<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">763260</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2021.763260</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>A Comprehensive Game Theoretical Defense Strategy in Demand Side Management Against Price Tampering Attacks</article-title>
<alt-title alt-title-type="left-running-head">Fu et&#x20;al.</alt-title>
<alt-title alt-title-type="right-running-head">Comprehensive Game Theoretical Defense Strategy</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Fu</surname>
<given-names>Rong</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1373027/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Chen</surname>
<given-names>Jie</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zhang</surname>
<given-names>Xiaofei</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zhang</surname>
<given-names>Jie</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1452212/overview"/>
</contrib>
</contrib-group>
<aff id="aff1">
<label>
<sup>1</sup>
</label>Nanjing University of Posts and Telecommunications, <addr-line>Nanjing</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<label>
<sup>2</sup>
</label>State Grid Electric Power Research Institute, <addr-line>Nanjing</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1101902/overview">Zimran Rafique</ext-link>, Higher Colleges of Technology, United Arab Emirates</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/615262/overview">Kenneth E. Okedu</ext-link>, National University of Science and Technology,&#x20;Oman</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1124291/overview">Yifan Wang</ext-link>, Northeastern University, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Jie Chen, <email>399010550@qq.com</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Smart Grids, a section of the journal Frontiers in Energy Research</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>25</day>
<month>11</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="collection">
<year>2021</year>
</pub-date>
<volume>9</volume>
<elocation-id>763260</elocation-id>
<history>
<date date-type="received">
<day>23</day>
<month>08</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>02</day>
<month>11</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2021 Fu, Chen, Zhang and Zhang.</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Fu, Chen, Zhang and Zhang</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these&#x20;terms.</p>
</license>
</permissions>
<abstract>
<p>Price tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a space-based cumulative intrusion detection method is proposed to pick up the discrepancy under tampering attacks. To verify the practicability of the proposed method, intrusion detection experiments are tested in the Principal Information and Safety Laboratory. Then, comprehensively considering the purchase of electricity from the power grid, self-generation, and load shedding, a quantitative model of attack consequences is established based on the allocation coefficient. Thus, the intrusion detection algorithm is used as a defense resource, and a demand-side defense protection strategy is formed to find an optimal deployment method based on non-cooperative game theory. The defensive protection strategy takes the quantitative model of attack consequences as the solution target, and solves the Nash equilibrium solution under different attack modes. Finally, in the IEEE-33 node system simulations, the defense resource is deployed using intrusion detection strategy, and the defense decision is executed to show the effectiveness of the comprehensive protection strategies.</p>
</abstract>
<kwd-group>
<kwd>cyber-physical system</kwd>
<kwd>demand side defense</kwd>
<kwd>price tampering attack</kwd>
<kwd>game theory</kwd>
<kwd>load shedding</kwd>
</kwd-group>
<contract-sponsor id="cn001">National Natural Science Foundation of China<named-content content-type="fundref-id">10.13039/501100001809</named-content>
</contract-sponsor>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>The cyber-physical system integrates the computing system, the communication network, and the physical environment through computation, communication, and control (3C) technology. Thus, a multi-dimensional heterogeneous complex system that integrates real-time sensing, dynamic control, and information services is formed by <xref ref-type="bibr" rid="B15">Liu et&#x20;al. (2015)</xref>. In recent years, with the rapid development of smart grid construction, the interaction between traditional power networks and information networks has become increasingly complex. <xref ref-type="bibr" rid="B36">Zhao et&#x20;al. (2010)</xref> indicates that The modern power system is no longer the traditional power equipment network. It develops into a power cyber-physical system (CPS) with various typical features.</p>
<p>As a private network of power industrial control systems, power communication network had the characteristic of &#x201c;secure partition, network-specific, horizontal isolation, and vertical authentication&#x201d;. And it was considered to have strong security and reliability for a long time which was proposed by <xref ref-type="bibr" rid="B17">Miao et&#x20;al. (2009)</xref>. However, compared with the traditional primary power network, the research on security protection for power communication systems started&#x20;late.</p>
<p>Recently, A.<xref ref-type="bibr" rid="B3">Ashok et&#x20;al. (2017)</xref> &#x2019;s research showed that traditional physical isolation can&#x2019;t guarantee the absolute security of power CPS. So the attack against the power system wasn&#x2019;t implemented on the physical side only. On the contrary, current attack was more likely to happen on the information side due to the low cost and the greater potential damage. <xref ref-type="bibr" rid="B23">Tang et&#x20;al. (2016)</xref> revealed the ever-changing attack methods which may exist on the information side of the power CPS. The Ukrainian power outage event analyzed in the literature of <xref ref-type="bibr" rid="B26">Tong et&#x20;al. (2016)</xref> was an example of a network attack in the power network.</p>
<p>Currently, false data injection attacks (FDIA) exist in all aspects of the power CPS according to <xref ref-type="bibr" rid="B23">Tang et&#x20;al. (2016)</xref>. <xref ref-type="bibr" rid="B35">Zhao et&#x20;al. (2016)</xref> and <xref ref-type="bibr" rid="B18">Ni et&#x20;al. (2016)</xref> indicated that the attacker attacked the sensing device by injecting false data to achieve the purpose of attacking the power grid. <xref ref-type="bibr" rid="B30">Wang. (2014)</xref> described the FDIA against large, complex SCADA systems. The relative active/passive defense methods need to be further studied (<xref ref-type="bibr" rid="B8">Hahn and Manimaran, 2011</xref>; <xref ref-type="bibr" rid="B25">Tian et&#x20;al., 2018</xref>).</p>
<p>At the same time, renewable energy is developing fast. Prosumers in the smart grid have not only participated in the production, transmission, distribution, and use of electricity as consumers, but also have gradually participated in the distributed generation process as the role of power producers according to <xref ref-type="bibr" rid="B12">Jun et&#x20;al. (2015)</xref> and <xref ref-type="bibr" rid="B34">Yang et&#x20;al. (2018)</xref>. The electricity consumed in an area consists of two parts-traditional power and local distributed new energy generation such as solar energy, wind energy, etc. In this case, the regional electricity price can no longer be fixed to a certain value. It should dynamically change with the production of two kinds of electric energy to pursue the maximization of their profits according to <xref ref-type="bibr" rid="B24">Telaretti et&#x20;al. (2014)</xref> &#x2019;s points.</p>
<p>This situation requires the introduction of a competitive mechanism in the field of power generation. The business model of the open power generation side has gradually formed. It means that each power generation unit needs to compete in the electricity market. In such case, <xref ref-type="bibr" rid="B28">Wang. (2001)</xref> revealed that the opening of electricity prices also brought many security risks. With the development of power CPS and new energy technologies, the power grid has become more distributed. The control center in the power grid gradually becomes more diversified. Regional power grids often use proxy methods to participate in electricity price decisions. In order to obtain more benefits or implement destructive actions, malicious bidding events occur from time to time. In the literature of <xref ref-type="bibr" rid="B16">Ma et&#x20;al. (2016)</xref>, real-time electricity price attacks had a serious impact on user load demand. <xref ref-type="bibr" rid="B33">Xia et&#x20;al. (2017)</xref> conducted experiments and found that electricity price delay attacks caused great interference to the electricity market.</p>
<p>As can be seen from <xref ref-type="bibr" rid="B11">Jie et&#x20;al. (2019)</xref>, a Stackelberg game was used to model Man-In-The-Middle (MITM) attack mode. They compared the financial loss and the effect of cyber security. From the result, there were great differences in the losses and delays caused by MITM attacks before and after defensive measures. MITM attacks were studied in VANET by <xref ref-type="bibr" rid="B1">Ahmad et&#x20;al. (2018)</xref>. Results suggested that these attacks had a massive influence on the network in terms of low content delivery, high end-to-end delay, compromised messages, and packet losses. For example, for 50% distributed MITM attackers, the network experiences about 6.89% more loss as compared to the network containing fleet attackers. In the field of electricity, <xref ref-type="bibr" rid="B6">Chen et&#x20;al. (2017)</xref> showed the man-in-the-middle attacks against smart meters DL/T 645&#x2013;2007 Protocol. <xref ref-type="bibr" rid="B29">Wang et&#x20;al. (2015)</xref> described a false data injection attack against multi-step electricity prices (MEP). It can be seen that the malicious bidding behavior realized by MITM attacks on electricity prices has gradually become a big problem. And it needs more attention and better solutions (<xref ref-type="bibr" rid="B10">Lin et&#x20;al., 2013</xref>). This shows that man-in-the-middle attacks cannot be ignored. It is gradually affecting the security of systems that contain communications such as power&#x20;CPS.</p>
<p>Generally, there have been two types of MITM attacks on electricity prices (23&#x2013;25) (<xref ref-type="bibr" rid="B5">Bharti and Mala, 2019</xref>; <xref ref-type="bibr" rid="B20">Singh et&#x20;al., 2019</xref>; <xref ref-type="bibr" rid="B22">Sun et&#x20;al., 2019</xref>): 1) It attacks the information flow; 2) It attacks the information center (<xref ref-type="bibr" rid="B21">Song, 2018</xref>). The first type of MITM attacks can maliciously change the price data between the buyer and the seller, and the second type can send false price data. Because the first type is easy to operate, it becomes the main way of MITM attacks on electricity prices according to <xref ref-type="bibr" rid="B2">Liwei and Yang. (2019)</xref>.</p>
<p>When MITM attacks on electricity prices occur, the load changes according to electricity prices. Further, the load may be mismatched with the source. When the load is larger than the source, the voltage level would decrease and the load shedding would occur in a large area sometimes. When the load is less than the source, the system voltage level would rise, which may lead to an electric accident.</p>
<p>In this case, <xref ref-type="bibr" rid="B4">Bao (2018)</xref> studied that the attacker and the defender are clearly opposed. The attack mode of the middleman attacker will not be static, and it will develop in the direction of maximizing the attack benefits. In order to cope with the changing attacks, grid defenders must also respond in a timely manner. The attacker wants to cause the biggest grid loss. The purpose of the defender is to reduce this loss. This process is consistent with the process of the&#x20;game.</p>
<p>As a powerful solution tool, the game theory had been widely used to solve various problems in the power system. W. Lee et&#x20;al. used game theory to solve the problem of new energy consumption (<xref ref-type="bibr" rid="B14">Lee et&#x20;al., 2015</xref>). The game strategy was also used by <xref ref-type="bibr" rid="B31">Wei et&#x20;al. (2018)</xref> to solve the coordinated cyber-physical attacks problem.</p>
<p>This article starts from the intrusion detection and protection of price tampering attacks by MITM attackers. A set of defense strategies is designed based on state estimation and game theory. The main content of this article has the following aspects:<list list-type="simple">
<list-item>
<p>1) A cumulative error detection strategy based on normal distribution is designed to detect the price tampering attack by MITM attackers;</p>
</list-item>
<list-item>
<p>2) Based on the minimum comprehensive cost, a quantitative model of attack consequences is established which considers three demand-side response methods of purchasing power from the external grid, self-generation, and load shedding comprehensively;</p>
</list-item>
<list-item>
<p>3) A demand-side defense protection strategy based on game theory is established. The model uses the intrusion detection method to deploy defend resources, and sets the demand-responsive attack consequence quantitative model as the game target.</p>
</list-item>
</list>
</p>
</sec>
<sec id="s2">
<title>2 Demand Response Analysis Under Price Tamping Attacks</title>
<sec id="s2-1">
<title>2.1 Architecture of a User Energy System</title>
