Attack Against Electricity Market–Attacker and Defender Gaming Mohammad Esmalifalak† , Ge Shi‡ , Zhu Han† , and Lingyang Song‡ †



ECE Department, University of Houston, Houston, TX 77004 School of Electrical Engineering and Computer Science, Peking University, Beijing, China

Abstract—Application of cyber technologies, improves the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks and compromising them can have serious technical and economical problems. This paper specifies the effect of compromising each measurement on the prices of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing). Attacking and defending all measurements are impossible for attacker and defender, respectively. This situation is modeled as a zero–sum game between the attacker and defender. The game defines the proportion of times that the attacker and defender like to attack and defend different measurements, respectively. From the simulation results based on the PJM 5-Bus test system, we can show the effectiveness and properties of the studied game.

I. I NTRODUCTION Nowadays, power systems are becoming more and more sophisticated in structure and configuration because of the increasing in electricity demand and the limited energy resources. The traditional power grids are commonly used to carry power from a few central generators to a large number of customers. In contrast, the new-generation of electricity grid that is also known as the smart grid (SG) uses two-way flows of electricity and information to deliver power in more efficient ways responding to wide ranging conditions and events [1]. Online monitoring of power system is important for control centers in different decision making processes. State estimation (SE) is a key function in building realtime models of electricity networks in Energy Management Centers (EMC) [2]. State estimators provide precise and efficient observations of operational constraints to identify the current operating state of the system in quantities such as the transmission line loadings or bus voltage magnitudes. Accuracy of state estimation can be affected by bad data in the process of measuring. Measurements may contain errors due to the various reasons such as random errors, incorrect topology information and injection of bad data by attackers. By integrating more advanced cyber technologies into the energy management system (EMS), cyber-attacks can cause major technical problems such as blackouts in power systems. The attacks also can be designed for calling financial benefits, which will change the net cost of electricity for consumers. Due to the importance of the smart grid studies, some surveys have classified the different aspects of smart grids [3], [4], [5]. Some researches have been done over cyber security for smart grid [6], [7], [8], [9]. In [6], an undetectable attack by bad data detectors (BDD) was first introduced, where the attacker knows the state estimation Jacobian matrix

(H) and defines an undetectable attack using this matrix. [7] uses independent component analysis (ICA), and inserts an undetectable attack even when this matrix is unknown for attackers. In [8], the authors discusses key security technologies for a smart grid system, including public key infrastructures and trusted computing. In [9], a new criterion of reliable strategies for defending power systems is derived and two allocation algorithms have been developed to seek reliable strategies for two types of defense tasks. In this paper, we consider that the attacker takes cyber attack against electricity prices. We show that the attacker observes the results of the Ex-Ante Market and changes the estimated transmitted power in order to change the congestion level for making a profit. In the other hand, the defender tries to defend the measurements of network. Since the attacker and defender are not able to attack and defend all of measurements, they will compete to increase and decrease the injected false data respectively, this behavior is modeled by a two-person zero-sum strategic game. The results of simulations on the PJM 5-Bus test system shows the effectiveness of attack on the prices of electricity on the Ex-Post market. The remainder of this paper is organized as follows: The system model is given in Section II and formulation of an undetectable attack in the electricity market is given in III. Section IV models the interactions between the attacker and defender as a zero–sum game. Numerical results in V shows the effectiveness of the proposed attack, and the conclusion closes the paper in Section VI. II. S YSTEM M ODEL In power systems, transmission lines are used to transfer generated power from generating units to consumers. Theoretically, transmitted complex power between bus i and bus j depends on the voltage difference between these two buses, and it is also a function of impedance between these buses. In general, transmission lines have high reactance over resistance (i.e. X/R ratio), and one can approximate the impedance of a transmission line with its reactance. In DC power flow studies, it is assumed that the voltage phase difference between two buses is small and the amplitudes of voltages in buses are near to unity. Transmitted power is approximated with a linear equation [10]: θi − θj Pij = , (1) Xij where θi is the voltage phase angle in bus i, and Xij is the reactance of transmission line between bus i and bus

j. In the state-estimation problem, the control center tries to estimate n phase angles θi , by observing m real-time measurements. In power flow studies, the voltage phase angle (θi ) of the reference bus is fixed and known, and thus only n − 1 angles need to be estimated. We define the state vector as θ = [θ1 , . . . , θn ]T . The control center observes a vector z for m active power measurements. These measurements can be either transmitted active power P Pij from bus i to j, or injected active power to bus i (Pi = Pij ). The observation can be described as follows: z = P(θ) + e,

