Data Injection Attacks on Smart Grids with Multiple Adversaries: A Game-Theoretic Perspective
Abstract
Data injection attacks have recently emerged as a significant threat on the smart power grid. By launching data injection attacks, an adversary can manipulate the real-time locational marginal prices to obtain economic benefits. Despite the surge of existing literature on data injection, most such works assume the presence of a single attacker and assume no cost for attack or defense. In contrast, in this paper, a model for data injection attacks with multiple adversaries and a single smart grid defender is introduced. To study the defender-attackers interaction, two game models are considered. In the first, a Stackelberg game model is used in which the defender acts as a leader that can anticipate the actions of the adversaries, that act as followers, before deciding on which measurements to protect. The existence and properties of the Stackelberg equilibrium of this game are studied. To find the equilibrium, a distributed learning algorithm that operates under limited system information is proposed and shown to converge to the game solution. In the second proposed game model, it is considered that the defender cannot anticipate the actions of the adversaries. To this end, we proposed a hybrid satisfaction equilibrium - Nash equilibrium game and defined its equilibrium concept. A search algorithm is also provided to find the equilibrium of the hybrid game. Numerical results using the IEEE 30-bus system are used to illustrate and analyze the strategic interactions between the attackers and defender. Our results show that by defending a very small set of measurements, the grid operator can achieve an equilibrium through which the optimal attacks have no effect on the system. Moreover, our results show how, at equilibrium, multiple attackers can play a destructive role towards each other, by choosing to carry out attacks that cancel each other out, leaving the system unaffected. In addition, we compared the obtained equilibrium strategies under the Stackelberg and the hybrid models and we characterized the amount of loss that the defender endures due to its inability to anticipate the attackers’ actions.
Index Terms:
Data injection attacks, smart grid security, game theory, Stackelberg equilibrium, satisfaction equilibrium.I Introduction
The recent integration of advanced metering infrastructures, data collection and communication nodes have rendered the smart electric grid more vulnerable to cyber-attacks. Particularly, data injection attacks have recently emerged as an exceedingly malicious type of cyber-attacks. Using data injection, malicious adversaries can target the state estimator of a power system, by targeting a number of measurement units, in order to alter the estimate of the real-time system state [1, 2].
Data injection can significantly impact the overall well-being of the power system since it can target the state estimator, an integral component of the grid which is used by the system operator to monitor, protect, control, and economically operate the system [1, 2]. Using data injection attacks, malicious adversaries can achieve a variety of goals that range from compromising the security of the grid to impeding the real-time operation of the system or making financial profit through energy prices manipulation. Data injection attacks are inherently challenging due to their stealthiness which makes the task of detecting them arduous [2]. In fact, data injection attacks can modify the estimation process while remaining unnoticed by the operator.
Recently, data injection attacks have attracted significant attention [1, 2, 3, 4, 5]. The work in [1] introduces a data injection scheme that can evade detection when compromising a number of measurements. The authors in [2] propose an optimal data injection scheme and derive an optimized subset of measurements that can be defended to face this attack. The work in [3] targets coordinated attacks and discusses efforts for detecting those attacks. An analysis of the economic effects of data injection on energy markets is discussed in [4]. In [5], a zero-sum game is formulated between an attacker and a defender in which the attacker modifies an estimated line flow to manipulate prices.
While interesting, this existing body of literature [2, 1, 3, 4, 5] has primarily focused on data injection attacks with a single attacker and assume no cost for attacking or defending the system. However, in practice, due to their potential profitability and stealthiness, data injection attacks can occur concurrently from multiple adversaries that can target various state estimation sensors. Due to the networked nature of the smart grid, the manipulation of measurements in one part of the system, by an adversary, has an overall effect on the system as a whole. Hence, an attack executed by one attacker does not only impact the grid’s performance, but it also affects the benefits of the other attackers. Such an interdependence can be, on the one hand, beneficial to the grid for cases in which the different simultaneous attacks mitigate the severity of one another. On the other hand, multiple attacks can lead to a more severe combined effect on the electric grid thus further impacting its overall performance. Clearly, there is a necessity for a strategic modeling framework to analyze and understand these interdependencies between attackers. Remarkably, to our best knowledge, beyond our preliminary works on data injection with two attackers in [6], no work has analyzed the case of multiple adversaries.
The main contribution of this paper is to introduce novel game-theoretic approaches to analyze data injection attacks that involve a defender and multiple adversaries. In this regard, two approaches are proposed. In the first approach, we formulate the problem as a Stackelberg game in which the defender (i.e. grid operator) acts as a leader having the ability to anticipate the actions of the adversaries, which act as followers, prior to selecting a subset of measurements to defend. The defender’s goal is to reduce the effect of potential attacks on the system while optimizing a utility that captures both the benefits and costs of the chosen defense strategy. In response to the leader’s strategy, the attackers play a noncooperative strategic game in which each attacker chooses its optimal attack scheme in order to maximize the trade off between the benefits, obtained from prices manipulation, and costs associated with the attack. We prove the existence of a generalized Nash equilibrium for the attacker’s game and we study the existence and properties of the overall game’s Stackelberg equilibrium. To solve the game, we propose a distributed learning algorithm which we prove to converge to a solution of the game using limited information that can be available to the players. In the second approach, it is assumed that the defender cannot anticipate the actions of the adversary. To this end, we use the framework of satisfaction equilibrium [7] through a proposed hybrid satisfaction equilibrium - Nash equilibrium game model. In this approach, rather than anticipating the attackers’ response and playing a strategy that optimizes its objective function, the defender seeks a defense strategy that meets a certain performance constraint. We introduce an equilibrium concept of this game and propose a search algorithm to find this equilibrium.
