Price Modification Attack and Protection Scheme in Smart Grid

被引:23
作者
Mishra, Subhankar [1 ]
Li, Xiang [1 ]
Pan, Tianyi [1 ]
Kuhnle, Alan [1 ]
Thai, My T. [1 ,2 ]
Seo, Jungtaek [3 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32603 USA
[2] Ton Duc Thang Univ, Fac Informat Technol, Div Algorithms & Technol Networks Anal, Ho Chi Minh City, Vietnam
[3] Elect & Telecommun Res Inst, Attached Inst, Daejeon 305600, South Korea
基金
美国国家科学基金会;
关键词
Smart grids; power system security; optimization; POWER; VULNERABILITY; STRATEGIES;
D O I
10.1109/TSG.2015.2509945
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Smart grid addresses the problem of existing power grid's increasing complexity, growing demand, and requirement for greater reliability through two-way communication and automated residential load control among others. These features also make the smart grid a target for a number of cyber attacks. In this paper, we study the problem of price modification attack (PMA) through fabrication of price messages, which induces changes in load profiles of individual users and eventually causes major alteration in the load profile of the entire network. Combining with cascading failure, it ends up with a highly damaging attack. We prove that the problem is nondeterministic polynomial-time-complete and provide its inapproximability. We devise two approaches for the problem, the former deals with maximizing failure of lines with the given resource and then extending the effect with cascading failure, while the later takes cascading potential into account while choosing the lines to fail. We formulate new protection strategy against PMA and this includes two new algorithms, namely bi-level programming with new branching method and an effective heuristic to improve the running time. Empirical results on both IEEE bus data and real network help us evaluate our approaches under various settings of grid parameters.
引用
收藏
页码:1864 / 1875
页数:12
相关论文
共 24 条
[1]  
[Anonymous], 2014, IBM ILOG CPLEX OPT S
[2]  
[Anonymous], 1999, Power Systems Analysis
[3]  
Bernstein A, 2014, IEEE INFOCOM SER, P2634, DOI 10.1109/INFOCOM.2014.6848211
[4]  
Bienstock D, 2011, IEEE DECIS CONTR P, P2166, DOI 10.1109/CDC.2011.6160415
[5]   THE N-k PROBLEM IN POWER GRIDS: NEW MODELS, FORMULATIONS, AND NUMERICAL EXPERIMENTS [J].
Bienstock, Daniel ;
Verma, Abhinav .
SIAM JOURNAL ON OPTIMIZATION, 2010, 20 (05) :2352-2380
[6]   Complex networks: Structure and dynamics [J].
Boccaletti, S. ;
Latora, V. ;
Moreno, Y. ;
Chavez, M. ;
Hwang, D. -U. .
PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS, 2006, 424 (4-5) :175-308
[7]   Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks [J].
Chen, Guo ;
Dong, Zhao Yang ;
Hill, David J. ;
Xue, Yu Sheng .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2011, 26 (03) :1000-1009
[8]   Attack structural vulnerability of power grids: A hybrid approach based on complex networks [J].
Chen, Guo ;
Dong, Zhao Yang ;
Hill, David J. ;
Zhang, Guo Hua ;
Hua, Ke Qian .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2010, 389 (03) :595-603
[9]   An improved model for structural vulnerability analysis of power networks [J].
Chen, Guo ;
Dong, Zhao Yang ;
Hill, David J. ;
Zhang, Guo Hua .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2009, 388 (19) :4259-4266
[10]   Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model [J].
Chen, J ;
Thorp, JS ;
Dobson, I .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2005, 27 (04) :318-326