Table of Links
- ABSTRACT
- INTRODUCTION
- PROPOSED EPIDEMIC CYBER-PHYSICAL SYSTEM MODEL
- PROPOSED INSURANCE PREMIUM PRINCIPLE
- SIMULATION RESULTS
- CONCLUDING REMARKS AND REFERENCES
SIMULATION RESULTS
Case studies are performed to validate the proposed reliability assessment framework and cyber insurance model. As shown in Fig. 6, a benchmark IEEE RTS-GMLC is deployed [29]. The IEEE RTS-GMLC incorporates the increasing share of renewable energy resources such as wind and solar energies. To study the effectiveness of mutual insurance, the 3-area test system are divided into 5 TGs. The IEEE RTS-GMLC is further augmented by incorporating the epidemic cyberattack model. The cyberattack parameters of the epidemic network are assigned as follows: ππππ = 2000 hrs, π πππ = 4 hrs, π = 2, and π = 0.8. A preliminary comparison is made on the system risk in the test system under various scenarios. Risk indices estimating load curtailment and fault coverage are adopted from [30]. Denote πΏπΆ as the load curtailment and πΉπΆ as the count of faulty buses at the m-th time step.
The Expected πΏπΆ and πΉπΆ are defined as follows: πΈπΏπΆ = 1 ππ β πΏπΆπ ππ π π=1 (10) πΈπΉπΆ = 1 ππ β πΉπΆπ ππ π π=1 (11) Parameters of the cyber-physical elements installed in the substations are listed in Table II. When the substationβs smart monitoring is functional, the server is connected to other elements. Otherwise, the server is disconnected from other elements. Six scenarios are studied to demonstrate the effectiveness of the job assignment and smart monitoring. As shown in Table III, the deployment of job assignment and smart monitoring technologies effectively reduces the ELC and EFC. Reduced ELC and EFC indicate enhanced security and reliability of power supply. The job assignment facilitates Scenario 2 with 20% improvement from Scenario 1 in both ELC and EFC. With the smart monitoring technology enforced, Scenario 4 improves 7% on ELC and EFC over Scenario 1. In Scenarios 5 and 6, smart monitoring plus the job assignment can further improve several percent from Scenarios 2 and 3 with job assignment alone.
The reliability-based OPF is carried out in MCS based on the state sampling method. The sampled period is 40 years with hourly time steps. The server smart technology deployment within the substations determines the SCT. Cyberattacks that penetrate the substation servers may disturb the grid operation by sending spurious commands to disconnect generation from the grid, causing physical load losses. The load loss statistics is then converted into the monetary reliability worth to estimate the cybersecurity insurance premiums. To highlight the merits of the proposed Shapley premium design, two case groups are created to compare job thread assignment, smart monitoring, and correlation coefficients at varying degrees. Case Group 1: Based on Scenario 1 (π½1 , ππ, ππ) where in the substation only a single job thread is available without smart monitoring. Case Group 2: Based on Scenario 6 (π½3 , ππ , ππ)where the strongest job assignment and substation smart monitoring are enforced. To explore the loss characteristics in Case Group 1, Table IV summarizes the expected values, Standard Deviations, and Coefficients of Variation under various strengths of correlation π. CoV is obtained from the SD being divided by the expected value. The expected values come close to SDs, resulting in CoVs only fluctuating in a small range of [0.74 1.13].
Since a stronger correlation π signifies the infectiousness of the epidemic model and tends to bring higher expected losses, the common cyber risk across TGs also increases. In Case Group 2, the incentive of investing on cyber-physical enhancement can be observed from Table V that expected losses are reduced substantially and reduction of SDs occurs to a lesser extent, with CoVs lying in [0.88 1.33]. In Fig. 7, the sampled SoI among the TGs are demonstrated in the Pearson correlation matrix.
The correlation is symmetric and correlation between each of the two TGs can be observed in the off-diagonal entries. Fig. 8(a) depicts the correlation matrix of the Case Group 1. When π = 0, the SoI across the TGs are close to 0 with higher correlations between the neighboring TGs in the same areas. The correlations range around 0.45 as π increases to 0.5. When π = 1, the correlations across all TGs are above 0.9. The correlation matrix in Case Group 2 is as shown in Fig. 8(b). Due to reduced load losses, the correlations are in general weakened between the same pair of TGs in Case Group 1. Insurance premiums are designed to prepare TGs for catastrophic losses induced by probable cyberattack events. For interconnected TGs, mutual insurance accounting for respective marginal loss statistics would be a sensible option.