The performance of the proposed frameworks is assessed via numerical simulations using the IEEE 30-bus test system. Through the numerical analysis, we simulate the strategic interactions between the attackers and defender over the test system. We show that by defending a minimal number of measurements, the grid operator can enforce an equilibrium in which the attacker’s have no effect on the system. In addition, our results shed the light on the adversarial behavior in between the attackers. The results show that, at equilibrium, the attackers can choose attack strategies that cancel each other out resulting in no effect on the grid. In addition, we analyze the equilibrium of the hybrid game and compare the obtained solution to the Stackelberg one. In this regard, we define a “price of information” index which compares the utility achieved by the defender under the Stackelberg model and the hybrid model. Hence, it reflects the loss that the defender can be subject to due to lack of information about the potential reactions of the attackers to the different defense strategies available to the defender.
The rest of this paper is organized as follows. Section II presents the system model and problem formulation. Section III introduces the formulated Stackelberg game and associated solution. Section IV introduces our proposed hybrid model and its solution concept. Section V provides numerical results while conclusions are presented in Section VI.
II System Model and Problem Formulation
II-A Energy Markets
Competitive energy markets’ architectures are often based on day ahead (DA) and real time (RT) markets [8]. In the DA market, the system operator issues hourly-based locational marginal prices (LMPs), , for the next operating day based on the DA energy bids submitted by the participants [8]. The market clearing process is performed by the grid operator through the solution of a linearize Optimal Power Flow (DCOPF) which returns the optimal dispatch for each of the generators participating in the market and the DA LMP at each bus. The most commonly used DCOPF formulation is as follows [8]:
(1) |
(2) |
(3) |
(4) |
(5) |
where and represent, respectively, the number of buses, generators, and transmission lines. corresponds to the offer of generator while and are, respectively, the power injection and load at a bus . Thus, () corresponds to the case in which no generator (or load) is connected to bus . The upper and lower limits on generator ’s output are denoted by and . Constraints (4) and (5) place a limit, , on the level of power that can flow over line . A reference direction is assigned to the power flow over each transmission line. In this regard, a power flow opposing its assigned reference direction is represented by a negative quantity. Hence, constraints (4) and (5) correspond to the thermal limit of a line in its reference and opposite directions respectively. is the generation shift factor matrix which defines the sensitivity of the power flow over each line, , to changes in power injection, , at each bus:
(6) |
Therefore the sensitivity of the flow over line to a change in power injection at bus is denoted by .
In the RT market, actual real-time operating conditions estimated using the state estimator, in lieu of the predictions in DA, are used through an ex-post model to compute the RT LMPs, [8]. An incremental DCOPF is used to compute the RT LMPs and can be formulated as follows [8]:
(7) |
(8) |
(9) |
(10) |
(11) |
where is the RT offer of generator which is computed using its RT power output and its associated offer curve [8]. () is the set of congested lines which flow is in (opposite to) their reference directions. and define a bandwidth which is employed to allow for solution tolerance. In practice, here, we typically [9] set MW and MW. A proposed alternative to using this feasibility bandwidth is also available in [9].
Thus, the DA and RT LMPs at each bus, , are computed using the DA and ex-post DCOPFs. The generated LMPs reflect, both, the incremental cost of energy at bus and the congestion cost associated with the contribution of this bus to the system congestion. A line is said to be congested if the flow of power over it reaches its maximum limit. The DA and RT LMPs at bus are given by:
(12) |
(13) |
is the set of congested lines, in RT, obtained using the state estimator. where is the set of all lines. corresponds to the Lagrange multiplier associated with the energy balance constraints (2) and (8). and are the Lagrange multipliers corresponding, respectively, to constraints (4) and (5) for line whereas and are the Lagrange multipliers corresponding, respectively, to constraints (10) and (11) for line . When but , . Moreover, when , ; while when .
Computing the RT LMPs relies on the ex-post DCOPF formulation which depends on the output of the state estimator. Hence, data injection attacks targeting the state estimation affects the LMPs in (13). Next, we introduce the data attack model.
II-B State Estimation and Data Injection Attacks
A power system state estimator uses multiple power measurements collected throughout the grid to estimate the system states [10]. The relation between the measurement vector, , and the vector of system states, , in a linearized state estimation model (DC SE) is expressed as follows:
(14) |
where is the measurement Jacobian matrix and is the vector of random errors assumed to follow a normal distribution, . Using a weighted least square (WLS) estimator the estimated system states are given by [10]:
(15) |
Using the estimated states, an estimate of the measurement vector, , and residuals, , can be calculated as follows [10]:
(16) |
where is the identity matrix of size , and is the total number of collected measurements.
When data injection attacks are concurrently carried out by attackers in the set , the collected measurements are modified through the addition of their corresponding attack vectors denoted by resulting in the following altered measurements and residuals:
(17) |
In the case in which the measurement errors follow a normal distribution, the WLS estimator is a maximum likelihood estimator of location of the system states [10]. However, the WLS estimator has a zero robustness against outliers. To overcome this drawback, outliers’ detection and identification mechanisms are used so that the final state estimate is only based on “good data”. The measurement residuals give an indication of the real and unknown measurement errors. By replacing the expression of from (14) in the expression of in (16), the residuals can be expressed in terms of the true errors as follows [10]:
(18) |
Thus, an analysis of the residuals allow for the detection and identification of bad data (outliers). In this respect, bad data detection corresponds to determining whether the collected measurement set contains bad data or not. On the other hand, bad data identification corresponds to identifying which measurements may contain bad data. One should note here that outliers can stem from data injection as well as other reasons such as meter biases or communication link failures [10].