(2)

T

where z = [z1 , · · · , zm ] is the vector of measured active power in transmission lines, P(θ) is the nonlinear relation between measurement z, state θ is the vector of n bus phase angles θi , and e = [e1 , · · · , em ]T is the Gaussian measurement noise vector with covariant matrix Σe . Define the Jacobian matrix H ∈ Rm as ∂P(θ) |θ= 0 . (3) H= ∂θ If the phase difference (θi −θj ) in (1) is small, then the linear approximation model of (2) can be described as: z = Hθ + e.

(4)

The bad data can be injected to z so as to influence the state estimation of θ. Next, we describe the current bad data injection method used in state estimators of different electricity markets. Given the power flow measurements z, ˆ can be computed as: the estimated state vector x T −1 θˆ = (H Σ H)−1 HT Σ−1 z = Mz, (5) e

e

−1 T −1 where M = H(HT Σ−1 H Σe . Thus, the residue e H) vector r can be computed as the difference between measured quantity and the calculated value from the estimated state: ˆ Therefore, the expected value and the covariance r = z−Hθ. of the residual are:

E(r) = 0 and cov(r) = (I − M)Σe ,

(6)

False data detection can be performed using a threshold test [11]. The hypothesis of not being attacked is accepted if max |ri | ≤ γ, i

(7)

where γ is the threshold and ri is the component of r. III. ATTACK IN ELECTRICITY MARKET A power network is a typically large and complicated system, which should be operated without any interruption. Normal operation needs a system wide monitoring of the states of network in specific time intervals. Based on the monitored values, corrective actions need to be taken. Any fault in measurement data (because of measurement failures or cyber attack against them), can change the decisions of control center, which can cause serious technical or economical problems in the network. In this section, we first introduce the electricity market structure, and then from the attacker point of view we will formulate an undetectable attack that can change the prices of electricity.

Fig. 1. Ex-Ante and Ex-Post market model used for defining LMP’s and dispatch schedule

A. Day-Ahead and Real-Time Electricity Markets Security and optimality of power network operation are the most important tasks in control centers, which can be achieved by efficient monitoring and decision making. After deregulation of electric industries, different services that can improve security and optimality of network can be traded in different markets. Energy market is one of these markets in which generation companies (GENCO’s) and load serving entities (LSE’s) compete to generate and consume energy, respectively. Control center knowing the submitted prices and network constraints, tries to maximize social welfare for all participants. A well known program for solving this optimization is Optimal Power Flow (OPF) program. DayAhead and Real-Time Electricity Markets are examples of energy market that uses linear form of optimal power flow (DCOPF). 1) Ex-Ante or Day-Ahead Market: Based on the submitted bids (from generators and loads) and predicted network condition1 , ISO runs the DCOPF program. The output of this market specifies the dispatch schedule for all generators and defines the Locational Marginal Price (LMP) in each bus of power network (Fig. 1). Trading electricity in most of electricity markets such as PJM Interconnection, New York, and New England markets is based on LMP method. 2) Ex-Post or Real-Time Market: In this market the control center conducts the following: 1- Gathers data from the measurements that are installed in the physical layer (power network) 2- Estimates the states of the network (online monitoring of the network) 3- Runs a DCOPF program similar to the Ex-Ante market but based on the state estimation results. The obtained LMP’s will be considered as the real-time price of electricity2 . The linear format of OPF is called DCOPF and is used to define the LMP. B. DC Optimal Power Flow (DCOPF) In general, the LMP can be split into three components including the marginal energy price LM PiEnergy , marginal congestion price LM PiCong , and marginal loss price LM PiLoss [13] - [15]. A common model of the LMP simulation is introduced in [13]. It is based on the DC model and Linear Programming (LP), which can easily incorporate 1 Such as the load level for the next day, which can be predicted by the historical load data from the past years. 2 Dispatch schedule will be similar to the Ex-Ante market and major changes of load will be covered by the Ancillary Services.