The premium with a high-risk loading offers solid indemnity, which may however be less financially appealing to potential participants. An ideal premium design should be meticulously formulated to avoid excessive financial burdens while providing sufficient loss indemnities for the insured parties. The highly infectious nature of the cyber epidemic model dictates a heavily skewed tail risk. To validate the design of the proposed cyber-insurance principle, herein (a) TCE premium π1 , (b) Coalitional premium π2 , and (c) Shapley premium π3 of this study are compared at various degrees of correlation of the TGs. The TCE Premium is the most conservative design predominantly responsive to the tail risk, providing great redundancy at the cost of high-risk loading. On the contrary, the Coalitional Premium is the most affordable package by excluding extreme high-loss events with low probabilities. The Shapley Premium is cooperative and tailored to add further coverage against the tail risk, striking a balance between the affordability and loss coverage.
To gauge the relative premium burden against the expected risk, RLC is defined as follows: π(βπ) = π(βπ)/πΈ[βπ]β 1 (12) where π(βπ) should be generally positive to gather sufficiency budget for loss coverage. While positive RLC is preferable against the unexpected extreme risk, excessively high RLC would discourage the TGs from insurance participation. In [17], the indemnities of π1(βπ) are not clearly specified since the original design is tailored to a third-party insurer. In this paper, all premium designs are assumed to be mutual insurance. All participating entities are both insurers and insureds. For the sake of brevity, the indemnities of π1(βπ) are proportionally allocated based on π€π π (π2): π€π π (π1 ) = βπ π1(βπ) β π€π π(π2) β π€π π π (π2) (13) In Tables VI and VII, π1 , π2 , and π3 are evaluated based on the loss statistics extracted from the two case groups with heavy tail risks. Characteristics of each design will be further elaborated numerically as follows. The premiums of Case Group 1 are shown in Table VI. In each TG, π1 , π2 , and π3 are positively correlated with the strength of correlation π. π1 has the most conservative payment schedule and can be financially burdensome. π1 may penalize the participants with heavy risk loading when extreme catastrophic events do not happen. Cost-effectiveness of π1 is unacceptably low because the maximum of π1 exceeds 3. On the flip side, π2 is an entry-level premium design devised to be the most affordable and evenly distributed package across the TGs. π2 offers small indemnities and the premiums collected from the TGs.
π2 of some TGs can be slightly negative with indemnities supplemented by other TGs. However, the worse risk of π2 beyond expected losses could barely be covered. π3 rewards TGs of relatively low risk loading with high indemnities. While π1 provides higher indemnities than π3 , π3 offers comparable affordability to the coalitional platform of π2 . The proposed π3 substantially alleviates the insolvency hazard of π2 . π2 spans from -0.26 to 0.58. By contrast, π3 is dispersed in [-0.16 0.81], a typical range of risk loading. π3 offers a wider margin in risk loading than π2 to guarantee sufficient budget to cover individual risk.
In Table VII, risk loading in Case Group 2 generally increase due to the enhanced security measure that reduces tail risk profile. π1 has a maximum close to 4 and could be too high to motivate entities to participate in. π2 is evenly distributed against average risk, with π2 lying in [-0.24 0.72]. π3 renders ideal risk loading π3 to rarely exceed 1. High capacity of indemnity and low risk loading make the proposed π3 a potentially compelling insurance model in practice. The probability of insolvency Ξ¦(π) is another risk measure which quantifies the capability of the insurance to mitigate the insolvency. Ξ¦(π) is defined as the probability that the loss is greater than the indemnity: Ξ¦(π) = Pr[βπ > π€π π (π)] (14) As shown in Table VIII, in Case Group 1, π1 generally provides the best insolvency alleviation with lowest probabilities of insolvency. In fact, π1 is such a conversative premium design against risk that the insolvency in some cases is 0. While π3 leads to the insolvency being lower than π2 and greater than π1 , π3 has the affordability superior to π1 .
In Case Group 2, when the cyber risk is significantly reduced, π3 can restrain the insolvency to be about as low as that of π1 . Thus, π3 offers an economical option with relatively sufficient insolvency mitigation.