Bad data detection is typically performed using a test known as the Chi-squares test over the sum of the squares of the residuals [1, 10]. In fact, when the measurement errors vector is assumed to follow a normal distribution, follows a distribution with degrees of freedom where is the number of states to be estimated [10]. Hence, for a measurement set to be considered free from bad data, the residuals must satisfy where is a detection threshold [1, 10]. In this respect, in the presence of attackers, and since as shown in (17), each attacker should regulate to keep the effect of the attacks on the residuals low to minimize the chance of being detected as outliers [1].
In the case where the Chi-squares test indicates the presence of bad data, various bad data identification and elimination tests can be employed such as the largest normalized residual test, or the hypothesis testing identification (HTI), among others, to identify and eliminate the outliers [10].
In our model, each attacker aims at manipulating RT LMPs, , to make financial benefit via virtual bidding. Using virtual bidding, entities that do not own any physical generation nor load can engage in the energy market settlements by submitting so-called virtual supply and demand offers. Since these energy offers are virtual, an entity offering to buy (sell) virtual power at a given bus in DA is required to sell (buy) that same amount of power at the same bus in RT. Using such virtual bids, the grid operator aims at promoting liquidity in the energy market while, on the other hand, virtual bidders aim to reap financial profit from possible mismatch between the DA and RT LMPs [8]. Using a data injection attack, a virtual bidder can, thus, manipulate the RT LMPs to create a lucrative mismatch with respect to their DA counterparts. On the other hand, to achieve pricing integrity, the system operator aims at protecting the system against such attacks. The strategic interactions between the attackers and the defender (i.e. system operator) are modeled and analyzed next.
III Attackers and Defender Strategic Interaction
Data injection attacks involve interactions between attackers, which are virtual bidders, and one defender consisting of the grid operator. The defender chooses a set of measurements to secure against potential attacks aiming at decreasing the aggregate effect of the multiple attacks on the system. Securing measurements to block data injection attacks is discussed in [2] and the techniques that can be implemented for securing those measurements are referred to in [2, 5], and [11]. In [2] and [11], protection of measurements is performed through encryption of the associated sensors while, in [5], protection of measurements is performed through the implementation of a set of highly secured measurement units which are assumed to provide more robustness against data attacks. In any case, in practice, attackers can have the ability to detect or watch which measurements are secured by the defender. In fact, a placement of new measurement units can be physically noticeable by the attackers while encrypting the measurement sensors’ outputs can also be observed by a hacker attempting to read these outputs.
After observing which measurements are secured, each of the attackers can choose, accordingly, to carry out a data injection attack over a subset of measurements. Given the networked nature of the electric grid, the actions and payoffs of the different attackers are interconnected thus motivating a game-theoretic approach [12].
Hence, given that the defender acts first and the attackers react to the observed defender’s action, the interaction between the defender and attackers is hierarchical. Thus, we formulate a single leader, multi-follower Stackelberg game [12] between the defender and the attackers to capture and analyze the strategic interaction between the two. In this game, the defender acts as a leader who selects a set of measurements to defend while the adversaries interact with one another using a followers noncooperative game to identify the optimal attack in response to the strategy of the defender. By observing or predicting the ways in which the attackers react to its defense strategy, the leader chooses its optimal defense action. Next, we first analyze and solve the followers game and then find the Stackelberg solution.
III-A Attackers’ Noncooperative Game Formulation
We formulate a strategic noncooperative game to analyze the optimal decision making of the attackers in response to any arbitrary defender strategy. This game is formulated in its normal form as follows: , where is the set of attackers, is the set of actions (attack vectors ) available to attacker , and is the utility function of attacker . Thus, each attacker, , selects an attack vector, that maximizes its utility . Let denote the subset of measurements that can attack. Then, can be represented by a column vector with elements equal to 0 except for those in which can take values within a compact range reflecting the range of magnitude of the attack.
The utility function of each attacker reflects the financial benefit obtained by virtual bidding. Using virtual bidding, each attacker buys and sells MW at, respectively, buses and in DA while, conversely in RT, attacker sells and buys MW at, respectively, buses and . Thus, the goal of attacker is to optimize the following (Problem 1):
(19) |
s.t. | (20) |
where is the cost of attack, and denotes the strategy vector of all players except . The number of measurements that can be attacked concurrently by as well as the attack levels (the level of modification of a measurement) are limited by . Since , chooses as in (20), where is a chosen threshold, to minimize the chance of the attack of being detected as outliers.
III-B Attackers’ Game Analysis
Due to the networked nature of the electric grid, the attackers’ actions are interdependent. In fact, by altering a set of measurements, an attacker manipulates the whole estimation outcome and, thus, affects the actions as well as the payoffs of the other attackers. In the event of concurrent attacks by attackers, the resulting estimates, , are computed as follows:
(21) |
where represents the change in the generated estimates due to the attacks. Likewise, the overall change in the measurement residuals due to the attacks can be expressed as follows:
(22) |
Consequently, the various attackers in the system can impair the ability of attacker to successfully manipulate a targeted measurement as expressed in Remark 1.
Remark 1
Depending on the targeted measurements, the collective impact of the attacks can be either constructive for the attackers by helping each one of them to achieve its goal, or destructive, attenuating the global effect of these attacks on the system.
