Impact of optimal false data injection attacks on local energy trading in a residential microgrid

作者: Shama N. Islam , M.A. Mahmud , A.M.T. Oo

DOI: 10.1016/J.ICTE.2018.01.015

关键词:

摘要: Abstract This paper illustrates the vulnerability of local energy trading to false data injection attacks in a smart residential microgrid and demonstrates impact such on financial benefits earned by participants. In market, attacker can overhear generation consumption patterns legitimate participants based this, optimize its attack signal achieve maximum either as buyer/seller, while balancing supply–demand remain undetected. For system, we have formulated an optimization problem at attacker, extract possible from The numerical results show that causes significant losses participants, up reduction 94% certain hours.

参考文章(10)
S. M. Amin, A. M. Giacomoni, Smart Grid, Safe Grid IEEE Power & Energy Magazine. ,vol. 10, pp. 33- 40 ,(2012) , 10.1109/MPE.2011.943112
Xu Li, Xiaohui Liang, Rongxing Lu, Xuemin Shen, Xiaodong Lin, Haojin Zhu, Securing smart grid: cyber attacks, countermeasures, and challenges IEEE Communications Magazine. ,vol. 50, pp. 38- 45 ,(2012) , 10.1109/MCOM.2012.6257525
Daojing He, Chun Chen, Jiajun Bu, Sammy Chan, Yan Zhang, Mohsen Guizani, Secure service provision in smart grid communications IEEE Communications Magazine. ,vol. 50, pp. 53- 61 ,(2012) , 10.1109/MCOM.2012.6257527
Ritwik Majumder, Gargi Bag, Ki-Hyung Kim, Power Sharing and Control in Distributed Generation With Wireless Sensor Networks IEEE Transactions on Smart Grid. ,vol. 3, pp. 618- 634 ,(2012) , 10.1109/TSG.2011.2173360
Per Goncalves Da Silva, Dejan Ilic, Stamatis Karnouskos, The Impact of Smart Grid Prosumer Grouping on Forecasting Accuracy and Its Benefits for Local Electricity Market Trading IEEE Transactions on Smart Grid. ,vol. 5, pp. 402- 410 ,(2014) , 10.1109/TSG.2013.2278868
Tiago Cruz, Luis Rosa, Jorge Proenca, Leandros Maglaras, Matthieu Aubigny, Leonid Lev, Jianmin Jiang, Paulo Simoes, A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems IEEE Transactions on Industrial Informatics. ,vol. 12, pp. 2236- 2246 ,(2016) , 10.1109/TII.2016.2599841
Kyriakos Stefanidis, Artemios G. Voyiatzis, An HMM-Based Anomaly Detection Approach for SCADA Systems Information Security Theory and Practice. pp. 85- 99 ,(2016) , 10.1007/978-3-319-45931-8_6
Jiawen Kang, Rong Yu, Xumin Huang, Sabita Maharjan, Yan Zhang, Ekram Hossain, Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains IEEE Transactions on Industrial Informatics. ,vol. 13, pp. 3154- 3164 ,(2017) , 10.1109/TII.2017.2709784
Leandros Maglaras, Lei Shu, Athanasios Maglaras, Jianmin Jiang, Helge Janicke, Dimitrios Katsaros, Tiago J. Cruz, Editorial: Industrial Internet of Things (I2oT) Mobile Networks and Applications. ,vol. 23, pp. 806- 808 ,(2017) , 10.1007/S11036-017-0937-3
Mustafa A. Mustafa, Sara Cleemput, Aysajan Abidin, A local electricity trading market: Security analysis ieee pes innovative smart grid technologies conference. pp. 1- 6 ,(2016) , 10.1109/ISGTEUROPE.2016.7856269