CONCLUDING REMARKS
In this paper, a mutual insurance premium principle is designed to fairly share cyber risks across the participating TGs and control the overall insolvency risk. This study is among the first endeavors to approach the cyber-insurance by estimating the insolvency. In the case studies, it is shown the smart monitoring and job thread assignment solutions can work standalone or together to boost the reliability of TGs. Reduced insolvency probability is offered by the proposed Shapley premium while remaining as affordable as the coalitional 11 premium. More challenges may occur when real-life variables are factored in.
Since any two power system servers are to some extent connectable from each other, establishing the topology of cyber node connections could be complicated. Selecting weights to prioritize the crucial edges in the cyber node graph could be essential. There are also challenges on the actuarial end. First, accurate cyber risk estimation for specific systems would rely on long-term historical data set collection. How much risk loading a premium design reserved should be sufficient against tail risk is still left to further exploration. Second, the proposed Shapley insurance scheme is designed to achieve two goals: insolvency risk control and fair distribution of indemnity. Although these goals are achieved most of the time, there are exceptions especially when some participants are struck by unexpectedly high losses due to inadequate self-protection. This shall motivate future work in designing more insurance schemes to reflect selfprotection level and thus incentivize cyber-security investment.
REFERENCES:
[1] R. V. Yohanandhan, R. M. Elavarasan, P. Manoharan, and L. Mihet-Popa, βCyber-Physical Power System (CPPS): A review on modeling, simulation, and analysis with cyber security applications,β IEEE Access, vol. 8, pp. 151019β151064, 2020, doi: 10.1109/ACCESS.2020.3016826.
[2] M. Barrett, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, NIST Cybersecurity Framework, 2018. [Online]. Available: https://doi.org/10.6028/NIST.CSWP.04162018
[3] A. HuseinoviΔ, S. MrdoviΔ, K. Bicakci, and S. Uludag, βA survey of denial-of-service attacks and solutions in the smart grid,β IEEE Access, vol. 8, pp. 177447β177470, 2020, doi: 10.1109/ACCESS.2020.3026923.
[4] J. Hong, R. F. Nuqui, A. Kondabathini, D. Ishchenko, and A. Martin, βCyber attack resilient distance protection and circuit breaker control for digital substations,β IEEE Transactions on Industrial Informatics, vol. 15, no. 7, pp. 4332β4341, Jul. 2019, doi: 10.1109/TII.2018.2884728.
[5] H. Lin, Z. T. Kalbarczyk, and R. K. Iyer, βRAINCOAT: Randomization of network communication in power grid cyber infrastructure to mislead attackers,β IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 4893β4906, Sept. 2019, doi: 10.1109/TSG.2018.2870362.
[6] T. Duan et al., βIntelligent processing of intrusion detection data,β IEEE Access, vol. 8, pp. 78330β78342, 2020, doi: 10.1109/ACCESS.2020.2989498.
[7] L. Wei, A. I. Sarwat, W. Saad, and S. Biswas, βStochastic games for power grid protection against coordinated cyber-physical attacks,β IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 684β694, Mar. 2018, doi: 10.1109/TSG.2016.2561266.
[8] A. Binbusayyis and T. Vaiyapuri, βIdentifying and benchmarking key features for cyber intrusion detection: An ensemble approach,β IEEE Access, vol. 7, pp. 106495β106513, 2019, doi: 10.1109/ACCESS.2019.2929487.
[9] K. Yamashita et al., βMeasuring systemic risk of switching attacks based on cybersecurity technologies in substations,β IEEE Transactions on Power Systems, vol. 35, no. 6, pp. 4206β4219, Nov. 2020, doi: 10.1109/TPWRS.2020.2986452.
[10] K. Huang, C. Zhou, Y. Qin, and W. Tu, βA game-theoretic approach to cross-layer security decision-making in industrial cyber-physical systems,β IEEE Transactions on Industrial Electronics, vol. 67, no. 3, pp. 2371β2379, Mar. 2020, doi: 10.1109/TIE.2019.2907451.
[11] M. Li et al., βHybrid calculation architecture of cyber physical power system based on correlative characteristic matrix model,β in Proc. IEEE CYBER, 2018, pp. 584β588, doi: 10.1109/CYBER.2018.8688204.
[12] Y. Chen, J. Hong, and C.-C. Liu, βModeling of intrusion and defense for assessment of cyber security at power substations,β IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 2541β2552, Jul. 2018, doi: 10.1109/TSG.2016.2614603.