In fact, considering the case of two attackers in which attacker ’s (attacker ’s) aim is to increase the estimated flow, (), over a line in order to create a false congestion. The objective of attacker (attacker ) is, hence, to achieve . Following from (21), the change introduced to and by the two attacks is stated as follows:
(23) |
where denotes element of matrix . When the measurement errors are independent and identically distributed (i.e. ), is a symmetric matrix. This property can be proven based on (15) and (16) through showing that when . Since is symmetric, . In the event where , both attackers’ actions attenuate the effect of one another. In fact, since , () reduces () preventing it from causing any congestion over line (). In the contrary, if , each of the attackers’ actions would assist the other in achieving its objective. This result can be trivially generalized to the case of attackers.
Moreover, the payoffs of the different attackers (i.e. virtual bidders) are also significantly interdependent. In fact, as shown next, an attacker can collect financial benefit or endure loses due to the strategies played by other attackers.
Remark 2
The payoff of each attacker, , is dependent on the chosen attack strategies of other attackers. Thus, based on its virtual biding nodes, can achieve a positive or negative payoff depending on attacks carried out by other attackers.
In this regard, following from (III-A), attacker ’s payoff in the presence of attackers is governed by:
(24) |
As a result, following the sign of , determined by the choice of virtual bid nodes and , an attack modifying the congestion status of a line between DA and RT can introduce a positive or negative payoff to attacker .
III-C Attackers’ Game Solution
The attackers’ payoff in (III-A) is a function of DA and RT LMPs. These LMPs are indirectly controlled by the attack vector, , which can control the existence of congestion over transmission lines and hence eventually affect the LMPs in (12) and (13). Thus, (III-A) can be rewritten using (12) and (13) as:
(26) |
where is given by (25). By dropping for being a constant, the objective of attacker is hence to
(27) |
We define the two sets of lines and such that and . Moreover, let and , such that , be the sets of lines over which the power flows in, respectively, the reference and opposite to reference directions.
Attacker seeks to congest or decongest lines in a way that maximizes (27). In this regard, for a line , i.e. , attacker profits from creating a congestion over in the reference direction, causing to be positive. Thus, aims at creating a congestion over a line . Similarly, for , benefits from causing a congestion over line in the direction opposite to its reference direction, causing to be positive. Accordingly, aims a creating a congestion over a line . Combining these two observations, attacker aims at creating congestions over lines . In a similar manner, an attacker would also seek to remove congestion from a line in order to set its or to zero in a way that maximizes (27). To this end, aims at removing congestions from lines .
However, due to the presence of measurement errors, an attacker cannot be completely certain that its attack will lead to the creation or removal of congestion over a given line. In fact, given the estimated states in the presence of attack, , the power flow estimates, , can be obtained using the linear matrix denoted by relating the power flows to the system states: . Using the expressions of given by (15),
(28) |
Replacing by its expression given by (14) and noting that reduces to the identity matrix, can be expressed as:
(29) |
represents the true flow denoted by . Given that , is also a random variable that is also Gaussian distributed with the following expected value and variance:
(30) |
Given that is a vector of random variables, attacker aims at altering the expected value of to achieve, with highest possible probability, the intended congestion creation or removal to maximize (26). In other words, to create (or remove) a congestion over a line , attacker designs its attack so that (or ) and aims at maximizing this to increase its chances for achieving its congestion. Thus, attacker aims to solve the following optimization problem where (Problem 2):
(31) | ||||
(32) | ||||
(33) | ||||
(34) | ||||
(35) | ||||
(36) | ||||
(37) |
where . The constraints in (37) put some limits on the variables and relative to the corresponding flow limit where and correspond to the fraction of that and can take respectively. Thus, attacker aims at maximizing to increase the chance of creating congestions over lines and removing congestions from lines .
On the other hand, due to resource limitation, an attacker cannot concurrently achieve all its favorable congestions. Thus, the variables are relaxation variables to ensure feasibility of the optimization problem. However, this relaxation is accompanied with a penalty factor, , present in the objective function which reflects a decrease in the objective function of the attacker for the case in which a beneficial congestion creation or removal is not performed. Hence, when such a congestion manipulation is feasible, this penalty factor ensures that the attacker has a high incentive to perform this congestion manipulation.
Moreover, similarly to (III-A), is the cost associated with the attack. This cost function can be represented as a scaled norm of the attack vector, where is the scaling factor and is the length of vector :
(38) |
Following this formulation, one can see that the constraints of the optimization problems of each of the attackers are coupled. In other words, the strategy space of each attacker depends on the strategies selected by the other attackers. Games in which the constraints of the different players are coupled are known as generalized Nash equilibrium problems (GNEP). A widely used solution concept of these games is known as the generalized Nash equilibrium (GNE) which is defined as follows[13]:
Definition 1
In a game of players in which the control variable, i.e. strategy, of each player , is denoted by and utility function is denoted by , a GNE is a state of the game in which each player aims at
(39) |
where denotes the optimal strategies of all other players except for player and is the shared strategy space in between the players. In other words, as a response to optimal chosen actions of other players, a player aims at choosing the strategy, in the restricting subset dictated by the choice of the other players, that maximizes its own utility.
We next prove the existence of a GNE for the attackers’ game.
Theorem 1
The attackers’ game has at least one GNE.
