Impacts of Malicious Data on Real-Time Price of Electricity Market Operations

Impacts of malicious data data attack on the real-time electricity market are studied. It is assumed that an adversary has access to a limited number of meters and has the ability to construct data attack based on what it observes. Different observation models are considered. A geometric framework is introduced based on which upper and lower bounds on the optimal data attack are obtained and evaluated in simulations.

[1]  Tongxin Zheng,et al.  Ex Post Pricing in the Co-Optimized Energy and Reserve Market , 2006, IEEE Transactions on Power Systems.

[2]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[3]  A. Ott,et al.  Experience with PJM market operation, system design, and implementation , 2003 .

[4]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[5]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[6]  Tongxin Zheng,et al.  Marginal loss modeling in LMP calculation , 2004, IEEE Transactions on Power Systems.

[7]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[8]  Lang Tong,et al.  On malicious data attacks on power system state estimation , 2010, 45th International Universities Power Engineering Conference UPEC2010.

[9]  E. Handschin,et al.  Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.

[10]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[11]  Felix F. Wu,et al.  Folk theorems on transmission access: Proofs and counterexamples , 1996 .