A Bayesian game theoretic based bidding strategy for demand response aggregators in electricity markets

2020 ◽  
Vol 54 ◽  
pp. 101787 ◽  
Author(s):  
Saeed Abapour ◽  
Behnam Mohammadi-Ivatloo ◽  
Mehrdad Tarafdar Hagh
2019 ◽  
Vol 9 (3) ◽  
pp. 576 ◽  
Author(s):  
Xiaofeng Liu ◽  
Bingtuan Gao ◽  
Yuanmei Li

Demand response (DR) aggregator controlling and aggregating flexible resource of residential users to participate in DR market will contribute the performance of DR project. However, DR aggregator has to face the risk that users may break the contract signed with aggregator and refuse to be controlled by aggregator due to the uncertainty factors of electricity consumption. Therefore, in this paper, community operator (i.e., DR aggregator) is proposed to equip auxiliary equipment, such as energy storage and gas boiler, to compensate for power shortage caused by users’ breach behavior. DR aggregated resource with different auxiliary equipment will have different characteristics, such as breach rate of DR resource. In the proposed DR framework, for selling the aggregated resource, community operator has to compete the market share with other operators in day-ahead DR market. In the competition, each operator will try its best to make the optimal bidding strategy by knowing as much information of its opponents as possible. But, some information of community operator (e.g., DR resource’s characteristic) belongs to privacy information, which is unknown to other operators. Accordingly, this paper focuses on the application of incomplete information game-theoretic framework to model the competition among community operators in DR bidding market. To optimize bidding strategy for the high profit with incomplete information, a Bayesian game approach is formulated. And, an effective iterative algorithm is also presented to search the equilibrium for the proposed Bayesian game model. Finally, a case study is performed to show the effectiveness of the proposed framework and Bayesian game approach.


2015 ◽  
Vol 6 (2) ◽  
pp. 748-758 ◽  
Author(s):  
Ehsan Nekouei ◽  
Tansu Alpcan ◽  
Deb Chattopadhyay

Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document