<p>On the demand side, prosumers such as residential, commercial, industrial consumers, have their dispatch centers to monitor their loads and generations in a User Energy System. These dispatch centers are managed by User Energy Management System (UEMS) (Ma L et&#x20;al., 2016). Among them, residential and commercial electricity consumption affected by current electricity price is small and industrial electricity consumption is often relatively large, due to the difference in production costs elasticity. For example, residential prosumers have micro power generation units installed on the user side, such as photovoltaic and wind power, and can meet part of the power demand on the demand side through self-generation. The architecture of a User Energy System is shown in <xref ref-type="fig" rid="F1">Figure&#x20;1</xref>.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>User Energy System architecture under cyber attacks.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g001.tif"/>
</fig>
<p>In this architecture, prosumers can be divided into several areas for better control. Each area is controlled by a Distributed Control Unit (DCU), which is responsible for transferring distributed information. In UEMS, each DCU communicates with the demand-side control center to achieve measurement and control of the demand side. The center makes decisions based on the information uploaded by the DCUs. These DCUs control the energy transactions of prosumers in the area, generate electricity prices according to the power consumption and load type of the corresponding area, and upload them to the demand-side control center. The demand-side control center can communicate with the external distribution grid about its electricity information.</p>
<p>The Electricity price tampering attack scenario based on MITM attack is simulated in the experiment. MITM attack on electricity price provide false information to interfere with the power market. MITM attack secretly changed the communication mode between UEMS and demand side control center. It makes the initial connection becomes a new connection with the intervention of a MITM attacker. Therefore, the normal tariff transmitted in the original connection will be replaced by malicious electricity price required by the bidder. UEMS will no longer purchase and use power resources according to the normal electricity price. MITM attack mode is shown in <xref ref-type="fig" rid="F2">Figure&#x20;2</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>MITM attack mode between DCUs and dispatch center</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g002.tif"/>
</fig>
</sec>
<sec id="s2-2">
<title>2.2 Electricity Changes Under Price Tampering Attacks</title>
<p>When a price tampering attack occurs on the demand side, it will cause demand changes to the corresponding area. Based on the price elasticity of electricity demand (PEED) model proposed by <xref ref-type="bibr" rid="B9">Hu et&#x20;al. (2008)</xref>, the electricity consumption change of an area after the attack can be expressed.<list list-type="simple">
<list-item>
<p>1) Large power consumers consume more variable electricity such as industrial users, and their electricity prices are higher than ordinary ones. When the price tampering attack occurs, due to the influence of production costs, large power consumers purchase electricity under certain restrictions. The electricity consumption <inline-formula id="inf1">
<mml:math id="m1">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>a</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> after the price tampering attack is defined&#x20;as:</p>
</list-item>
</list>
<disp-formula id="e1">
<mml:math id="m2">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>a</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:msup>
<mml:mi>p</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>where <inline-formula id="inf2">
<mml:math id="m3">
<mml:mi>p</mml:mi>
</mml:math>
</inline-formula> is the normal electricity price without attack, &#xa5;/kW. <inline-formula id="inf3">
<mml:math id="m4">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the electricity consumption before price tampering attack, kW. <inline-formula id="inf4">
<mml:math id="m5">
<mml:msup>
<mml:mi>p</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:math>
</inline-formula> is the false electricity price tampered by the attacker, &#xa5;/kW.</p>
<p>2) Small power consumers usually consume load relatively constantly, such as residential and commercial users. They seldom change their own electricity demand when the electricity price changes. Suppose their electricity consumption in a certain area is <inline-formula id="inf5">
<mml:math id="m6">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, it can be considered that the price tampering attack has no intuitive effect on their electricity demands, the electricity consumption <inline-formula id="inf6">
<mml:math id="m7">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>b</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> after the price tampering attack refers to: <inline-formula id="inf7">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>b</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<p>According to the power consumption changes of these two types of consumers, the PEED model is used to express the electricity consumption <inline-formula id="inf8">
<mml:math id="m9">
<mml:mi>D</mml:mi>
</mml:math>
</inline-formula> of the region after the price tampering attack:<disp-formula id="e2">
<mml:math id="m10">
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>E</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>p</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mi>p</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:msup>
<mml:mi>p</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>where <inline-formula id="inf9">
<mml:math id="m11">
<mml:mrow>
<mml:mover accent="true">
<mml:mi>p</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> is the benchmark electricity price from the external grid, the unit is &#xa5;/kW. <inline-formula id="inf10">
<mml:math id="m12">
<mml:mi>E</mml:mi>
</mml:math>
</inline-formula> is the self-elasticity coefficient of electricity demand price: <inline-formula id="inf11">
<mml:math id="m13">
<mml:mrow>
<mml:mi>E</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>a</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mrow>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>p</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mi>p</mml:mi>
</mml:mrow>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<p>To sum up, if the price tampering attack is successful, the&#x20;target area has an electricity change <inline-formula id="inf12">
<mml:math id="m14">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> in the total demand:<disp-formula id="e3">
<mml:math id="m15">
<mml:mrow>
<mml:mi mathvariant="italic">&#x394;</mml:mi>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
</p>
</sec>
</sec>
<sec id="s3">
<title>3 Intrusion Detection of Price Tamping Attacks</title>
<p>This section studies how to detect price tamping attacks based on statistical bias and state estimation. Intrusion detection is essential to determine whether an abnormal event occurs in the system. It comes down to the problem of distinguishing between &#x201c;normal&#x201d; and &#x201c;abnormal&#x201d; states. The existing anomaly detection methods can be divided into deviation-based detection and feature-based detection methods according to the identification&#x20;basis.</p>
<p>In the actual application process, the detection relying on a single residual is likely to cause residual pollution and flooding. It can lead to missed or false detection of abnormal data. So when there is a lot of abnormal data in the detected data, the correlation between the data cannot be fully utilized. This detection method is also powerless to attack multiple nodes at the same time. The detection accuracy of detection methods based on state estimation will also be greatly affected.</p>
<p>Aiming at the shortcoming that the detection result is overly dependent on a single residual, this section studies a cumulative error detection strategy based on a normal distribution under&#x20;tampering attacks. The strategy improves the detection success rate from the perspective of multi-point cumulative deviation.</p>
<p>The detection of price tampering attacks is essentially a state estimation process. Power system state estimation processing generally analyzes low-precision, incomplete, and occasionally bad data in power system measurement data, and outputs high-precision, complete, and reliable data after processing.</p>
<sec id="s3-1">
<title>3.1 Basic Theory of Intrusion Detection</title>
<p>Here are general intrusion detection processes of the power system:</p>
<p>1) Establish state estimation functions. The state estimation equation is: <inline-formula id="inf13">
<mml:math id="m16">
<mml:mrow>
<mml:mi mathvariant="bold">z</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold">h</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi mathvariant="bold">x</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi mathvariant="bold">e</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf14">
<mml:math id="m17">
<mml:mrow>
<mml:mi mathvariant="bold">z</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the measured value vector of the measuring component; <inline-formula id="inf15">
<mml:math id="m18">
<mml:mrow>
<mml:mi>h</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>x</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is nonlinear electricity balance functions; <inline-formula id="inf16">
<mml:math id="m19">
<mml:mrow>
<mml:mi mathvariant="bold">x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is a&#x20;state vector; <inline-formula id="inf17">
<mml:math id="m20">
<mml:mrow>
<mml:mi mathvariant="bold">e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>e</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the measurement error vector.</p>
<p>2) Simplify the state estimation functions. In order to facilitate calculation, assumptions are as follows: the bus voltage value is approximately equal to 1; the shunt component, bus, branch circuit, and reactive power flow can be ignored. Now, <inline-formula id="inf18">
<mml:math id="m21">
<mml:mrow>
<mml:mi mathvariant="bold">h</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi mathvariant="bold">x</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> can be linearized to <inline-formula id="inf19">
<mml:math id="m22">
<mml:mrow>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:mi mathvariant="bold-italic">x</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf20">
<mml:math id="m23">
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">m</mml:mi>
<mml:mo mathvariant="bold-italic">&#xd7;</mml:mo>
<mml:mi mathvariant="bold-italic">n</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> is a constant Jacobian matrix.</p>
<p>3) Modify the state estimation functions. When the price tamping attack occurs, prosumers response to change the demand loads, and the measured value vector is modified as <inline-formula id="inf21">
<mml:math id="m24">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">Z</mml:mi>
<mml:mi mathvariant="bold-italic">a</mml:mi>
</mml:msub>
<mml:mo mathvariant="bold-italic">&#x3d;</mml:mo>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo mathvariant="bold-italic">&#x2b;</mml:mo>
<mml:mi mathvariant="bold-italic">a</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf22">
<mml:math id="m25">
<mml:mi>z</mml:mi>
</mml:math>
</inline-formula> is the true measured value, <inline-formula id="inf23">
<mml:math id="m26">
<mml:mrow>
<mml:mi mathvariant="bold-italic">a</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is a non-zero attack vector. This will cause the state vector to change: <inline-formula id="inf24">
<mml:math id="m27">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mi mathvariant="bold-italic">x</mml:mi>
<mml:mo mathvariant="bold-italic">&#x5e;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>d</mml:mi>
<mml:mo>&#xa0;</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mi mathvariant="bold-italic">x</mml:mi>
<mml:mo mathvariant="bold-italic">&#x5e;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi mathvariant="bold-italic">c</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf25">
<mml:math id="m28">
<mml:mrow>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo>&#x5e;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> is the initial state value, <inline-formula id="inf26">
<mml:math id="m29">
<mml:mi mathvariant="bold-italic">c</mml:mi>
</mml:math>
</inline-formula> is the amount of impact of the attack.</p>
<p>Now, the measurement error vector after the price tamping attack can be obtained:<disp-formula id="e4">
<mml:math id="m30">
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:msubsup>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>a</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mi mathvariant="bold-italic">x</mml:mi>
<mml:mo>&#x5e;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mrow>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi mathvariant="bold-italic">a</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mover accent="true">
<mml:mi mathvariant="bold-italic">x</mml:mi>
<mml:mo>&#x5e;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi mathvariant="bold-italic">c</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msubsup>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mrow>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:mrow>
<mml:mover accent="true">
<mml:mi mathvariant="bold-italic">x</mml:mi>
<mml:mo>&#x5e;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi mathvariant="bold-italic">a</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:mi mathvariant="bold-italic">c</mml:mi>
