Differential Game Theory with FPA Optimization in Multi-Area Power System

Shaik Khadar Vali, Dr. V. Madhusudhan, Dr. R. Kiranmayi


The distribution generation penetration increases due to the increased need of power. These penetration causes problem of frequency deviations. In this paper the in multi-area power system the combination of renewable energy resources is proposed. Here the area 1 & area 2 are thermal power plant. Hydro power generation plant is taken in area-3 & area-4. Renewable energy system is considered in area-5. Here the cyber security attack is taken as change in power in the entire area. This can make the power block out or wrong data entry. Here differential game theory-based problem formulation is done. The PI controller and differential game theory with flower pollination are compared for performance of fast response. The MATLAB 2017b is used for building the areas and algorithm


Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” in Proc. 16th ACM Conf.

Comput. Commun. Security, Chicago, IL, USA, 2009, pp. 21–32..

M. El-Halabi, A. Farraj, H. Ly, and D. Kundur, “A distortion-theoretic perspective for redundant metering security in smart grid,” in Proc.

IEEE Can. Conf. Elect. Comput. Eng. (CCECE), Montreal, QC, Canada, Apr./May 2012, pp. 1–5.

D. Kundur, “Power system reliability, security and stability, class notes for ECE1518: Seminar in identity, privacy and security,” Dept. Elect.

Comput. Eng., Univ. Toronto, Toronto, ON, Canada, 2014.

S. Sridhar, A. Hahn, and G. Manimaran, “Cyber-physical security for electric power grid,” Proc. IEEE, vol. 100, no. 1, pp. 210–224, Jan. 2012

A. Hahn and G. Manimaran, “Cyber attack exposure evaluation framework for the smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 4,

pp. 835–843, Dec. 2011.

P. Rezaei, P. Hines, and M. Eppstein, “Estimating cascading failure risk with random chemistry,” IEEE Trans. Power Syst., vol. 30, no. 5,

pp. 2726–2735, Sep. 2015

S. Liu, B. Chen, T. Zourntos, D. Kundur, and K. Butler-Purry, “A coordinated multi-switch attack for cascading failures in smart grid,” IEEE Trans. Smart Grid, vol. 5, no. 3, pp. 1183–1195, May 2014.

T. Liu et al., “Abnormal traffic-indexed state estimation: A cyber– physical fusion approach for smart grid attack detection,” Future Gener.Comput. Syst., vol. 49, pp. 94–103, Aug. 2015.

M. Esmalifalak, L. Liu, N. Nguyen, R. Zheng, and Z. Han, “Detecting stealthy false data injection using machine learning in smart grid,” IEEE Syst. J., DOI: 10.1109/JSYST.2014.2341597.

M. Esmalifalak, Z. Han, and L. Song, “Effect of stealthy bad data injection on network congestion in market based power system,” in

Proc. IEEE Wireless Commun. Netw. Conf., Shanghai, China, 2012, pp. 2468–2472.

S. Liu, B. Chen, D. Kundur, T. Zourntos, and K. Butler-Purry, “Progressive switching attacks for instigating cascading failures in

smart grid,” in Proc. IEEE Power Energy Soc. Gen. Meeting, Vancouver, BC, Canada, 2013, pp. 1–5.

H. Shayeghi, H. A. Shayanfar and A. Jalili, "Load frequency control strategies: a state-of-the-art survey for the researcher," Energy

Conversion and Management, vol. 50, no. 2, pp. 344-353, Feb. 2011.

K. S. S. Ramakrishna1, P. Sharma and T. S. Bhatti, "Automatic generation control of interconnected power system with diverse sources of power generation," International Journal of Engineering Science and Technology, vol. 2, no. 5, pp. 51-65, 2010.

K. P. S. Parmara, S. Majhi and D. P. Kothari, "Load frequency control of a realistic power system with multi-source power generation,"

Electrical Power and Energy Systems, vol. 42, no. 1, pp. 426-433, Nov. 2012.

J. C. Engwerda, LQ dynamic optimization and differential games. New York: Wiley, 2005

Xin-she Yang, “Flower Pollination algorithm for Global Optimization”, Unconventional Computation and Natural Computation 2012, Lecture Notes in Computer Science, Vol. 7445, pp. 240-249 (2012)

DOI: http://doi.org/10.11591/ijpeds.v11.i2.pp%25p
Total views : 18 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.