Construct data integrity attacks against real-time electrical market in Smart Grid

The normal operation of real-time electrical market requires accurate state estimation in Smart Grid. However, recent research shows that strategically designed data integrity attacks can easily introduce errors into state estimation without being detected. From the perspective of attackers, this increases the chances of controlling real-time electrical market operations through manipulations of meter measurements. In this paper, we first reveal the intrinsic relations between data integrity attacks and real-time electrical market, and explicitly characterize their complex interactions as a process simulator. Then a simulation-based global optimization problem is formulated, from which an attacker could maximize financial incentives through constructed data integrity attacks. More importantly, we further consider the construction of data integrity attacks when power network topologies and parameters are unknown. A systematic construction strategy is proposed based on recursive least square subspace estimation. As far as we know, our paper is the first attempt to attack real-time electrical market without network information. Finally, we evaluate the performance of the proposed attacking strategies through numerical simulations in IEEE test systems.

[1]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[2]  David K. Y. Yau,et al.  Impact of integrity attacks on real-time pricing in smart grids , 2013, CCS.

[3]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[4]  Le Xie,et al.  Sensitivity Analysis of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption , 2014, IEEE Transactions on Power Systems.

[5]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[6]  Felix F. Wu,et al.  Folk theorems on transmission access: Proofs and counterexamples , 1996 .

[7]  Dick Duffey,et al.  Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.

[8]  Philip G. Hill,et al.  Power generation , 1927, Journal of the A.I.E.E..

[9]  Lang Tong,et al.  Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.

[10]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[11]  A. Robert Calderbank,et al.  PETRELS: Parallel Subspace Estimation and Tracking by Recursive Least Squares From Partial Observations , 2012, IEEE Transactions on Signal Processing.

[12]  Lang Tong,et al.  Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  A. Ott,et al.  Experience with PJM market operation, system design, and implementation , 2003 .

[14]  Karl Johan Åström,et al.  Adaptive Control , 1989, Embedded Digital Control with Microcontrollers.

[15]  Nikolaos V. Sahinidis,et al.  Derivative-free optimization: a review of algorithms and comparison of software implementations , 2013, J. Glob. Optim..

[16]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[17]  Bin Yang,et al.  Projection approximation subspace tracking , 1995, IEEE Trans. Signal Process..