</mml:mrow>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msubsup>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
</sec>
<sec id="s3-2">
<title>3.2 Cumulative Error Detection Based on Normal Distribution</title>
<p>Assuming that small independent effects make an additive contribution to each observation, the measuring datum are random and have a multivariate normal distribution based on historical data analysis. So a Bayesian model is established to describe the true data <inline-formula id="inf27">
<mml:math id="m31">
<mml:mi>z</mml:mi>
</mml:math>
</inline-formula> as <inline-formula id="inf28">
<mml:math id="m32">
<mml:mrow>
<mml:mi>z</mml:mi>
<mml:mo>&#x223c;</mml:mo>
<mml:mi>N</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>&#x3bc;</mml:mi>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>&#x3c3;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. When there is a price tamping attack, some specific measures such as electricity price and load demands are bound to be changed. The combination of these measures will cause the state variables to move away from their true values.</p>
<p>When the attacker knows the defense information of the defender (layout <inline-formula id="inf29">
<mml:math id="m33">
<mml:mi mathvariant="bold-italic">H</mml:mi>
</mml:math>
</inline-formula> and error detection algorithm, etc.), the covert attack can make <inline-formula id="inf30">
<mml:math id="m34">
<mml:mrow>
<mml:mi mathvariant="bold-italic">a</mml:mi>
<mml:mo mathvariant="bold-italic">&#x2212;</mml:mo>
<mml:mi mathvariant="bold-italic">H</mml:mi>
<mml:mi mathvariant="bold-italic">c</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> zero, and the deviation <inline-formula id="inf31">
<mml:math id="m35">
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>z</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>Z</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> generated by one measurement is not enough to be detected by the detection system.</p>
<p>When the deviation of all measured values in the vector is accumulated from the vector, the accumulated deviation will become prominent. The detection scheme studied in this section identifies attacks based on cumulative errors, such as the relationship between electricity changes and abnormal pricing measures.</p>
<p>Here, a space-based cumulative error detection method based on hypothesis testing is introduced. The cumulative deviation is as follows:<disp-formula id="e5">
<mml:math id="m36">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:munderover>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>z</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mi>Z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3c3;</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>
</p>
<p>Here we consider two assumptions: <inline-formula id="inf32">
<mml:math id="m37">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf33">
<mml:math id="m38">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. <inline-formula id="inf34">
<mml:math id="m39">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is a null hypothesis in which the measured load value is true; <inline-formula id="inf35">
<mml:math id="m40">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is an assumption that the cyber system has been attacked. These two assumptions can be described as:<disp-formula id="e6">
<mml:math id="m41">
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>:</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>:</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x2016;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x2016;</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
</p>
<p>We assume that measurement vector <inline-formula id="inf36">
<mml:math id="m42">
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>z</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>z</mml:mi>
<mml:mn>2</mml:mn>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>z</mml:mi>
<mml:mi>m</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> follows a multivariate Gaussian distribution and <inline-formula id="inf37">
<mml:math id="m43">
<mml:mrow>
<mml:msubsup>
<mml:mi>z</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> are independent of each other. It can be expressed as <inline-formula id="inf38">
<mml:math id="m44">
<mml:mrow>
<mml:msubsup>
<mml:mi>z</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>&#x223c;</mml:mo>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3c3;</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> Here, <inline-formula id="inf39">
<mml:math id="m45">
<mml:mrow>
<mml:msup>
<mml:mi>Z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> is the average vector and <inline-formula id="inf40">
<mml:math id="m46">
<mml:mi>&#x39e;</mml:mi>
</mml:math>
</inline-formula> is a diagonal covariance matrix. Thus, <inline-formula id="inf41">
<mml:math id="m47">
<mml:mrow>
<mml:mi>J</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mi>Z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mi>T</mml:mi>
</mml:msup>
<mml:msup>
<mml:mi>&#x39e;</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mi>Z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, i.e.,&#x20;<inline-formula id="inf42">
<mml:math id="m48">
<mml:mrow>
<mml:mi>J</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x223c;</mml:mo>
<mml:msup>
<mml:mi>&#x3c7;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>m</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> Based on the above, the hypothesis test is given by a threshold <inline-formula id="inf43">
<mml:math id="m49">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula> corresponding to the load changes. When <inline-formula id="inf44">
<mml:math id="m50">
<mml:mrow>
<mml:mi>J</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:msup>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>&#x3c4;</mml:mi>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> holds and the attack is undetected; when <inline-formula id="inf45">
<mml:math id="m51">
<mml:mrow>
<mml:mi>J</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:msup>
<mml:mi mathvariant="bold-italic">z</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mi>&#x3c4;</mml:mi>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> holds and the attack is detected.</p>
</sec>
<sec id="s3-3">
<title>3.3 Experiment Analysis</title>
<p>An intrusion detection test environment is built to check the strategy&#x2019;s effectiveness (<xref ref-type="fig" rid="F3">Figure&#x20;3A</xref>). Its equivalent topology is shown in <xref ref-type="fig" rid="F3">Figure&#x20;3B</xref>. In the Test Verification Center of the Principal Information and Safety Laboratory, the avalanche application attack test tool, Hessman switches, and Wireshark packet capture tools are used to test price tamping attacks. The communication side port connection diagram for the test process is shown in the <xref ref-type="fig" rid="F3">Figure&#x20;3C</xref>.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Experimental environment. <bold>(A)</bold> Attack test platform. <bold>(B)</bold> Intrusion detection test environment. <bold>(C)</bold> The communication topology with 4 DCUs.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g003.tif"/>
</fig>
<p>In the experimental environment, each DCU (using 4 DCUs for simulation test) is connected to the simulation dispatch center through a Hessman switch. Simulated packet sending tools are used to send GOOSE/SV messages to UEMS, which simulates the normal output and consumption of each area on the demand side. In each DCU, the price information is collected in the information link through the packet capture tool and sent to the demand side control center regularly. In the demand side control center, the intrusion detection strategy is tested to detect the attacks. Due to limited resources, 4 DCUs are simulated in a&#x20;UEMS.</p>
<p>The experiment test steps are as follows:<list list-type="simple">
<list-item>
<p>1) The input and output ports of DCU, UEMS, avalanche application attack tester, switch, and other devices are connected according to the communication topology. The DCUs are connected at all levels to the demand side control center through the communication equipment switch. Through the Hessman switch, the analog demand side control center and the switch connection port are assigned to VLAN100. Configure the DCU and switch connection ports at all levels as TRUNK&#x20;ports.</p>
</list-item>
<list-item>
<p>2) Connect the avalanche application attack tester to the switch, and connect the port to VLAN200. Perform corresponding price tampering attacks to the DCU through the switch using MITM attack&#x20;mode.</p>
</list-item>
<list-item>
<p>3) DCU sends the compound information message with a digital signature to the demand side control center, and the analog side control center detection unit uses the proposed intrusion strategies to judge whether the price tampering attack occurs.</p>
</list-item>
<list-item>
<p>4) Repeat the test to obtain the detection success rate under different price tampering attacks.</p>
</list-item>
</list>
</p>
<p>In order to reflect the superiority of the intrusion detection strategy, a horizontal comparison is carried out. The detection results of traditional single-point detection, non-parametric cumulative detection, and cumulative error detection strategies under the same attack scheme and threshold are analyzed.</p>
<p>The relevant parameters of the experiment 1 are set as follows:<list list-type="simple">
<list-item>
<p>1) Set the current market electricity price to 100&#xa0;&#xa5;/kW.</p>
</list-item>
<list-item>
<p>2) Set the attack method as follows: DCU1 price is tampered with 80% of the original electricity price, DCU2 price is tampered with 60% of the original electricity price, DCU3 price is tampered with the original electricity price of 100%, and DCU4 electricity price is tampered with the original electricity price of&#x20;100%.</p>
</list-item>
<list-item>
<p>3) Set the threshold as follows: <inline-formula id="inf46">
<mml:math id="m52">
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>40</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>;</p>
</list-item>
<list-item>
<p>4) Set the number of simulations from1 to 100, and the statistics node from 1 to&#x20;10.</p>
</list-item>
</list>
</p>
<p>The detection success rate obtained by simulation is shown in <xref ref-type="fig" rid="F4">Figure&#x20;4A</xref>. The abscissa shows the number of detections. The ordinate is the detection success rate. 100 trials are conducted and the detection success rate is the ratio of successful intrusion detection number in the total number of tests. During the test, the detection success rate varies with the number of tests. This is due to errors (such as communication data packet loss and communication delay) that may occur during the test. From the overall trend, the cumulative error detection mentioned can achieve a detection success rate of more than 76%, the cumulative detection success rate (73% in 100 trials), and the single-point detection success rate (66% in 100 trials). It can be seen that the detection success rate is sorted according to size: cumulative error detection success rate &#x3e; non-parametric cumulative detection success rate &#x3e; single point detection success&#x20;rate.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Line chart. <bold>(A)</bold> comparison results of three detection methods. <bold>(B)</bold> The relationship between detection success rate and <inline-formula id="inf47">
<mml:math id="m53">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula>.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g004.tif"/>
</fig>
<p>The relationship between detection success rate and the threshold <inline-formula id="inf48">
<mml:math id="m54">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula> is shown in <xref ref-type="fig" rid="F4">Figure&#x20;4B</xref>. The abscissa shows the logarithmic function <inline-formula id="inf49">
<mml:math id="m55">
<mml:mrow>
<mml:mi>lg</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
<mml:mo>/</mml:mo>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
</mml:mrow>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of the threshold <inline-formula id="inf50">
<mml:math id="m56">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula>. Different threshold values of 20, 40, 80, &#x2026; 2,560 are chosen for tests. When <inline-formula id="inf51">
<mml:math id="m57">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula> &#x2264;80, the detection success rate reaches the maximum and will not increase. When <inline-formula id="inf52">
<mml:math id="m58">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula> &#x3e; 80, the detection success rate gradually decreases with the increment of the threshold value, the sensitivity of the algorithm becomes insufficient, and some price tampering attacks are missed from detection. When <inline-formula id="inf53">
<mml:math id="m59">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula> &#x3e; 1,280, the detection success rate is less than&#x20;50%.</p>
<p>To examine the detection success of the defense strategy against different attack methods, experiment 2 first analyzed the detection success of the strategy when attacking different regions with the same amount of price tampering attack, <xref ref-type="table" rid="T1">Table&#x20;1</xref>. The parameters for experiment 2 are set as follows.<list list-type="simple">
<list-item>
<p>1) Set the current market electricity price to 100&#xa0;&#xa5;/kW.</p>
</list-item>
<list-item>