[13] B. Cai et al., βApplication of Bayesian networks in reliability evaluation,β IEEE Transactions on Industrial Informatics, vol. 15, no. 4, pp. 2146β2157, Apr. 2019, doi: 10.1109/TII.2018.2858281.
[14] B. Falahati, Y. Fu, and M. J. Mousavi, βReliability modeling and evaluation of power systems with smart monitoring,β IEEE Transactions on Smart Grid, vol. 4, no. 2, pp. 1087β1095, Jun. 2013, doi: 10.1109/TSG.2013.2240023.
[15] P. Ghazizadeh et al., βReasoning about mean time to failure in vehicular clouds,β IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 3, pp. 751β761, Mar. 2016, doi: 10.1109/TITS.2015.2486523.
[16] M. Xu and L. Hua, βCybersecurity insurance: Modeling and pricing,β North American Actuarial Journal, vol. 23, no. 2, pp. 220β249, 2019.
[17] P. Lau et al., βA cybersecurity insurance model for power system reliability considering optimal defense resource allocation,β IEEE Transactions on Smart Grid, vol. 11, no. 5, pp. 4403β4414, Sept. 2020, doi: 10.1109/TSG.2020.2992782.
[18] P. Lau et al., βA coalitional cyber-insurance design considering power system reliability and cyber vulnerability,β IEEE Transactions on Power Systems, vol. 36, no. 6, pp. 5512β5524, Nov. 2021, doi: 10.1109/TPWRS.2021.3078730.
[19] I. Vakilinia and S. Sengupta, βA coalitional cyber-insurance framework for a common platform,β IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1526β1538, Jun. 2019, doi: 10.1109/TIFS.2018.2881694.
[20] D. Monderer, D. Samet, and L. S. Shapley, βWeighted values and the core,β International Journal of Game Theory, vol. 21, no. 1, pp. 27β39, 1992.
[21] S. BΓ©al et al., βThe proportional Shapley value and applications,β Games and Economic Behavior, vol. 108, pp. 93β112, 2018, doi: 10.1016/j.geb.2017.08.010.
[22] E. Algaba, V. Fragnelli, and J. SΓ‘nchez-Soriano, Handbook of the Shapley Value. Boca Raton, FL, USA: CRC Press, 2019.
[23] B. Falahati and Y. Fu, βReliability assessment of smart grids considering indirect cyber-power interdependencies,β IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1677β1685, Jul. 2014, doi: 10.1109/TSG.2014.2310742.
[24] M. Schiffman, βCommon Vulnerability Scoring System (CVSS).β [Online]. Available: http://www.first.org/cvss/
[25] Y. Satotani and N. Takahashi, βDepth-first search algorithms for finding a generalized Moore graph,β in Proc. TENCON, 2018, pp. 832β837, doi: 10.1109/TENCON.2018.8650418.
[26] C. Wang et al., βImpacts of cyber system on microgrid operational reliability,β IEEE Transactions on Smart Grid, vol. 10, no. 1, pp. 105β115, Jan. 2019, doi: 10.1109/TSG.2017.2732484.
[27] Z. Yang, C. Ten, and A. Ginter, βExtended enumeration of hypothesized substation outages incorporating overload implication,β IEEE Transactions on Smart Grid, vol. 9, no. 6, pp. 6929β6938, Nov. 2018, doi: 10.1109/TSG.2017.2728792.
[28] C.-W. Ten et al., βImpact assessment of hypothesized cyberattacks on interconnected bulk power systems,β IEEE Transactions on Smart Grid, vol. 9, no. 5, pp. 4405β4425, Sept. 2018, doi: 10.1109/TSG.2017.2656068.
[29] C. Barrows et al., βThe IEEE reliability test system: A proposed 2019 update,β IEEE Transactions on Power Systems, vol. 35, no. 1, pp. 119β127, Jan. 2020, doi: 10.1109/TPWRS.2019.2925557.
[30] G. Cao et al., βOperational risk evaluation of active distribution networks considering cyber contingencies,β IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 3849β3861, Jun. 2020, doi: 10.1109/TII.2019.2939346.
Authors:
Pikkin Lau, Student Member, IEEE, Lingfeng Wang, Senior Member, IEEE, Wei Wei, Zhaoxi Liu, Member, IEEE, and Chee-Wooi Ten, Senior Member, IEEE
This paper is