Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Design of robust profitable false data injection attacks in multi-settlement electricity markets

The potential impacts of data integrity attacks on multi-settlement electricity markets have been recently investigated and have sent a strong message to power grids independent system operators (ISOs) that adversaries could launch profitable cyber attacks by casting an incorrect image of transmission lines congestion pattern. However, these cautionary messages may be underestimated due to the adversaries unrealistic requirements (e.g. having access to real-time measurements) to launch a successful stealthy and profitable attack. This study examines the potential of the aforementioned risk by demonstrating how a malicious power market participant could disturb the electricity market operation, using a pre-designed false data injection attack along with bogus electricity trades in both day-ahead and real-time markets. The proposed attack design is robust against market uncertainties and the adversary can guarantee the success of the attack in advance. Hence, the existence of such cyber attacks against electricity markets can make the adversaries more aggressive. The numerical results on the IEEE 14-bus test system confirm the vulnerability of multi-settlement electricity markets to such financial cyber attacks. The results obtained from investigating such an attack design can be employed by ISOs in order to provide appropriate countermeasures.

References

    1. 1)
      • 9. Xie, L., Mo, Y., Sinopoli, B.: ‘Integrity data attacks in power market operations’, IEEE Trans. Smart Grid., 2011, 2, (4), pp. 659666.
    2. 2)
      • 16. Li, F., Wei, Y., Adhikari, S.: ‘Improving an unjustified common practice in ex-post LMP calculation’, IEEE Trans. Power Syst., 2010, 25, (2), pp. 11951197.
    3. 3)
      • 10. Parsons, J.E., Colbert, C., Larrieu, J., et al: ‘Financial arbitrage and efficient dispatch in wholesale electricity markets’, MIT Center for Energy and Environmental Policy Research, no. 15-002, 2015.
    4. 4)
      • 6. Khanna, K., Panigrahi, B.K., Joshi, A.: ‘Data integrity attack in smart grid: optimised attack to gain momentary economic profit’, IET Gener. Transm. Distrib., 2016, 10, (16), pp. 40324039.
    5. 5)
      • 19. Saric, A.S.A.: ‘An application of interval analysis and optimization to electric energy markets’, IEEE Trans. Power Syst., 2006, 21, (2), pp. 515523.
    6. 6)
      • 2. Hendrickx, J.M., Johansson, K.H., Jungers, R.M., et al: ‘Efficient computations of a security index for false data attacks in power networks’, IEEE Trans. Autom. Control, 2014, 59, (12), pp. 31943208.
    7. 7)
      • 13. Esmalifalak, M., Nguyen, H., Zheng, R., et al: ‘A stealthy attack against electricity market using independent component analysis’, IEEE Syst. J., 2017, PP, (99), pp. 111.
    8. 8)
      • 3. Jinsub, K., Tong, L., Thomas, R.J.: ‘Dynamic attacks on power systems economic dispatch’. Proc. 48th Asilomar Conf., 2014, pp. 345349.
    9. 9)
      • 5. Moslemi, R., Mesbahi, A., Mohammadpour, J.: ‘A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids’, IEEE Trans. Smart Grid., 2017, PP, (99), pp. 11, doi: 10.1109/TSG.2017.2675960.
    10. 10)
      • 14. Xie, L., Mo, Y., Sinopoli, B.: ‘False data injection attacks in electricity markets’. Proc. First IEEE Smart Grid Communications Conf., 2010, pp. 226231.
    11. 11)
      • 12. Tan, S., Song, W.Z., Stewart, M., et al: ‘Online data integrity attacks against real-time electrical market in smart grid’, IEEE Trans. Smart Grid, 2017, PP, (99), p. 1.
    12. 12)
      • 8. Ott, A.L.: ‘Experience with PJM market operation, system design, and implementation’, IEEE Trans. Power Syst., 2003, 18, (2), pp. 528534.
    13. 13)
      • 7. Litvinov, E.: ‘Design and operation of the locational marginal prices-based electricity markets’, IET Gener. Transm. Distrib., 2010, 4, pp. 315323.
    14. 14)
      • 18. Li, X., Poor, H.V., Scaglione, A.: ‘Blind topology identification for power systems’. 2013 IEEE Int. Conf. Smart Grid Communications (SmartGridComm), October 2013, pp. 9196.
    15. 15)
      • 15. Wu, F.F., Varaiya, P., Spiller, P., et al: ‘Folk theorems on transmission access: proofs and counterexamples’, J. Regulatory Econ., 1996, 10, (1), pp. 523.
    16. 16)
      • 11. Jia, L., Thomas, R.J., Tong, L.: ‘Impacts of malicious data on real-time price of electricity market operations’. Proc. HICSS, 2012, pp. 19071914.
    17. 17)
      • 17. Kekatos, V., Giannakis, G.B., Baldick, R.: ‘Online energy price matrix factorization for power grid topology tracking’, IEEE Trans. Smart Grid, 2016, 7, pp. 12391248.
    18. 18)
      • 1. Liu, Y., Reiter, M.K., Ning, P.: ‘False data injection attacks against state estimation in electric power grids’. Proc. 16th ACM Conf. Computer Communications Security, 2009, pp. 2132.
    19. 19)
      • 20. Grant, M., Boyd, S.: ‘CVX: MATLAB software for disciplined convex programming, version 2.1’. Available at http://cvxr.com/cvx, March 2014.
    20. 20)
      • 4. Giani, A., Bitar, E., Garcia, M., et al: ‘Smart grid data integrity attacks’, IEEE Trans. Smart Grid, 2013, 4, (3), pp. 12441253.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-gtd.2017.0294
Loading

Related content

content/journals/10.1049/iet-gtd.2017.0294
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address