributed Smart-home Decision-making in a
Hierarchical Interactive Smart Grid Architecture”, Parallel and
Distributed Systems, IEEE Transactions, Vol.26, Issue.1, pp.75-84, 2014.
[7] S.A.R. Zaidi, M.Ghogho: "Stochastic geometric analysis of blackhole
(b) attack on smart grid communication networks",SmartGridComm, pp.
Fig. 2. Accuracy rate: (a) Detection Rate (b) False Positive Rate 716-721, 2012.
We check the robustness of each algorithm in terms of [8] A.Sargolzaei, K. Yen, M.N. Abdelghani, "Delayed inputs attack on load
Detection Rate (DR) and False Positive Rate (FPR) defined as frequency control in smart grid", ISGT, pp. 1-5, 2014.

You might also like