Sökning: id:"swepub:oai:DiVA.org:kth-339712" >
A tri-level program...
A tri-level programming-based frequency regulation market equilibrium under cyber attacks
-
- Wang, Ying (författare)
- Southeast University, Nanjing, China
-
- Chen, Chunyu (författare)
- China University of Mining and Technology, Xuzhou, China
-
- Zhang, Sen (författare)
- State Grid Jiangsu Electric Power Company Ltd. Research Institute, Nanjing, China
-
visa fler...
-
- Liu, Yilong (författare)
- KTH,Elektroteknik
-
- Huang, Chongxin (författare)
- Nanjing University of Posts and Telecommunications, Nanjing, China
-
- Du, Yuxin (författare)
- Xuzhou University of Technology, Xuzhou, China
-
visa färre...
-
(creator_code:org_t)
- Springer Nature, 2023
- 2023
- Engelska.
-
Ingår i: Protection and Control of Modern Power Systems. - : Springer Nature. - 2367-2617 .- 2367-0983. ; 8:1
- Relaterad länk:
-
https://doi.org/10.1...
-
visa fler...
-
https://urn.kb.se/re...
-
https://doi.org/10.1...
-
visa färre...
Abstract
Ämnesord
Stäng
- Owing to their flexibility and rapid response, grid-connected distributed energy resources (DERs) are wielding growing influence in frequency regulation markets (FRMs). Nevertheless, compared with conventional large-scale generators, small-scale DERs are usually weakly shielded by cyber security measures. This offers attackers the opportunity of disrupting the clearing and settlement of FRMs by manipulating the bid information of DERs. In this paper, the frequency regulation market equilibrium is studied considering the dynamic gaming between attackers and defenders, both of which need the knowledge of FRMs for their interventions. Specifically, a tri-level programming model characterizing the attacker–defender–operator (ADO) interdiction problem in FRMs is developed and then analyzed using a column and constraint generation algorithm, thereby achieving market equilibrium representing the defender's best response to the attacker. The defense strategy in the market equilibrium can attenuate the negative influence of cyber attacks upon the FRMs to the maximum extent. Finally, based on the operating rules of the California Independent System Operator, the FRM process considering the ADO interdiction is simulated and the numerical equilibrium results are presented.
Ämnesord
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik -- Annan elektroteknik och elektronik (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering -- Other Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)
- NATURVETENSKAP -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
- NATURAL SCIENCES -- Computer and Information Sciences -- Computer Sciences (hsv//eng)
Nyckelord
- Cyber attack
- Defender–attacker–operator interdiction
- Frequency regulation market
- Tri-level programming
Publikations- och innehållstyp
- ref (ämneskategori)
- art (ämneskategori)
Hitta via bibliotek
Till lärosätets databas