2024
DOI: 10.3390/sym16020156
|View full text |Cite
|
Sign up to set email alerts
|

Attack–Defense Confrontation Analysis and Optimal Defense Strategy Selection Using Hybrid Game Theoretic Methods

Bao Jin,
Xiaodong Zhao,
Dongmei Yuan

Abstract: False data injection attacks are executed in the electricity markets of smart grid systems for financial benefits. The attackers can maximize their profits through modifying the estimated transmission power and changing the prices of market electricity. As a response, defenders need to minimize expected load losses and generator trips through load and power generation adjustments. The selection of strategies of the attacking and defending sides turns out to be a symmetric game process. This article proposes a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…Furthermore, due to limitations of space, we cannot conduct comparative study with more existing works within this paper. We may further do this in the future with, say, [47][48][49][50][51], which involves RL-based methods, visual language models, game-theoretic approaches, and evolutionary strategies. Additionally, it is necessary to further investigate the dynamics of swarm confrontation under conditions of incomplete information in order to enhance the broader applicability of the bio-inspired confrontation algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, due to limitations of space, we cannot conduct comparative study with more existing works within this paper. We may further do this in the future with, say, [47][48][49][50][51], which involves RL-based methods, visual language models, game-theoretic approaches, and evolutionary strategies. Additionally, it is necessary to further investigate the dynamics of swarm confrontation under conditions of incomplete information in order to enhance the broader applicability of the bio-inspired confrontation algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…As shown in Figure 2, the TCN module consists of three main components: causal convolution, dilated convolution, and residual blocks [32]. In this module, the convolutional kernel is denoted as k = 3, and the dilation factor is denoted as d = [1,2,4], where the dilation factor is typically a factorial of 2.…”
Section: Bitcn Modulementioning
confidence: 99%
“…Now, a typical CPS merges physical power transmission systems with computer networks. The optimization and standardization of this smart grid are of vital importance to ensure its safe and stable operation [1,2]. However, due to the large-scale integration of smart terminals and the transmission of data through networks by numerous smart devices, the continuous improvement of the intelligent level of the power grid also provides rich attack entrances for malicious attackers.…”
Section: Introductionmentioning
confidence: 99%