False Data Injection Attacks in Electricity Markets by Limited Adversaries: Stochastic Robustness

被引:60
作者
Tajer, Ali [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Elect Comp & Syst Engn, Troy, NY 12180 USA
基金
美国国家科学基金会;
关键词
Electricity market; false data injection attack; locational marginal pricing; stochastic robustness;
D O I
10.1109/TSG.2017.2733346
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deregulated electricity markets rely on a two-settlement system consisting of day-ahead and real-time (RT) markets, across which electricity price is generally volatile. In electricity markets, locational marginal pricing is widely adopted to set electricity prices and manage transmission congestion. Such locational marginal prices (LMPs) strongly hinge on the reliability and accuracy of the state estimation routines, which are designed to provide RT information about the state of the power grid based on meter measurements. However, state estimation is vulnerable to false data injection attacks (FDIAs), which aim to compromise the readings of measurement meters in order to distort state estimates and, subsequently, mislead the computation of RT LMPs, and thus carry out financial misconduct. Existing studies show that if the adversaries are omniscient, i.e., have full and instantaneous access to grid topology and state, they can design profitable attack strategies without being detected by the residue-based bad data detectors. This paper focuses on a more realistic FD1A setting, in which the attackers have only partial and imperfect information due to their limited resources and restricted physical access to the grid. Specifically, the attackers are assumed to have uncertainties about the state of the grid, and the uncertainties are modeled stochastically. Based on this model, this paper offers a framework for characterizing the optimal stochastic guarantees for the effectiveness of the attacks and the associated economic impacts. Designing such attacks is investigated analytically, and is examined in the standard IEEE 14-bus and 118-bus systems.
引用
收藏
页码:128 / 138
页数:11
相关论文
共 29 条
[1]  
Abur A., 2004, Power System State Estimation Theory andImplementation
[2]   Second-order cone programming [J].
Alizadeh, F ;
Goldfarb, D .
MATHEMATICAL PROGRAMMING, 2003, 95 (01) :3-51
[3]  
Bechar I., 2009, ARXIV09093595
[4]   Coordinated Data-Injection Attack and Detection in the Smart Grid [J].
Cui, Shuguang ;
Han, Zhu ;
Kar, Soummya ;
Kim, Tung T. ;
Poor, H. Vincent ;
Tajer, Ali .
IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (05) :106-115
[5]   Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study [J].
Esmalifalak, Mohammad ;
Shi, Ge ;
Han, Zhu ;
Song, Lingyang .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) :160-169
[6]  
Grant M., 2014, CVX MATLAB SOFTWARE
[7]  
Hunt Sally., 2002, Making competition work in electricity, V146
[8]   Grid of the Future [J].
Ipakchi, Ali ;
Albuyeh, Farrokh .
IEEE POWER & ENERGY MAGAZINE, 2009, 7 (02) :52-62
[9]  
Jia LY, 2011, INT CONF ACOUST SPEE, P5952
[10]   Strategic Protection Against Data Injection Attacks on Power Grids [J].
Kim, Tung T. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (02) :326-333