<p>2) Based on the principle of random combination, set the following 14 attack methods when the electricity price tampering amount is 80% of the original price in an attack scenario containing four target&#x20;areas.</p>
</list-item>
<list-item>
<p>3) Set the threshold values as follows: <inline-formula id="inf54">
<mml:math id="m60">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula> &#x3d;40</p>
</list-item>
<list-item>
<p>4) Set the number of simulations to&#x20;100.</p>
</list-item>
</list>
</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Price tampering attack methods.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Mode of attack</th>
<th align="center">Target of attack</th>
<th align="center">Mode of attack</th>
<th align="center">Target of attack</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="center">DCU1</td>
<td align="center">8</td>
<td align="center">DCU2,3</td>
</tr>
<tr>
<td align="left">2</td>
<td align="center">DCU2</td>
<td align="center">9</td>
<td align="center">DCU2,4</td>
</tr>
<tr>
<td align="left">3</td>
<td align="center">DCU3</td>
<td align="center">10</td>
<td align="center">DCU3,4</td>
</tr>
<tr>
<td align="left">4</td>
<td align="center">DCU4</td>
<td align="center">11</td>
<td align="center">DCU1,2,3</td>
</tr>
<tr>
<td align="left">5</td>
<td align="center">DCU1,2</td>
<td align="center">12</td>
<td align="center">DCU1,2,4</td>
</tr>
<tr>
<td align="left">6</td>
<td align="center">DCU1,3</td>
<td align="center">13</td>
<td align="center">DCU1,3,4</td>
</tr>
<tr>
<td align="left">7</td>
<td align="center">DCU1,4</td>
<td align="center">14</td>
<td align="center">DCU2,3,4</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The detection success rate obtained from the simulation is shown in <xref ref-type="fig" rid="F5">Figure&#x20;5</xref>.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Experimental results for different tampering attacks.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g005.tif"/>
</fig>
<p>The horizontal coordinates of <xref ref-type="fig" rid="F6">Figure&#x20;6</xref> represent the 14 attack methods and the vertical coordinates represent the detection success rate. From the experimental results, it can be concluded that the detection success rate is higher when the tariff tampering attack attacks more DCUs, indicating that the proposed strategy is more effective in detecting tariff tampering attacks when they occur in more&#x20;areas.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>The attack and defensive strategies flow&#x20;chart.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g006.tif"/>
</fig>
</sec>
</sec>
<sec id="s4">
<title>4 Defense Strategy Based on Attack Consequences</title>
<sec id="s4-1">
<title>4.1&#x20;Demand-Side Response Model With Allocation Coefficient</title>
<sec id="s4-1-1">
<title>4.1.1 Power Purchase Cost Model From the Power Grid</title>
<p>If the price tamping attack occurs, the demand-side prosumers respond to load shedding and power purchase from the power grid. For the regional control center, the purchasing power should satisfy the load demand in the current time period.</p>
<p>According to the demand-side response model, the demand-side power demand has changed under the price tampering attack. At this time, the power demand side must take certain measures to repair or restore the energy balance on the demand&#x20;side.</p>
<p>In the area <inline-formula id="inf55">
<mml:math id="m61">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula> ,the power purchase cost <inline-formula id="inf56">
<mml:math id="m62">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> spent by the power purchaser can be expressed as follows (<xref ref-type="bibr" rid="B32">Wu et&#x20;al., 2002</xref>):<disp-formula id="e7">
<mml:math id="m63">
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold">A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>&#xa0;</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold">A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mo>.</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>.</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>&#xa0;</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>q</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold">A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>where <inline-formula id="inf57">
<mml:math id="m64">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents the proportion of electricity provided by the electricity seller in total demand. <inline-formula id="inf58">
<mml:math id="m65">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents the power purchase price in the electricity spot market. <inline-formula id="inf59">
<mml:math id="m66">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is used to indicate the total power demand of prosumers in the area <italic>k</italic>. <inline-formula id="inf60">
<mml:math id="m67">
<mml:mrow>
<mml:mo>&#xa0;</mml:mo>
<mml:msub>
<mml:mi>q</mml:mi>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents the spot stock of the electricity seller.</p>
</sec>
<sec id="s4-1-2">
<title>4.1.2&#x20;Self-Generation Cost Model</title>
<p>In addition to spot price trading with the power grid, there are also ways to purchase electricity by self-generated energy resources. The internal energy system belongs to the user side, and its power generation cost is the prosumer&#x2019;s electricity cost. In the area <inline-formula id="inf61">
<mml:math id="m68">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>, the power generation cost function of the internal energy system <inline-formula id="inf62">
<mml:math id="m69">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mi>B</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> can be expressed using a quadratic function:<disp-formula id="e8">
<mml:math id="m70">
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mtext>B</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mtext>buy</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mtext>buy</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mo>.</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>.</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mtext>buy</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>q</mml:mi>
<mml:mrow>
<mml:mtext>B</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>where <inline-formula id="inf63">
<mml:math id="m71">
<mml:mrow>
<mml:msub>
<mml:mi>q</mml:mi>
<mml:mrow>
<mml:mtext>B</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents the amount of electricity generated by the internal energy system. <inline-formula id="inf64">
<mml:math id="m72">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the cost factor for power generation. <inline-formula id="inf65">
<mml:math id="m73">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> indicates the ratio of the internal energy system&#x2019;s electricity power in the total power generation. Refer to <xref ref-type="bibr" rid="B27">Wang and Li. (2010)</xref>, the power supply of this type is affected by user investment, so the value <inline-formula id="inf66">
<mml:math id="m74">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is generally 5&#x2013;20%.</p>
<p>In this section, two types of power purchase methods are considered: spot transactions with the power grid, and power purchase in internal energy system power generation. Therefore, the following constraint exists:<disp-formula id="e9">
<mml:math id="m75">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>
</p>
</sec>
<sec id="s4-1-3">
<title>4.1.3 Load Shedding Cost Model</title>
<p>If the price tampering attack consequences are serious, the purchase of electricity may not fully balance the power loss load. At this time, in order to meet the demand-side power supply balance, load shedding is required in an urgent state. Following principles need to be met during load shedding: cut off from the end to the source, give priority to protecting important loads, and ensure normal area power supply.</p>
<p>According to the principle of load shedding, loads in different areas have different importance. <inline-formula id="inf67">
<mml:math id="m76">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is used to indicate the relative importance of load in the area <inline-formula id="inf68">
<mml:math id="m77">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula> (<xref ref-type="bibr" rid="B13">Kucuk. 2018</xref>). The larger the value <inline-formula id="inf69">
<mml:math id="m78">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is, the load in the area is more important, and the load shedding loss is greater. In the process of load shedding, the area load with low <inline-formula id="inf70">
<mml:math id="m79">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is preferentially removed.</p>
<p>Load shedding cost is introduced to quantify the loss caused by load removal. It is related to many factors, such as user type, advance notice time, power outage duration, power outage occurrence time, and power shortage rate. The cost value affected by these factors is usually obtained by user survey, and its calculation method has been specifically analyzed by <xref ref-type="bibr" rid="B19">Ren et&#x20;al. (2006)</xref>. The load shedding cost <inline-formula id="inf71">
<mml:math id="m80">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is as follow:<disp-formula id="e10">
<mml:math id="m81">
<mml:mrow>
<mml:msub>
<mml:mtext>C</mml:mtext>
<mml:mrow>
<mml:mtext>C</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">o</mml:mi>
<mml:mi mathvariant="normal">a</mml:mi>
<mml:mi mathvariant="normal">d</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="normal">o</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="italic">k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
<label>(10)</label>
</disp-formula>where <inline-formula id="inf72">
<mml:math id="m82">
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the load cost, the unit is &#xa5;/kW, and its element represents the cost of the independent load of the corresponding area <inline-formula id="inf73">
<mml:math id="m83">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>, <inline-formula id="inf74">
<mml:math id="m84">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">o</mml:mi>
<mml:mi mathvariant="normal">a</mml:mi>
<mml:mi mathvariant="normal">d</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="normal">o</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents the load reduction amount in the area <inline-formula id="inf75">
<mml:math id="m85">
<mml:mi>k</mml:mi>
</mml:math>
</inline-formula>, the unit is&#x20;kW.</p>
</sec>
<sec id="s4-1-4">
<title>4.1.4 Integrated Defense Cost Model</title>
<p>In the power defense architecture, two types of power suppliers are considered: internal self-generation energy resource and external power grid under the price tampering attack. This means that two different types of electricity sellers need to be considered comprehensively when purchasing electricity. In addition, considering serious attack consequences, some areas may not be able to restore power supply balance through the purchase of electricity. At this time, it is urgent to consider cutting off the loads. To avoid further losses and restore power supply balance as quickly as possible, the system administrator needs to make a trade-off among power purchase, internal energy supply, and load shedding operation.</p>
<p>Load shedding is a serious consequence of a tampering attack on electricity prices. If an area is not directly connected to the external power grid after the attack, it cannot purchase the power supply and restore the loss loads. Although the power purchase scheme could meet the short-term power supply balance promptly, purchasing electricity is a tampered electricity price. The electricity price paid is higher than the normal electricity price, the power purchase cost becomes higher than before. Thus the hidden loss may have an impact in a longer period. At this time, a load loss weight coefficient <inline-formula id="inf76">
<mml:math id="m86">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mn>0,1</mml:mn>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is introduced to represent the ratio of load shedding in operation methods.</p>
<p>For the area <inline-formula id="inf77">
<mml:math id="m87">
<mml:mrow>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>K</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, the integrated regional defense cost <inline-formula id="inf78">
<mml:math id="m88">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mtext>I,k</mml:mtext>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> under the price tampering attack is:<disp-formula id="e11">
<mml:math id="m89">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mtext>I</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mtext>A</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mtext>B</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mtext>C</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
<label>(11)</label>
</disp-formula>
</p>
<p>To reduce the defense cost, the demand-side emergency defense cost minimization function after the price tampering attack is as follows:<disp-formula id="e12">
<mml:math id="m90">
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi>min</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>K</mml:mi>
</mml:munderover>
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mtext>I</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mstyle>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>K</mml:mi>
</mml:munderover>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mtext>buy</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mtext>A</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mtext>buy</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mtext>buy</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mrow>