Proof:
Since and are linear functions and is a summation of strictly concave functions, as shown in (38), each attacker’s utility function given in (31) is a continuous and strictly concave function over the attackers’ strategy profile. Moreover, is a convex and compact set, and as shown in (37), the sets in which and lie are also compact and convex. Thus, since a GNEP having compact and convex action sets as well as continuous and quasi-concave utility functions has at least one GNE [14] [15, Theorem 4.1], our attackers’ game has at least one GNE. ∎
The solution to GNEP problems can be obtained using a number of widely adopted solution concepts that are available in literature [15, 13, 16] where the applicability of each technique depends on the characteristics of the utility functions and action spaces. Given the strict concavity of the utility function of each attacker’s problem and the convexity of the action space, such techniques converge to a GNE for our derived formulation.
III-D Defender’s Side Analysis
Under a given equilibrium of the followers, the leader (grid operator) selects a defense vector that determines which measurements are to be made secure and able to block potential attacks. The objective of the defender is to minimize a cost function capturing the variation between the DA and RT LMPs, on all buses in the system, as follows:
(40) |
(41) |
where is the cost of defense, is the total system load and is the limit on the number of measurements that the operator can defend simultaneously. In (40), depends on the strategies taken by the defender, , and attackers, .
The Stackelberg solution concept is adequate for games with hierarchy in which the leader enforces its strategy and the followers respond, rationally (i.e. optimally), to the leader’s strategy [12]. We denote the optimal response of the attackers to action played by the defender by . This optimal strategy denotes the equilibrium strategy profile of the attackers as a response to the defender’s strategy. In this regard, is a Stackelberg equilibrium if it minimizes the leader’s (i.e. defender’s) utility function . In other words,
(42) |
A Stackelberg equilibrium is guaranteed to exist and be unique if the optimal response of the followers is unique in response to every action of the leader. However, Theorem 1 proves the existence of at least one GNE for the attackers’ game. Hence, the followers can have multiple optimal responses to a leaders strategy. In this case, the leader can rank the GNEs corresponding to each strategy based on their impact on its utility and retain the one that leads to the worst utility (i.e. maximal utility given that the defender is a utility minimzer). The leader then selects the policy that minimizes this maximal utility. This is known as a hierarchical equilibrium (HE) [12]. In other words, is a hierarchical equilibrium strategy for the defender if:
(43) |
III-E Distributed Learning Algorithm
Here, we provide a methodology for finding a hierarchical equilibrium of the defender-attackers game as defined by (43).
We first consider the attackers subgame. To find an equilibrium that can be reached by the attackers, we propose a distributed learning algorithm, based on the framework of learning automata that was first analyzed in [17]. The main drivers behind this algorithm are as follows. First, this algorithm is fully distributed in the sense that each attacker is only required to know its own action space, and not the shared one, and the observation of its own payoff after choosing an action. In this regard, knowledge of the action spaces of other attackers or even their existence is not required. Second, since the attackers’ game might admit multiple GNEs, the use of this algorithm, emulating practical smart grids security settings, enables the characterization of the GNE(s) that can be actually reached in practice.
The proposed learning algorithm is shown in Algorithm 1. In this algorithm, each attacker first initializes a strategy vector containing a probability distribution over its attack space111This algorithm requires decritization of the action space of the attackers; our discretization approach is provided in Section V.. For instance, corresponds to the probability that attacker chooses attack at time instant . Then, at time instant , each attacker chooses an attack randomly and independently from its attack space following the probability distribution available through its strategy vector. The collection of the attackers’ actions at time instant results in a payoff for each attacker denoted by . is a positive normalized value which corresponds to a mapping from where and are the minimum and maximum achievable utilities by . Based on the payoff that it receives at time instant , each attacker, , updates its strategy vector as follows:
(44) |
where is an arbitrarily small positive constant and is a column vector of length equal to the size of the action set of attacker . is a vector whose elements are equal to 0 except for the element corresponding to the action that was selected at time instant . The element corresponding to the selected action will have a value of 1. Thus, given that the attack was selected by attacker at time instant ; then, and for . This updating scheme is known as a linear reward-inaction () scheme [17]. Hence, with every iteration, the strategy vector of each attacker is updated and the algorithm repeats until each of the attackers’ strategy vectors has all elements equal to 0 except for one element which is equal to 1. Such a strategy vector shows which of the strategies is to be chosen by each attacker. The collection of these attacks (having a probability of 1 each) corresponds to the game’s equilibrium.
This algorithm has been discussed in[17, 18] where it has been proven that, for an arbitrarily small , this algorithm asymptotically converges to a pure strategy Nash equilibrium (PSNE) when the game admits a PSNE.
Definition 2
Following the notations of Definition 1 a PSNE is a state of the game in which each player aims at
(45) |
where, on the contrary with GNEP, is player ’s own strategy space which is independent of other players.
Thus, the main difference between a GNE and a PSNE is that the GNE is an optimal action profile in which each action does not violate coupled constraints with other players. Thus, given that Algorithm 1 is guaranteed to converge to a PSNE, proving that this PSNE will never violate the coupled constraints is enough to prove the convergence to a GNE.
Theorem 2
When applied to Problem 1, Algorithm 1 is guaranteed to asymptotically converge to a GNE when the step size is chosen to be arbitrarily small.
Proof:
For a strategy to be a best response strategy (BR) for attacker , it needs to satisfy the property . A PSNE is hence a state of the game in which all players play BR strategies with respect to one another. Thus, a strategy that is not a BR strategy cannot be a PSNE strategy.
