Data Injection Attacks on Electricity Markets by Limited Adversaries: Worst-Case Robustness

Electricity markets consist of multiple look-ahead and real-time spot markets, across which energy price is generally volatile. Moreover, dispatch and pricing decisions in the real-time markets strongly hinge on the quality of the real-time state estimates, which are formed dynamically in order to delineate real-time information about operational state of the grid. Adversaries can leverage price volatility in conjunction with the dependence of the real-time markets on the state estimates in order to carry out profitable financial misconduct, e.g., via virtual bidding on the locational marginal prices. When the adversaries are omniscient (i.e., have full and instantaneous access to grid topology and dynamics), the attack strategies for maximizing financial profits are studied extensively in the existing literature. This paper focuses on limited adversaries who have only partial and imperfect information about the grid, and offers a framework for analyzing the attack strategies for limited adversaries and the associated confidence about profitable attacks. Specifically, adversaries’ information is considered to be within a measure of bounded error, and attack strategies are designed such that the adversaries are guaranteed a certain level of confidence to gain profit. Designing such attacks is investigated analytically and examined in the IEEE 14- and 118-bus systems.

[1]  S. Hunt,et al.  Making Competition Work in Electricity , 2002 .

[2]  Adnan Anwar,et al.  Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements , 2016, PAISI.

[3]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[4]  Dick Duffey,et al.  Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.

[5]  A. Ott,et al.  Experience with PJM market operation, system design, and implementation , 2003 .

[6]  Lang Tong,et al.  Impacts of Malicious Data on Real-Time Price of Electricity Market Operations , 2012, 2012 45th Hawaii International Conference on System Sciences.

[7]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[8]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[9]  Le Xie,et al.  Sensitivity Analysis of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption , 2014, IEEE Transactions on Power Systems.

[10]  Philip G. Hill,et al.  Power generation , 1927, Journal of the A.I.E.E..

[11]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[12]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[13]  Felix F. Wu,et al.  Folk theorems on transmission access: Proofs and counterexamples , 1996 .

[14]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[15]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[16]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[17]  Thomas B. Smith,et al.  Electricity theft: a comparative analysis , 2004 .

[18]  Zhu Han,et al.  Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.

[19]  Yonina C. Eldar,et al.  A competitive minimax approach to robust estimation of random parameters , 2004, IEEE Transactions on Signal Processing.

[20]  Ali Abur,et al.  A bad data identification method for linear programming state estimation , 1990 .

[21]  Yurii Nesterov,et al.  Interior-point polynomial algorithms in convex programming , 1994, Siam studies in applied mathematics.

[22]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[23]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[24]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part III: Implementation , 1970 .

[25]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[26]  Zhu Han,et al.  Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.

[27]  M. Negrete-Pincetic,et al.  Towards quantifying the impacts of cyber attacks in the competitive electricity market environment , 2009, 2009 IEEE Bucharest PowerTech.

[28]  Tongxin Zheng,et al.  Ex post pricing in the co-optimized energy and reserve market , 2012, 2012 IEEE Power and Energy Society General Meeting.

[29]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[30]  Xinyu Yang,et al.  On false data injection attack against Multistep Electricity Price in electricity market in smart grid , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[31]  Lang Tong,et al.  Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[32]  Fábio Borges,et al.  On privacy-preserving protocols for smart metering systems , 2015 .

[33]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[34]  Xia Lei,et al.  Research on Multistep Electricity Price Model with Bidirectional Regulation for Large Consumers , 2010, 2010 International Conference on Electrical and Control Engineering.

[35]  Zhu Han,et al.  Manipulating the electricity power market via jamming the price signaling in smart grid , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[36]  Le Xie,et al.  Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.

[37]  H. Vincent Poor,et al.  Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[38]  Liyan Jia,et al.  On the nonlinearity effects on malicious data attack on power system , 2012, 2012 IEEE Power and Energy Society General Meeting.