<mml:mtext>load</mml:mtext>
<mml:mo>-</mml:mo>
<mml:mtext>off</mml:mtext>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mstyle>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>s</mml:mi>
<mml:mo>.</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>.</mml:mo>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>&#xa0;</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>q</mml:mi>
<mml:mrow>
<mml:mtext>A</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>&#xa0;</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>q</mml:mi>
<mml:mrow>
<mml:mtext>B</mml:mtext>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mi>&#x3ba;</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi mathvariant="normal">b</mml:mi>
<mml:mi mathvariant="normal">u</mml:mi>
<mml:mi mathvariant="normal">y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>&#xa0;</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi mathvariant="normal">l</mml:mi>
<mml:mi mathvariant="normal">o</mml:mi>
<mml:mi mathvariant="normal">a</mml:mi>
<mml:mi mathvariant="normal">d</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="normal">o</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mi mathvariant="normal">f</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>&#xa0;</mml:mo>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(12)</label>
</disp-formula>
</p>
<p>The <xref ref-type="disp-formula" rid="e12">Eq. 12</xref> can be transformed as:<disp-formula id="e13">
<mml:math id="m91">
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mi>min</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>K</mml:mi>
</mml:munderover>
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mstyle>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>K</mml:mi>
</mml:munderover>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>-</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>-</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>-</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mstyle>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>s</mml:mi>
<mml:mo>.</mml:mo>
<mml:mi>t</mml:mi>
<mml:mn>.0</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>q</mml:mi>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mn>0</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>q</mml:mi>
<mml:mrow>
<mml:mi>B</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(13)</label>
</disp-formula>
</p>
</sec>
</sec>
<sec id="s4-2">
<title>4.2&#x20;Demand-Side Defense Strategy Based on Game Theory</title>
<sec id="s4-2-1">
<title>4.2.1 Game Elements Design</title>
<p>The interactive process between the cyber attacker and the grid&#x20;defender is a game process. The grid defender often doesn&#x2019;t know&#x20;the attacker&#x2019;s offensive strategy, and there is no partnership between the attacker and the defender. Therefore, it&#x20;is&#x20;a non-cooperative game process based on incomplete information, which can be represented by a four-tuple: <inline-formula id="inf79">
<mml:math id="m92">
<mml:mrow>
<mml:mi>&#x398;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>D</mml:mi>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mtext>A</mml:mtext>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mtext>D</mml:mtext>
</mml:msup>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. The attacker and the defender are the players in the game. where <inline-formula id="inf80">
<mml:math id="m93">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mtext>M</mml:mtext>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> indicates the attacker&#x2019;s offensive strategy space, where <inline-formula id="inf81">
<mml:math id="m94">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> indicates the <italic>m</italic>th attack mode, <inline-formula id="inf82">
<mml:math id="m95">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mtext>M</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula>; <inline-formula id="inf83">
<mml:math id="m96">
<mml:mrow>
<mml:mi>D</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mtext>N</mml:mtext>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> indicates the defender&#x2019;s defensive strategy space, where <inline-formula id="inf84">
<mml:math id="m97">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> indicates the <italic>n</italic>th defense mode, <inline-formula id="inf85">
<mml:math id="m98">
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mtext>N</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula>; <inline-formula id="inf86">
<mml:math id="m99">
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mtext>A</mml:mtext>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mtext>A</mml:mtext>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>d</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>d</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> indicates the attacker&#x2019;s expected benefit function under the offensive strategy <inline-formula id="inf87">
<mml:math id="m100">
<mml:mi>a</mml:mi>
</mml:math>
</inline-formula> and the defensive strategy <inline-formula id="inf88">
<mml:math id="m101">
<mml:mi>d</mml:mi>
</mml:math>
</inline-formula>; <inline-formula id="inf89">
<mml:math id="m102">
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mtext>D</mml:mtext>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mtext>D</mml:mtext>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>d</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>d</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> indicates the defender&#x2019;s expected benefit function under the offensive strategy <inline-formula id="inf90">
<mml:math id="m103">
<mml:mi>a</mml:mi>
</mml:math>
</inline-formula> and the defensive strategy&#x20;<inline-formula id="inf91">
<mml:math id="m104">
<mml:mi>d</mml:mi>
</mml:math>
</inline-formula>.</p>
<p>Since it is a non-cooperative zero-sum game process, the sum of the gains of both attackers and defenders is zero. If the attacker&#x2019;s gain function <inline-formula id="inf92">
<mml:math id="m105">
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mi>a</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is set to a positive value, the defender&#x2019;s gain function <inline-formula id="inf93">
<mml:math id="m106">
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mi>d</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is a negative value: <inline-formula id="inf94">
<mml:math id="m107">
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mi>d</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
<sec id="s4-2-2">
<title>4.2.2 Analysis of the Non-cooperative Game Process</title>
<p>During the non-cooperative zero-sum game process, the attacker and the defender revolve around the reward function and adjust their strategies to obtain the maximum benefit. When both side players are at an equilibrium point, neither can adjust the strategy to obtain higher returns, thus the players have reached the equilibrium point, which is called the Nash equilibrium&#x20;point.</p>
<p>In the price tampering attack, due to the low cost of attack and the universality of the attack modes, the attacker often has enough attack resources and can choose different attack modes. On the contrary, on the defense side, since the potential attack is unknown and the cost of defense resources is high, it is impossible to defend every link in each area. The specific game process is listed as follows:</p>
<p>Step 1: Determine the attacker&#x2019;s offensive strategy space <italic>A</italic> including the offensive mode <inline-formula id="inf95">
<mml:math id="m108">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and its resources. Determine the defender&#x2019;s defensive strategy space <italic>D</italic> including the defensive mode <inline-formula id="inf96">
<mml:math id="m109">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and its resources. According to the offensive strategy space <italic>A</italic> and the defensive strategy space <italic>D</italic>, the total number of game rounds <italic>R</italic> <inline-formula id="inf97">
<mml:math id="m110">
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>R</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>A</mml:mi>
</mml:msub>
<mml:mo>&#xd7;</mml:mo>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>D</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is estimated, and the initial value of the round number <italic>r</italic> is set to&#x20;1.</p>
<p>Step 2: In the <italic>r</italic>th round, the attacker determines the current offensive strategy <inline-formula id="inf98">
<mml:math id="m111">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, finds the optimal attack target area to obtain high returns, and calculates current revenue&#x20;<inline-formula id="inf99">
<mml:math id="m112">
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mi>a</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>;</p>
<p>Step 3: In the <italic>r</italic>th round, the defender determines a possible attacked area by the intrusion detection strategy. The defender finds the optimal defense target by minimizing the integrated emergency defense cost on the demand side. The defender&#x2019;s gain function <inline-formula id="inf100">
<mml:math id="m113">
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mi>d</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is calculated under the attack&#x20;mode.</p>
<p>Step 4: Determine whether the round number <italic>r</italic> reaches the preset total number of rounds <italic>R</italic>. If not, the Nash equilibrium point <inline-formula id="inf101">
<mml:math id="m114">
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi>A</mml:mi>
<mml:mo>&#x2217;</mml:mo>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>D</mml:mi>
<mml:mo>&#x2217;</mml:mo>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is solved according to the zero-sum game theory, the attack strategy is selected against the price tamping attack. Then, the algorithm updates <italic>r</italic> to <italic>r</italic>&#x20;&#x2b; 1, and returns to step 2. If it is reached, the game process ends. The offensive and defensive game flow chart is shown in <xref ref-type="fig" rid="F6">Figure&#x20;6</xref>.</p>
<p>In the game process, the attacker and the defender adjust their strategiesn in order to obtain the maximum income. When the two sides are at an equilibrium point, neither of them can obtain higher returns by adjusting strategies. When two sides reach an equilibrium state, the Nash equilibrium point is <inline-formula id="inf102">
<mml:math id="m115">
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msup>
<mml:mi>A</mml:mi>
<mml:mo>&#x2217;</mml:mo>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mi>D</mml:mi>
<mml:mo>&#x2217;</mml:mo>
</mml:msup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
</sec>
</sec>
<sec id="s5">
<title>5 Defense Simulation and Case Study</title>
<sec id="s5-1">
<title>5.1 Simulation Case</title>
<p>In this section, an improved IEEE-33 node distribution system (<xref ref-type="bibr" rid="B7">Meng et&#x20;al., 2015</xref>) is used to verify the effectiveness of the proposed game model. As shown in <xref ref-type="fig" rid="F7">Figure&#x20;7</xref>, the IEEE-33 node distribution system is divided into 4 areas. Each area contains a DCU, which is deployed on nodes 1, 2, 5, 25. The load is divided into the industrial, residential, and commercial load. Detailed load demand before attacks is shown in <xref ref-type="table" rid="T2">Table&#x20;2</xref>.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>The improved IEEE-33 node distribution system with 4&#x20;areas.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g007.tif"/>
</fig>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>IEEE-33 node distribution system parameter&#x20;value.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th colspan="2" align="left">Industrial load</th>
<th colspan="2" align="left">Residential/Commercial load</th>
</tr>
<tr>
<th align="left">Node</th>
<th align="center">Node active load <italic>D</italic>
<sub>
<italic>a</italic>0</sub>/kW</th>
<th align="center">Node</th>
<th align="center">Node active load <italic>D</italic>
<sub>
<italic>b</italic>0</sub>/kW</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="center">100</td>
<td align="center">0</td>
<td align="center">0</td>
</tr>
<tr>
<td align="left">3</td>
<td align="center">120</td>
<td align="center">2</td>
<td align="center">90</td>
</tr>
<tr>
<td align="left">6</td>
<td align="center">200</td>
<td align="center">4</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">7</td>
<td align="center">200</td>
<td align="center">5</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">13</td>
<td align="center">120</td>
<td align="center">8</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">23</td>
<td align="center">420</td>
<td align="center">9</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">24</td>
<td align="center">420</td>
<td align="center">10</td>
<td align="center">45</td>
</tr>
<tr>
<td align="left">28</td>
<td align="center">120</td>
<td align="center">11</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">29</td>
<td align="center">200</td>
<td align="center">12</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">30</td>
<td align="center">150</td>
<td align="center">14</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">31</td>
<td align="center">210</td>
<td align="center">15</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">16</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">17</td>
<td align="center">90</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">18</td>