However, a strategy that violates the residual threshold constraints in (20) cannot be a BR strategy. In fact, consider the case in which attacker attacks only one measurement and its attack is denoted by . If this attack violates the residual threshold of , will be identified as outlier and discarded from the measurement set. Thus, from (27), this results in
Thus, is not a BR since not launching an attack at all returns a higher . Hence, all actions that violate the coupled constraints are dominated by the alternative of not carrying out an attack at all and hence cannot correspond to BR strategies. As a result, a PSNE is guaranteed not to violate the coupled constraints in (20) and hence this PSNE is a GNE of the game. Since all PSNEs are GNEs and that algorithm 1 asymptotically converges to a PSNE for a small it, as a result, converges to a GNE of our game. ∎
To be able to choose a hierarchical equilibrium strategy, a defender needs to anticipate the worst case GNE of the attacker to each defense strategy. This anticipation can be done through: i) repeating the learning algorithm of the attackers, Algorithm 1, starting from different initial conditions to find all possible GNEs from which worst case GNEs can be extracted, ii) using one of the various algorithms tailored to find solutions of GNE problems [15, 13, 16], iii) analytical derivation based on its full knowledge of the cyber-physical system model, energy market model and available past data.
When being able to anticipate all worst case GNEs of the attackers, the defender chooses the strategy that results in the best worst case GNE. This strategy and its corresponding GNE corresponds to the HE of the game.
IV Game model under limited information
Thus far, we assumed that the defender can anticipate all worst case GNEs of the attackers. However, in some instances, the defender does not have enough knowledge to anticipate the reaction of the attackers. Thus, it cannot seek a strategy that minimizes its utility when the reaction of the followers to any of its actions is unknown. As a result, we employ the framework of satisfaction equilibrium (SE) [7, 19]. Under the satisfaction framework, rather than minimizing its objective function (40), given a number of measurements that can be defended concurrently, , the defender aims at keeping the overall changes in the LMPs at all buses under a desired threshold :
(46) |
Given our hierarchical model, we present a hybrid SE-Nash model in which the defender aims at choosing an action that satisfies its performance requirement given potential reaction of the attackers while the attackers observe the action of the defender and play a noncooperative game in which each attacker aims at maximizing its utility. Extending the SE logic to the attackers game, an attacker is satisfied by playing one of its BR strategies facing the actions chosen by other attackers and the defender. We denote an equilibrium of this hybrid model as a hybrid hierarchical equilibrium (HHE).
Definition 3
A strategy profile is an HHE if and and .
With a proper choice of this game is guaranteed to have at least one HHE. In fact, if none of the actions available to the defender leads to meeting its satisfaction level then either the satisfaction threshold needs to be increased or more resources should be employed so that a larger number of measurements can be concurrently secured. When the leader chooses an action that satisfies (46) it has no incentive to deviate from it. The attackers will respond to this strategy by playing a GNE. Hence, the attackers would also have no incentive to deviate from this GNE. As a result, the satisfaction strategy of the defender and its GNE response by the attackers correspond to an HHE of this hybrid game.
Given the lack of knowledge about the adversaries, the defender has to learn the action(s) that insure the satisfaction of its constraint through trial and observation. To this end, to find a strategy that satisfies its performance constraint, the defender can adopt the following search algorithm:
-
i)
For a maximum number of iterations, , the defender starts by choosing an action from its strategy space following a uniform probability distribution over this action space. The followers observe this action and react by playing a noncooperative game whose GNE is obtainable via Algorithm 1.
-
ii)
The leader observes if the action it had taken led to the satisfaction of its performance constraint. If this is the case, the strategy is hence deemed satisfactory and the leader has no incentive to deviate from it. The followers response to the leader’s satisfaction action is a GNE and hence the followers have no incentive to deviate from their response as well. Thus, this results in an equilibrium.
-
iii)
If the action that the defender had chosen did not lead to the satisfaction of its constraint, another action is randomly chosen from its strategy space and the process repeats.
This algorithm will eventually find a HHE since, for a large number of iterations and given that at least one action exists in its action space that satisfies the defender’s threshold, this action would eventually be randomly chosen with a probability that is extremely close to 1. Assume the number of vulnerable measurements to be equal to and that the defender secures measurements concurrently. Its action space has then a cardinality . Assume that of the alternatives achieve . Choosing uniformly between the alternatives, the probability of choosing an action that satisfies the defender is equal to . Thus, the probability of not finding a satisfaction action in iterations, i.e. trials, is given by ; and hence, the probability of finding a satisfaction action in iterations is given by . Moreover, the expected number of iterations needed to find a satisfaction equilibrium strategy is equal to while the variance of that number is equal to . Hence, significantly increasing will typically increase leading to an increase in and and a decrease in and . As a result, one can see the conflicting effect between the quality of the found solution, reflected by how low the satisfaction threshold is, and the speed of finding a solution. Reducing the required satisfaction quality leads to finding a solution faster while a higher satisfaction quality requirement (lower ) leads to a slower identification of a solution.
V Numerical Results and Analysis
For performance evaluation, we consider three data injection attackers and one defender interacting over the IEEE 30-bus test system which represents a segment of the American Electric Power System [20, 21].
In our numerical setting, each attacker is assumed to have a subset of measurements comprising three measurements that it can attack. In particular, attacker 1 can attack line flow measurements over lines 3, 4 and 7, attacker 2 can attack line flow measurements over lines 14, 15 and 16, and attacker 3 can attack line flow measurements over lines 5, 9 and 11. The attack level on any of the measurements is assumed to have one of the following power levels (in MW): . The amount of virtual power that each attacker sells or buys is assumed to be equal to 100 MW and its attack cost is as shown in (38) where .
