Malicious data attack on real-time electricity market

Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of influencing revenues of a real-time market. The adversary must deal with the tradeoff between avoiding being detected by the control center and making maximum profit from the real time market. Optimal attacking strategy is obtained through an optimization of a quasi-concave objective function. It is shown that the probability of detection of optimal attack will always be less than 0.5. Attack performance is evaluated using simulations on the IEEE 14-bus system.

[1]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[2]  Tongxin Zheng,et al.  Ex post pricing in the co-optimized energy and reserve market , 2012, 2012 IEEE Power and Energy Society General Meeting.

[3]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[4]  Felix F. Wu,et al.  Folk theorems on transmission access: Proofs and counterexamples , 1996 .

[5]  Lang Tong,et al.  Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[6]  Lang Tong,et al.  On malicious data attacks on power system state estimation , 2010, 45th International Universities Power Engineering Conference UPEC2010.

[7]  Tongxin Zheng,et al.  Marginal loss modeling in LMP calculation , 2004, IEEE Transactions on Power Systems.

[8]  A. Ott,et al.  Experience with PJM market operation, system design, and implementation , 2003 .

[9]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[10]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[11]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[12]  E. Handschin,et al.  Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.