<td align="center">90</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">19</td>
<td align="center">90</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">20</td>
<td align="center">90</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">21</td>
<td align="center">90</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">22</td>
<td align="center">90</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">25</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">26</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">27</td>
<td align="center">60</td>
</tr>
<tr>
<td align="left">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">32</td>
<td align="center">60</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The distribution system sets normal electricity price <inline-formula id="inf103">
<mml:math id="m116">
<mml:mi>p</mml:mi>
</mml:math>
</inline-formula> &#x3d; 100&#xa0;&#xa5;/kW, <inline-formula id="inf104">
<mml:math id="m117">
<mml:mrow>
<mml:mover accent="true">
<mml:mi>p</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> &#x3d; 98&#xa0;&#xa5;/kW, <inline-formula id="inf105">
<mml:math id="m118">
<mml:mi>u</mml:mi>
</mml:math>
</inline-formula> &#x3d; 200&#xa0;&#xa5;/kW. The value ranges of 4 areas are: <inline-formula id="inf106">
<mml:math id="m119">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mn>5</mml:mn>
<mml:mo>%</mml:mo>
<mml:mo>,</mml:mo>
<mml:mn>10</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf107">
<mml:math id="m120">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mn>5</mml:mn>
<mml:mo>%</mml:mo>
<mml:mo>,</mml:mo>
<mml:mn>14</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf108">
<mml:math id="m121">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mn>5</mml:mn>
<mml:mo>%</mml:mo>
<mml:mo>,</mml:mo>
<mml:mn>16</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf109">
<mml:math id="m122">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mn>5</mml:mn>
<mml:mo>%</mml:mo>
<mml:mo>,</mml:mo>
<mml:mn>20</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. The power generation cost coefficient of each area is shown in <xref ref-type="table" rid="T3">Table&#x20;3</xref>, where <italic>a</italic>, <italic>b</italic>, <italic>c</italic> is the cost factor for power generation.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Power generation cost coefficient.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Area number</th>
<th align="center">
<italic>A</italic> (&#xa5;/kW<sup>2</sup>)</th>
<th align="center">
<italic>B</italic>(&#xa5;/kW)</th>
<th align="center">
<italic>C</italic> (&#xa5;)</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="center">213</td>
<td align="char" char=".">9.4523</td>
<td align="char" char=".">0.003256</td>
</tr>
<tr>
<td align="left">2</td>
<td align="center">256</td>
<td align="char" char=".">8.2245</td>
<td align="char" char=".">0.002457</td>
</tr>
<tr>
<td align="left">3</td>
<td align="center">312</td>
<td align="char" char=".">6.9443</td>
<td align="char" char=".">0.005365</td>
</tr>
<tr>
<td align="left">4</td>
<td align="center">256</td>
<td align="char" char=".">9.2512</td>
<td align="char" char=".">0.004682</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Refer to <xref ref-type="table" rid="T2">Table&#x20;2</xref>, <inline-formula id="inf110">
<mml:math id="m123">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the load before the price tampering attack of the industrial load; <inline-formula id="inf111">
<mml:math id="m124">
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the load before the price tampering attack of the residential/commercial load. According different load ratios in each area, the importance of 4 regions are <italic>f</italic>1 &#x3d; 0.9690, <italic>f</italic>2 &#x3d; 0.4953, <italic>f</italic>3 &#x3d; 0.2476, and <italic>f</italic>4 &#x3d; 0.6110. When the threshold is set as, the detection result is better than others. When <inline-formula id="inf112">
<mml:math id="m125">
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>20</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, the detection success rate is 83.0% for areas where detection and defense resources are deployed.</p>
</sec>
<sec id="s5-2">
<title>5.2 The Load Change Analysis</title>
<p>In the scenario analysis, the attacker modifies the electricity price to 80% of the normal electricity price to discuss the optimal defense strategy pair. In 4 attack target areas, assuming that the number of attack target areas is not greater than 3, there are 14 selectable offensive strategy combinations.</p>
<p>The load changes <inline-formula id="inf113">
<mml:math id="m126">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> under various price tampering attack modes are calculated as shown in <xref ref-type="table" rid="T4">Table&#x20;4</xref>. It shows the variation of load under various offensive strategies. The offensive strategy that causes the largest load change is a14, which is 534.5&#xa0;kW, and the strategy that causes the smallest load change is a1, which is 27&#xa0;kW. At the same time, it can be obtained that attacking more areas often causes more load changes than attacking a single area. Compared to the attack modes of single target areas, a1, a2, a3, and a4, it shows that attack on area 2 causes a greater change in load than the attack on other&#x20;areas.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>The load changes under various attack&#x20;modes.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Attack mode</th>
<th align="center">Attack area</th>
<th align="center">
<inline-formula id="inf114">
<mml:math id="m127">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mtext>kW</mml:mtext>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">Attack mode</th>
<th align="center">Attack area</th>
<th align="center">
<inline-formula id="inf115">
<mml:math id="m128">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mtext>kW</mml:mtext>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">a1</td>
<td align="left">Area1</td>
<td align="center">27</td>
<td align="center">a8</td>
<td align="left">Area 2, 3</td>
<td align="center">412.5</td>
</tr>
<tr>
<td align="left">a2</td>
<td align="left">Area 2</td>
<td align="center">244</td>
<td align="center">a9</td>
<td align="left">Area 2, 4</td>
<td align="center">375</td>
</tr>
<tr>
<td align="left">a3</td>
<td align="left">Area 3</td>
<td align="center">167</td>
<td align="center">a10</td>
<td align="left">Area 3, 4</td>
<td align="center">275</td>
</tr>
<tr>
<td align="left">a4</td>
<td align="left">Area 4</td>
<td align="center">131</td>
<td align="center">a11</td>
<td align="left">Area 1, 2, 3</td>
<td align="center">437</td>
</tr>
<tr>
<td align="left">a5</td>
<td align="left">Area 1, 2</td>
<td align="center">270</td>
<td align="center">a12</td>
<td align="left">Area 1, 2, 4</td>
<td align="center">400</td>
</tr>
<tr>
<td align="left">a6</td>
<td align="left">Area 1, 3</td>
<td align="center">194</td>
<td align="center">a13</td>
<td align="left">Area 1, 3, 4</td>
<td align="center">321.5</td>
</tr>
<tr>
<td align="left">a7</td>
<td align="left">Area 1, 4</td>
<td align="center">158</td>
<td align="center">a14</td>
<td align="left">Area 2, 3, 4</td>
<td align="center">543.5</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5-3">
<title>5.3 Optimal <inline-formula id="inf116">
<mml:math id="m129">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mi mathvariant="normal">&#x3001;</mml:mi>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> Value Calculation</title>
<p>According to different load changes <inline-formula id="inf117">
<mml:math id="m130">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> in 14 attack modes, the defenders can calculate optimal <inline-formula id="inf118">
<mml:math id="m131">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mi mathvariant="normal">&#x3001;</mml:mi>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> to determine the ratio of power purchase and load shedding. Based on the quantitative model, the optimal values of <inline-formula id="inf119">
<mml:math id="m132">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mi mathvariant="normal">&#x3001;</mml:mi>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are calculated iteratively by&#x20;particle swarm optimization algorithm as shown in <xref ref-type="table" rid="T5">Table&#x20;5</xref>.</p>
<table-wrap id="T5" position="float">
<label>TABLE 5</label>
<caption>
<p>Optimal values under different attack&#x20;modes.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Attack mode</th>
<th align="center">
<inline-formula id="inf120">
<mml:math id="m133">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf121">
<mml:math id="m134">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>2</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf122">
<mml:math id="m135">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>3</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf123">
<mml:math id="m136">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>4</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf124">
<mml:math id="m137">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf125">
<mml:math id="m138">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mn>2</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf126">
<mml:math id="m139">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mn>3</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
<th align="center">
<inline-formula id="inf127">
<mml:math id="m140">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mn>4</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">a1</td>
<td align="char" char=".">0.10</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.32</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
</tr>
<tr>
<td align="left">a2</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.14</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.25</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
</tr>
<tr>
<td align="left">a3</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.16</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.28</td>
<td align="char" char=".">&#x2014;</td>
</tr>
<tr>
<td align="left">a4</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.20</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.26</td>
</tr>
<tr>
<td align="left">a5</td>
<td align="char" char=".">0.10</td>
<td align="char" char=".">0.14</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.32</td>
<td align="char" char=".">0.25</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
</tr>
<tr>
<td align="left">a6</td>
<td align="char" char=".">0.10</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.16</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.32</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.28</td>
<td align="char" char=".">&#x2014;</td>
</tr>
<tr>
<td align="left">a7</td>
<td align="char" char=".">0.10</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.20</td>
<td align="char" char=".">0.32</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.26</td>
</tr>
<tr>
<td align="left">a8</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.14</td>
<td align="char" char=".">0.16</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.25</td>
<td align="char" char=".">0.28</td>
<td align="char" char=".">&#x2014;</td>
</tr>
<tr>
<td align="left">a9</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.14</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.20</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.25</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.26</td>
</tr>
<tr>
<td align="left">a10</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.16</td>
<td align="char" char=".">0.20</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.28</td>
<td align="char" char=".">0.26</td>
</tr>
<tr>
<td align="left">a11</td>
<td align="char" char=".">0.10</td>
<td align="char" char=".">0.14</td>
<td align="char" char=".">0.16</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.32</td>
<td align="char" char=".">0.25</td>
<td align="char" char=".">0.28</td>
<td align="char" char=".">&#x2014;</td>
</tr>
<tr>
<td align="left">a12</td>
<td align="char" char=".">0.10</td>
<td align="char" char=".">0.14</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.20</td>
<td align="char" char=".">0.32</td>
<td align="char" char=".">0.25</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.26</td>
</tr>
<tr>
<td align="left">a13</td>
<td align="char" char=".">0.10</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.16</td>
<td align="char" char=".">0.20</td>
<td align="char" char=".">0.32</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.28</td>
<td align="char" char=".">0.26</td>
</tr>
<tr>
<td align="left">a14</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.14</td>
<td align="char" char=".">0.16</td>
<td align="char" char=".">0.20</td>
<td align="char" char=".">&#x2014;</td>
<td align="char" char=".">0.25</td>
<td align="char" char=".">0.28</td>
<td align="char" char=".">0.26</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In <xref ref-type="table" rid="T5">Table&#x20;5</xref>, <inline-formula id="inf128">
<mml:math id="m141">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>2</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>3</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3b3;</mml:mi>
<mml:mn>4</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> are the optimal proportion of electricity provided by the electricity seller; <inline-formula id="inf129">
<mml:math id="m142">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mn>2</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mn>3</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>&#x3b2;</mml:mi>
<mml:mn>4</mml:mn>