Attacker | VB Bus 1 | VB Bus2 | Target Line |
---|---|---|---|
Attacker 1 | Bus 3 | Bus 4 | Line 4 |
Attacker 2 | Bus 4 | Bus 12 | Line 15 |
Attacker 3 | Bus 6 | Bus 7 | Line 9 |
The DA and RT virtual bidding (VB) information of the different attackers are shown in Table I. In this table, VB Bus 1 corresponds to the bus at which an attacker sells energy in DA (respectively buys in RT) and VB Bus 2 corresponds to the bus at which this attacker buys energy in DA (respectively sells in RT). The target line column corresponds to the line connecting the two VB buses which the attacker aims to congest. In our simulations, we assume that the system experiences no congestion in DA and that each attacker primarily aims at creating a fake estimated congestion over its target line so as to reap financial benefit222Since our main focus is on the attackers’ and defender’s strategies, it is assumed that all market participants abide by their DA schedules and, except for the attacks and defense, no change in system conditions occurs between DA and RT. Thus, in case of no attacks, the DA and RT LMPs match..
On the other hand, the defender decides on a subset of measurements to secure out of all the measurements in the system. In our simulations, we assume that a measurement device is placed on every bus and every line in the system so that every power injection and every line flow is measured.
In Fig. 1 we show the effect of each attacker’s optimal attack, when no defense or other attackers are present in the system, on the RT LMPs.

As can be seen from Fig. 1, assuming that only one attacker attacks at a time, the action of attacker 3 yields the most detrimental effect on the system. This can be also seen from Fig. 2 in which the impact of each of the attacks on the system is shown. The global effect of any attack on the system is captured by the defender’s utility function given in (40). Fig. 2 shows indeed that the attack of 3 has the highest global effect on the system followed by that of attacker 1 and of attacker 2 respectively. In fact, the defender’s loss under the attack of attacker 3 is equal to $44.69 as compared to $11.61 under that of attacker 1 and $5.74 under that of attacker 2.
Fig. 3 shows the effect that a congestion over the target line of attacker has on the payoff of attacker denoted as . Accordingly, Fig. 3 shows how the attack of an attacker affects the payoffs of the others. To this end, the attackers appear to be in a perfectly conflicting situation since fulfilling the purpose of an attacker results in a negative payoff to all other attackers.


Next, we consider the strategic interactions between the three attackers and the defender based on our Stackelberg model. In this regard, we find the HE of the game, and the underlying GNE of the attackers, when the defender defends an increasing number of measurements as shown in Table II. We, namely, treat the cases in which the number of measurements that can be defended concurrently, , is , and . The attackers’ optimal strategies are represented in a vector containing their respective optimal attack levels (in MW) such that for attacker 1 the attacked levels correspond to additive power flows over , for attacker 2 to additive power flows over and for attacker 3 to additive power flows over .
Given that a congestion occurring over line has the largest impact on the system, one can intuitively expect the defender to secure the measurement over that line when only one measurement can be secured (i.e. ). Indeed, from Table II, we can see that the HE corresponds to the defender defending line and the attackers carrying out their optimal equilibrium response. For the case in which the defender can defend up to two measurements concurrently, i.e. , one expects the defender to secure the measurements of the two lines, lines 4 and 9, which congestion has the largest impact on the system (we refer to this defense, in this context, as the critical defense). However, the HE of the game corresponds to the defender defending lines 4 and 5 instead. In fact, by defending those two lines the attackers’ optimal response yields no effect on the system hence leaving the RT LMPs unaffected. This is a representation of the analysis provided through Remark 1 in which multiple attackers’ attacks can cancel each other out.
Secured Measurements | Attacker 1 | Attacker 2 | Attacker 3 | |
0 | - | (2,3.5,3.5) | (0,0,0) | (3.5,3.5,0) |
1 | line 9 | (0,3.5,2) | (0,0,0) | (0,0,0) |
2 | lines 4 and 5 | (0,0,0) | (0,2,0) | (0,3.5,-3.5) |

Fig. 4 provides a comparison between the LMP manipulation outcome under the HE strategy as compared to the critical defense strategy. It can be clearly seen that the HE strategy (i.e. Stackelberg solution) completely prevents the manipulation of the RT LMPs and, hence, is a significantly better strategy than critical defense. In fact, the attackers’ optimal response to the critical defense strategy resulted in a successful manipulation of the RT LMPs leading to a root mean square deviation (RMSD) from the DA LMPs where
(47) |
Fig. 5 shows the defender’s HE utility for different numbers of concurrently defended measurements. This figure shows that the attackers have a very large impact on the system when no defensive actions are taken. In fact, the aggregate effect of the attacks on the system LMPs, at equilibrium, with no defensive actions is $306. However, when (defender is able to secure one measurement), the HE of the game shows that the global effect of the multiple data injections attacks on the system drops significantly to $11.6. Moreover, when (defender is able to secure two measurements concurrently), the HE of the game shows that the defender’s equilibrium strategy completely protects the system against attacks and achieves a zero overall effect of the attacks on the system.

We next consider our proposed SE-Nash framework and we define the price of information (PI) to be an index reflecting the loss that the defender endures due to its lack of information about the possible reaction of the attackers to its defense strategies. The PI is defined as follows:
(48) |
The PI hence reflects the difference between the utility achieved under the SE-Nash framework and the one achieved under the Stackleberg model (corresponding to minimum possible utility).