<mml:mo>&#x2217;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> are the optimal loss weight coefficient of 4 areas. For the attack target area <italic>k</italic>, <inline-formula id="inf130">
<mml:math id="m143">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> tends to its maximum value when the cost function takes the minimum value. This is because, under current parameters, the cost of self-generated electricity is much smaller than the cost of purchasing electricity from the external grid. The prosumers tend to use self-generated electricity than purchase electricity outside. <inline-formula id="inf131">
<mml:math id="m144">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is chosen to its maximum value, which is consistent with the policy of preferential consumption of self-generated electricity. It also shows that although the attack target area <italic>k</italic> is changed, the optimal values <inline-formula id="inf132">
<mml:math id="m145">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#xa0;</mml:mo>
<mml:mi mathvariant="normal">&#x3001;</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:msub>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> for the attacked area don&#x2019;t change under different attack&#x20;modes.</p>
</sec>
<sec id="s5-4">
<title>5.4 Attack Loss Quantification</title>
<p>Under various attack modes, the electricity purchased from the external grid, self-generated power, and load-shedding capacity can be obtained, as shown in <xref ref-type="fig" rid="F8">Figure&#x20;8A</xref>. The attack loss results can be further quantified as shown in <xref ref-type="fig" rid="F8">Figure&#x20;8B</xref>.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>
<bold>(A)</bold> Purchase of electricity, self-generated power, and load shedding under different attack modes. <bold>(B)</bold> Quantification of attack consequences.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g008.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F8">Figure&#x20;8B</xref>, the abscissa is the attack mode and the ordinate is the quantized loss value under attack. This illustration shows that attack method a14 causes the largest loss value of 898000&#xa5;; the attack mode a2 causes the smallest loss value of 86000&#xa5;.</p>
<p>In general, the loss value caused by the attack modes with more target areas is greater than that with fewer target areas. The overall loss value with three areas (attack modes a11-a14) as the attack target is greater than that of targeting two areas (attack modes a5-a10). The overall loss value of targeting two areas (attack modes a5-a10) is greater than that of targeting a single area (attack modes a1-a4).</p>
</sec>
<sec id="s5-5">
<title>5.5 Game Result Analysis</title>
<p>To reflect the defense deploy verification with limited defense resources, the deployment area of the intrusion detection strategy has been limited to less than or equal to 2, so there are currently 10 methods to deploy intrusion detecting equipment, as shown in <xref ref-type="fig" rid="F9">Figure&#x20;9</xref>. In 4 attack target areas, 14 selectable offensive strategy combinations have been mentioned before, so the total number of game rounds is <italic>R</italic>&#x20;&#x3d; 14&#x20;&#x2a; 10&#x20;&#x3d;&#x20;140.</p>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption>
<p>Different deployment methods.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g009.tif"/>
</fig>
<p>According to the offensive strategy space and defense strategy space, the Nash equilibrium points under various attacks are obtained as shown in <xref ref-type="table" rid="T6">Table&#x20;6</xref>. The intersection of the offensive strategy and the defense strategy (green block) in <xref ref-type="table" rid="T6">Table&#x20;6</xref> is the Nash equilibrium point under various attack&#x20;modes.</p>
<table-wrap id="T6" position="float">
<label>TABLE 6</label>
<caption>
<p>Nash equilibrium point under various attack&#x20;modes.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Attack mode</th>
<th rowspan="2" align="center">a1</th>
<th rowspan="2" align="center">a2</th>
<th rowspan="2" align="center">a3</th>
<th rowspan="2" align="center">a4</th>
<th rowspan="2" align="center">a5</th>
<th rowspan="2" align="center">a6</th>
<th rowspan="2" align="center">a7</th>
<th rowspan="2" align="center">a8</th>
<th rowspan="2" align="center">a9</th>
<th rowspan="2" align="center">a10</th>
<th rowspan="2" align="center">a11</th>
<th rowspan="2" align="center">a12</th>
<th rowspan="2" align="center">a13</th>
<th rowspan="2" align="center">a14</th>
</tr>
<tr>
<th align="left">Defense strategy</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">d1</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d2</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d3</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d4</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d5</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d6</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d7</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d8</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d9</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
</tr>
<tr>
<td align="left">d10</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center">&#x2014;</td>
<td align="center"/>
</tr>
</tbody>
</table>
</table-wrap>
<p>It can be found that under the condition that the offensive resources and the defense resources have sufficient configuration, the Nash equilibrium point will appear in the place where the attack target and the defense target are consistent, namely (a1, d1), (a2, d2), (a3, d3), (a4, d4), (a5, d5), (a6, d6), (a7, d7), (a8, d8), (a9, d9), (a10, d10). It matches the actual deployment situation. In the case of insufficient defense resources, the Nash equilibrium points are (a11, d5), (a12, d9), (a13, d6), (a14, d10). The optimal defense strategy is not matched the actual deployment situation.</p>
<p>Considering 14 attack modes, the comparison of the loss value with optimal defense strategy and without defense strategy are shown in <xref ref-type="fig" rid="F10">Figure&#x20;10A</xref>. For attack mode a1 to attack mode a14, the loss values decreased by 61.4, 37.6, 56.3, 46.5, 73.2, 56.0, 22.8, 36.2, 56.8, 31.5, 52.1, 45.2, 57.2, 31.7%. The results show that the optimal defense protection strategy can significantly reduce the losses caused by attacks.</p>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption>
<p>
<bold>(A)</bold> Comparison of losses before and after the game defense. <bold>(B)</bold> Loss value of different defense strategies under attack mode&#x20;a13.</p>
</caption>
<graphic xlink:href="fenrg-09-763260-g010.tif"/>
</fig>
<p>Taking attack mode a13 as an example, the loss value of different defense strategies under 10 attack modes is shown in <xref ref-type="fig" rid="F10">Figure&#x20;10B</xref>. The abscissa represents the defense strategy, and the ordinate represents the loss value under the current attack mode and defense strategy. It can be seen that the defense strategy d6 has the best defense result and the loss value is 345500&#xa5;. On the contrary, the defense strategy d2 has the worst defense result, even if it has no defense result. In summary, Nash equilibrium point (a13, d6) has the best deployment and defense strategy.</p>
</sec>
</sec>
<sec id="s6">
<title>6 Conclusion</title>
<p>In this paper, a set of intrusion detection and defense strategies is designed. The conclusions are as follows:<list list-type="simple">
<list-item>
<p>1) A space-based cumulative intrusion detection method is proposed under the price tampering attack. The cumulative deviation detection strategy can not only detect the measured value of one measurement point based on normal distribution, but also detect the shortcomings of the subtle tampering of the target area. The experiment tests verified the superiority of the strategy. The detection success rate has been increased by 14% compared with the traditional detection strategy and by 3% compared with the non-parametric cumulative detection strategy.</p>
</list-item>
<list-item>
<p>2) A quantitative model of attack consequences is established to minimize the integrated defense cost. The model quantifies the changes in electricity caused by price tampering attacks, comprehensively considering three demand-side response methods of purchasing external grid, self-generation, and load shedding.</p>
</list-item>
<list-item>
<p>3) A demand-side defense strategy is established based on non-cooperative game theory. It deploys the defense resource using intrusion detection strategy, and takes the quantitative model of attack consequences as the game target. Taking into account the&#x20;limited nature of defense resources, the Nash equilibrium point is solved to generate defense decisions. In the distribution system simulations, the Nash equilibrium point is solved under various attack strategies and a reference for defense matching is&#x20;provided. The results show that the proposed defense protection strategy has certain effectiveness.</p>
</list-item>
</list>
</p>
</sec>
</body>
<back>
<sec id="s7">
<title>Data Availability Statement</title>
<p>The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s8">
<title>Author Contributions</title>
<p>RF proposed the methodology and prepared original draft. JC conducted the theoretical analysis as well as the simulation verification. XZ and JZ carried out the experiments validation. All authors have read and agreed to the published version of the manuscript.</p>
</sec>
<sec id="s9">
<title>Funding</title>
<p>This research was supported by the National Natural Science Foundation of China under Grant 61633016.</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ahmad</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Adnane</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Franqueira</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Kurugollu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers&#x27; Strategies</article-title>. <source>Sensors</source> <volume>18</volume> (<issue>11</issue>), <fpage>4040</fpage>. <pub-id pub-id-type="doi">10.3390/s18114040</pub-id> </citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>An</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>G.-H.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Distributed Secure State Estimation for Cyber-Physical Systems under Sensor Attacks</article-title>. <source>Automatica</source> <volume>107</volume>, <fpage>526</fpage>&#x2013;<lpage>538</lpage>. <pub-id pub-id-type="doi">10.1016/j.automatica.2019.06.019</pub-id> </citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ashok</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Govindarasu</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid</article-title>. <source>Proc. IEEE</source> <volume>105</volume> (<issue>7</issue>), <fpage>1389</fpage>&#x2013;<lpage>1407</lpage>. <pub-id pub-id-type="doi">10.1109/JPROC.2017.2686394</pub-id> </citation>
</ref>
<ref id="B4">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bao</surname>
<given-names>T.</given-names>
</name>
</person-group> (<year>2018</year>). <source>Multi-agent Game Solving Method for Power System Supply and Demand Interaction</source>. <publisher-loc>Guangzhou, China</publisher-loc>: <publisher-name>South China University of Technology</publisher-name>. </citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bharti.</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>De</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Framework for Multipoint Optimal Reactive Power Compensation in Radial Distribution System with High Distributed Generation Penetration</article-title>. <source>Int. Trans. Electr. Energ Syst.</source> <volume>29</volume> (<issue>7</issue>). <pub-id pub-id-type="doi">10.1002/2050-7038.12007</pub-id> </citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Wei</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>An Intermediate Attack against Smart Meter DL/T 645-2007 Protocol</article-title>. <source>J.&#x20;Shanghai Univ. Electric Power</source> <volume>33</volume> (<issue>04</issue>), <fpage>378</fpage>&#x2013;<lpage>384</lpage>. <comment>CNKI:SUN:DYXY.0.2017-04-014</comment>. <pub-id pub-id-type="doi">10.3969/j.issn.1006-4729.2017.04.014</pub-id> </citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hahn</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Govindarasu</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2011</year>). <article-title>Cyber Attack Exposure Evaluation Framework for the Smart Grid</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>2</volume> (<issue>4</issue>), <fpage>835</fpage>&#x2013;<lpage>843</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2011.2163829</pub-id> </citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>L&#xfc;</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2008</year>). <article-title>The Relationship between Price Elasticity of Demand and Generation Market Equilibrium Analysis Based on Game Theory</article-title>. <source>Proc. CSEE</source> <volume>28</volume> (<issue>01</issue>), <fpage>89</fpage>&#x2013;<lpage>94</lpage>. <pub-id pub-id-type="doi">10.3321/j.issn:0258-8013.2008.01.016</pub-id> </citation>
</ref>
<ref id="B10">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Jie Lin</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Xinyu Yang</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2013</year>). &#x201c;<article-title>On False Data Injection Attack against Multistep Electricity Price in Electricity Market in Smart Grid</article-title>,&#x201d; in <conf-name>Proceedings of the IEEE Global Communications Conference (GLOBECOM)</conf-name>, <conf-loc>Atlanta, GA, USA</conf-loc>, <conf-date>December 2013</conf-date>, <fpage>760</fpage>&#x2013;<lpage>765</lpage>. <pub-id pub-id-type="doi">10.1109/GLOCOM.2013.6831164</pub-id> </citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jie</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Choo</surname>