We consider first that the defender can only defend one measurement at a time. Given that there are 9 vulnerable measurement units in the system, the defender has 9 options to choose from. Considering that the defender would be satisfied by having , we run the search algorithm described in Section IV and the HHE we obtained is similar to the one we obtained using the Stackelberg model for . Thus, in this case, . Following this HHE, the defender defends the line measurement over line and the attackers’ GNE corresponds to that shown in Table II for . This strategy generates an hence meeting the performance requirement.
Next, we consider the case in which the defender secures 2 measurements concurrently. Thus, the defender has 36 options to choose from. We consider two different performance requirements. In the first, the defender seeks to have . Running the search algorithm yields an HHE dictating the defense of lines and which corresponds to the critical defense defined previously. This HHE results in and a . The second considered performance requirement seeks to have . In this regard, our search algorithm led to an HHE under which lines and should be defended. This HHE results in and a .
VI Conclusion
In this paper, we have studied the problem of data injection attacks on the smart grid in the presence of multiple adversaries. The strategic interactions between the defender and the attackers have been modeled using a Stackelberg game and a hybrid satisfaction equilibrium - Nash equilibrium game. In these games, the grid operator acts as the leader and the attackers act as followers which play a noncooperative strategic game in response to each defender’s strategy. The costs of attack and defense have been integrated in the utility functions of the players. We have proven the existence of a generalized Nash equilibrium of the attackers’ game, studied the existence and properties of the equilibria of the Stackelberg and the hybrid games and proposed learning algorithms, and proved their convergence, to compute the games’ solutions. Numerical results have shown the critically important role of the defender in protecting the grid and the potential conflicting interaction between the multiple adversaries. Our results also highlight potential loss that the defender can incur due to a lack of information about the actions of the attackers.
References
- [1] Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, pp. 1–33, May 2011.
- [2] T. Kim and H. V. Poor, “Strategic protection against data injection attacks on power grids,” IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 326–333, June 2011.
- [3] S. Cui, Z. Han, S. Kar, T. Kim, H. Poor, and A. Tajer, “Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions,” Signal Processing Magazine, IEEE, vol. 29, no. 5, pp. 106–115, Sept 2012.
- [4] L. Xie, Y. Mo, and B. Sinopoli, “Integrity data attacks in power market operations,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 659–666, Dec 2011.
- [5] M. Esmalifalak, G. Shi, Z. Han, and L. Song, “Bad data injection attack and defense in electricity market using game theory study,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 160–169, March 2013.
- [6] A. Sanjab and W. Saad, “Smart grid data injection attacks: To defend or not?” in 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), Nov 2015, pp. 380–385.
- [7] S. Ross and B. Chaib-draa, “Learning to play a satisfaction equilibrium.”,” in Workshop on Evolutionary Models of Collaboration, 2007.
- [8] A. L. Ott, “Experience with pjm market operation, system design, and implementation,” IEEE Transactions on Power Systems, vol. 18, no. 2, pp. 528–534, May 2003.
- [9] F. Li, Y. Wei, and S. Adhikari, “Improving an unjustified common practice in ex post lmp calculation,” IEEE Transactions on Power Systems, vol. 25, no. 2, pp. 1195–1197, May 2010.
- [10] A. Abur and A. G. Exposito, Power system state estimation: theory and implementation. New York: Marcel Dekker, 2004.
- [11] F. Miao, Q. Zhu, M. Pajic, and G. Pappas, “Coding sensor outputs for injection attacks detection,” in Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on, 2014, pp. 5776–5781.
- [12] T. Başar and G. J. Olsder, Dynamic Noncooperative Game Theory. Philadelphia, PA, USA: SIAM Series in Classics in Applied Mathematics, Jan. 1999.
- [13] A. Von Heusinger and C. Kanzow, “Relaxation methods for generalized nash equilibrium problems with inexact line search,” Journal of Optimization Theory and Applications, vol. 143, no. 1, pp. 159–183, 2009.
- [14] G. Debreu, “A social equilibrium existence theorem,” Proceedings of the National Academy of Sciences of the United States of America, vol. 38, no. 10, p. 886, 1952.
- [15] F. Facchinei and C. Kanzow, “Generalized nash equilibrium problems,” 4OR, vol. 5, no. 3, pp. 173–210, 2007.
- [16] A. von Heusinger and C. Kanzow, “Optimization reformulations of the generalized nash equilibrium problem using nikaido-isoda-type functions,” Computational Optimization and Applications, vol. 43, no. 3, pp. 353–377, 2009.
- [17] K. S. Narendra and M. A. L. Thathachar, Learning automata: an introduction. Englewood Cliffs, N.J: Prentice Hall, 1989.
- [18] P. Sastry, V. Phansalkar, and M. Thathachar, “Decentralized learning of nash equilibria in multi-person stochastic games with incomplete information,” IEEE Transactions on Systems, Man and Cybernetics, vol. 24, no. 5, pp. 769–777, May 1994.
- [19] S. Perlaza, H. Tembine, S. Lasaulce, and M. Debbah, “Quality-of-service provisioning in decentralized networks: A satisfaction equilibrium approach,” Selected Topics in Signal Processing, IEEE Journal of, vol. 6, no. 2, pp. 104–116, April 2012.
- [20] O. Alsac and B. Stott, “Optimal load flow with steady-state security,” IEEE Transactions on Power Apparatus and Systems, vol. PAS-93, no. 3, pp. 745–751, May 1974.
- [21] R. Ferrero, S. Shahidehpour, and V. Ramesh, “Transaction analysis in deregulated power systems using game theory,” IEEE Transactions on Power Systems, vol. 12, no. 3, pp. 1340–1347, Aug 1997.