<given-names>K.-K. R.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Tradeoff Gain and Loss Optimization against Man-In-The-Middle Attacks Based on Game Theoretic Model</article-title>. <source>Future Generation Comp. Syst.</source> <volume>101</volume>, <fpage>169</fpage>&#x2013;<lpage>179</lpage>. <pub-id pub-id-type="doi">10.1016/j.future.2019.05.078</pub-id> </citation>
</ref>
<ref id="B12">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Jun</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Peng</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Hongfei</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2015</year>). &#x201c;<article-title>A Distributed MPPT Control for a Hybrid Centralized-Distributed TEG Power Generation System</article-title>,&#x201d; in <conf-name>Proceedings of the IEEE 10th Conference on Industrial Electronics and Applications (ICIEA)</conf-name>, <conf-loc>Auckland, New&#x20;Zealand</conf-loc>, <conf-date>June 2015</conf-date>, <fpage>741</fpage>&#x2013;<lpage>744</lpage>. <pub-id pub-id-type="doi">10.1109/ICIEA.2015.7334206</pub-id> </citation>
</ref>
<ref id="B13">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Kucuk</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Intelligent Electrical Load Shedding in Heavily Loaded Industrial Establishments with a Case Study</article-title>,&#x201d; in <conf-name>Proceedings of the 5th International Conference on Electrical and Electronic Engineering (ICEEE)</conf-name>, <conf-loc>Istanbul, Turkey</conf-loc>, <conf-date>May 2018</conf-date>, <fpage>463</fpage>&#x2013;<lpage>467</lpage>. <pub-id pub-id-type="doi">10.1109/ICEEE2.2018.8391382</pub-id> </citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lee</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Xiang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Schober</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Wong</surname>
<given-names>V. W. S.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>Electric Vehicle Charging Stations with Renewable Power Generators: A Game Theoretical Analysis</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>6</volume> (<issue>2</issue>), <fpage>608</fpage>&#x2013;<lpage>617</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2014.2374592</pub-id> </citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Sheng</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>Key Technologies and Trends of Cyber Physical System for Power Grid</article-title>. <source>Proc. CSEE</source> <volume>35</volume> (<issue>14</issue>), <fpage>3522</fpage>&#x2013;<lpage>3531</lpage>. <pub-id pub-id-type="doi">10.13334/j.0258-8013.pcsee.2015.14.006</pub-id> </citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ma</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Tushar</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Yuen</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Energy Management for Joint Operation of CHP and PV Prosumers inside a Grid-Connected Microgrid: A Game Theoretic Approach</article-title>. <source>IEEE Trans. Ind. Inf.</source> <volume>12</volume> (<issue>5</issue>), <fpage>1930</fpage>&#x2013;<lpage>1942</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2016.2578184</pub-id> </citation>
</ref>
<ref id="B7">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Meng</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Sheng</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Gu</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Fan</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>A Day-Ahead Two-Stage Optimal Scheduling Model for Distribution Network Containing Distributed Generations</article-title>. <source>Power Syst. Tech.</source> <volume>39</volume> (<issue>05</issue>), <fpage>1294</fpage>&#x2013;<lpage>1300</lpage>. <pub-id pub-id-type="doi">10.13335/j.1000-3673.pst.2015.05.019</pub-id> </citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Miao</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Tian</surname>
<given-names>S.-M.</given-names>
</name>
</person-group> (<year>2009</year>). <article-title>Information Communication System Supporting Smart Grid</article-title>. <source>Power Syst. Tech.</source> <volume>33</volume> (<issue>17</issue>), <fpage>8</fpage>&#x2013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.7500/AEPS20160113102</pub-id> </citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ni</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Rui</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Thoughts on Power System Anti-malicious Information Attack</article-title>. <source>Automation Electric Power Syst.</source> <volume>40</volume> (<issue>05</issue>), <fpage>148</fpage>&#x2013;<lpage>151</lpage>. <pub-id pub-id-type="doi">10.7500/AEPS20160113102</pub-id> </citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ren</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Kuang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2006</year>). <article-title>Cost-benefit Analysis for Actualizing Interruptible Load Measure</article-title>. <source>Grid Tech.</source> <volume>30</volume> (<issue>07</issue>), <fpage>22</fpage>&#x2013;<lpage>25</lpage>. <pub-id pub-id-type="doi">10.13335/j.1000-3673.pst.2006.07.005</pub-id> </citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Singh.</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Mukherjee.</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Tiwari.</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>GA-based Optimization for Optimally Placed and Properly Coordinated Control of Distributed Generations and Static Var Compensator in Distribution Networks</article-title>. <source>Energ. Rep.</source> <volume>5</volume>, <fpage>926</fpage>&#x2013;<lpage>959</lpage>. <pub-id pub-id-type="doi">10.1016/j.egyr.2019.07.007</pub-id> </citation>
</ref>
<ref id="B21">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Song</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2018</year>). <source>Research on Detection Method of Power Price Modification Attack in Smart Grid</source>. <publisher-loc>Harbin, China</publisher-loc>: <publisher-name>Harbin Institute of Technology</publisher-name>. </citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sun.</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Jin.</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>K. Y.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Efficiency Analysis and Control of a Grid-Connected PEM Fuel Cell in Distributed Generation</article-title>. <source>Energ. Convers. Manag.</source> <volume>195</volume>, <fpage>587</fpage>&#x2013;<lpage>596</lpage>. <pub-id pub-id-type="doi">10.1016/j.enconman.2019.04.041</pub-id> </citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>M.</given-names>
</name>
<etal/>
</person-group> (<year>2016</year>). <article-title>Overview on Cyber-Attacks against Cyber Physical Power System</article-title>. <source>Automation Electric Power Syst.</source> <volume>40</volume> (<issue>17</issue>), <fpage>59</fpage>&#x2013;<lpage>69</lpage>. <comment>CNKI:SUN:DLXT.0.2016-17-009</comment>. </citation>
</ref>
<ref id="B24">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Telaretti</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Mineo</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Massaro</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Dusonchet</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Pecoraro</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Milazzo</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2014</year>). &#x201c;<article-title>A Simple Operation Strategy of Battery Storage Systems under Dynamic Electricity Pricing: An Italian Case Study for a Medium-Scale Public Facility</article-title>,&#x201d; in <conf-name>Proceedings of the 3rd Renewable Power Generation Conference (RPG 2014)</conf-name>, <conf-loc>Naples</conf-loc>, <conf-date>September 2014</conf-date>, <fpage>1</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1049/cp.2014.0842</pub-id> </citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tian</surname>
<given-names>J.-.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>B.-H.</given-names>
</name>
<name>
<surname>Xia.</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>State-preserving Topology Attacks and its Impact on Economic Operation of Smart Grid</article-title>. <source>Power Syst. Prot. Control.</source> <volume>46</volume> (<issue>1</issue>), <fpage>50</fpage>&#x2013;<lpage>56</lpage>. <pub-id pub-id-type="doi">10.7667/PSPC162060</pub-id> </citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tong</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Inference and Countermeasure Presuppostion of Network Attack in Incident on Ukrainian Power Grid</article-title>. <source>Automation Electric Power Syst.</source> <volume>40</volume> (<issue>07</issue>), <fpage>144</fpage>&#x2013;<lpage>148</lpage>. <pub-id pub-id-type="doi">10.7500/AEPS20160202101</pub-id> </citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>2010</year>). <article-title>Development and Challenges of Distributed Power Generation, Microgrid and Intelligent Distribution Network</article-title>. <source>Automation Electric Power Syst.</source> <volume>34</volume> (<issue>02</issue>), <fpage>10</fpage>&#x2013;<lpage>14</lpage>. <pub-id pub-id-type="doi">10.1109/CCECE.2010.5575154</pub-id> </citation>
</ref>
<ref id="B28">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2001</year>). <article-title>Block Bidding Model Based Power Market</article-title>. <source>Proc. CSEE</source> <volume>21</volume> (<issue>12</issue>), <fpage>2</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.13334/j.0258-8013.pcsee.2001.12.001</pub-id> </citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>A Defensive Strategy against Delay Attacks on Real-Time Pricing in Smart Grids</article-title>. <source>J.&#x20;Beijing Univ. Posts Telecommunications</source> <volume>38</volume> (<issue>S1</issue>), <fpage>116</fpage>&#x2013;<lpage>120</lpage>. <pub-id pub-id-type="doi">10.13190/j.jbupt.2015.s1.026</pub-id> </citation>
</ref>
<ref id="B30">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2014</year>). <source>Research on Detection and Defense Methods against False Data Attack on Smart Grid</source>. <publisher-loc>Beijing, China</publisher-loc>: <publisher-name>North China Electric Power University</publisher-name>. </citation>
</ref>
<ref id="B31">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wei</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Sarwat</surname>
<given-names>A. I.</given-names>
</name>
<name>
<surname>Saad</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Biswas</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Stochastic Games for Power Grid Protection against Coordinated Cyber-Physical Attacks</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>9</volume> (<issue>2</issue>), <fpage>684</fpage>&#x2013;<lpage>694</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2016.2561266</pub-id> </citation>
</ref>
<ref id="B32">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Tu</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Sheng</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2002</year>). <article-title>Analysis of the Trading Methods in the Electricity Market</article-title>. <source>Automation Electric Power Syst.</source> <volume>34</volume> (<issue>12</issue>), <fpage>24</fpage>&#x2013;<lpage>29</lpage>. <comment>CNKI:SUN:DLXT.0.2002-12-004</comment>. </citation>
</ref>
<ref id="B33">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xia</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Fang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Zou</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Sangaiah</surname>
<given-names>A. K.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant</article-title>. <source>Security Commun. Networks</source> <volume>2019</volume> (<issue>11</issue>), <fpage>1</fpage>&#x2013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1155/2019/6956072</pub-id> </citation>
</ref>
<ref id="B34">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>H.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Evaluation on Power Supply Reliability of Microgrid in Islanded Operation Mode Considering the Prediction of Distributed Generation</article-title>. <source>Proc. CSU-EPSA</source> <volume>31</volume> (<issue>06</issue>), <fpage>50</fpage>&#x2013;<lpage>54</lpage>. <pub-id pub-id-type="doi">10.19635/j.cnki.csu-epsa.000058</pub-id> </citation>
</ref>
<ref id="B35">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Wen</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Lessons Learnt from Ukrainian Blackout: Protecting Power Grids against False Data Injection Attacks</article-title>. <source>Automation Electric Power Syst.</source> <volume>40</volume> (<issue>07</issue>), <fpage>149</fpage>&#x2013;<lpage>151</lpage>. <pub-id pub-id-type="doi">10.7500/AEPS20160203101</pub-id> </citation>
</ref>
<ref id="B36">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Wen</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Xun</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2010</year>). <article-title>Cyber Physical Power Systems: Architecture, Implementation Techniques and Challenges</article-title>. <source>Automation Electric Power Syst.</source> <volume>34</volume> (<issue>16</issue>), <fpage>1</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1109/CCECE.2010.5575154</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>