both marginal congestion and marginal losses. The generic dispatch model can be written as N X

min Gi

Ci × Gi ,

(8)

where N is the number of buses, Ci is the generation cost at bus i in ($/M W h), Gi and Di are the generation dispatch and demand at bus i in (M W h) respectively, GSFk−i is the generation shift factor from bus i to line k, and Fkmax is the transmission limit for line k. The general formulation of the LMP at bus i can be written as follows: LM Pi = LM P energy + LM Picong + LM Piloss , LM P energy = λ, L X

θˆi − θˆj (Mi − Mj )T Pˆij = = z Xij Xij = QT z = QT+ z+ + QT− z− ,

i=1

 N N P P   Gi − Di = 0,    i=1 i=1 N P s.t.  GSFk−i × (Gi − Di ) ≤ Fkmax , k ∈ {all lines},   i=1   min Gi ≤ Gi ≤ Gmax , i ∈ {all generators}, i

LM Picong =

of power systems, the transmitted power from bus i to bus θˆ −θˆ j can be estimated with Pˆij = iXij j , this equation together with equation (5) gives the following:

GSFk−i × µk ,

z

(11)

i=1

LM Piloss = λ × (DFi − 1),

(M −M )T

i j . The positive and negative arrays of where QT = Xij this vector are shown with QT+ and QT− , respectively. These coefficient vectors divide the measurements into two groups z+ and z− , in which adding z a > 0 to any array of z+ and z− will increase and decrease the estimated transmitted power flow, respectively. In this paper, the measurements in z+ and z− are considered as group M and N , respectively. After defining these groups, the attacker tries to insert bad data into the measurements with the following optimization, X X max . z a (i) − z a (j), (14) a

i∈{M}

(9) (10)

(12)

where L is the number of lines, λ is the Lagrangian multiplier of the equality constraint, µk is the Lagrangian multiplier of the k th transmission constraint, and DFi is delivery factor at bus i. If the optimization model in (8), ignores losses, we will have DFi = 1 and LM Piloss = 0 in (12). In this work in order to emphasize the main point to be presented, the loss price is ignored. C. Cyber Attack Against Electricity Prices Real-time market uses the state estimator results that shows the on-line state of the network. In order to transfer data to the state estimator, control center uses different communication channels such as power line communication channel. Using these channels, increases the risk of cyber attack. In other word, if an attacker can change the measurement values, the results of state estimation and consequently results of real-time market will be affected. Changing measurements’ data without detection by BDD (which can bring financial benefits) is the main goal of attacker in this paper. In the previous section, we described that the congestion in lines will change the price of electricity in the network. Manipulating prices is a good incentive for the attacker to compromise the measurements. In order to manipulate the congestion level in a specific line, the attacker needs to define the group of measurements that can increase or decrease the congestion, then the attacker can insert false data into the measurements. Equation (1), shows that any change in voltage angle can change the transmitted power through the line. For example, any increase/decrease in 4θˆ = (θˆi − θˆj ) will increase/decrease the transmitted power. In online monitoring

(13)

 s.t.

j∈{N }

k(I − HM)za k ≤ ξ, z a (k) = 0 ∀ k ∈ {SM},

where z a (i) is the ith element of attack vector za . Group M and N consist of measurements that increasing and decreasing their value will increase the congestion. Objective of the above optimization is to increase and decrease measurements value in group M and N , respectively. First constraint is for avoiding detection of the attack by bad data detector in state estimator. Group SM shows the safe measurements that can not be compromised (such as those protected by Phasor Measurement Units). With inserting the resulted attack vector z a to the actual values of measurements (z = z0 + za ), the attacker will change the estimated transmitted power in the attacked line. From (13), this change will be (Mi − Mj )T a z . ∆Pˆij = Xij

(15)

While the attacker tries to increase this change, the defender tries to decrease it by defending the measurements that have high risk of being attacked. Changing the estimated power flow in a specific line will increase the chance of changing prices in both sides of the attacked line3 . IV. G AMING B ETWEEN ATTACKER AND D EFENDER In order to protect line L, the defender needs to protect group M and group N . Because the inserted attack will pass the Bad Data Detector in state estimation (first constraint in the 14), the control center should use some other detection methods. For example defender can put some secure measurements into random locations in the network. The main problem in this procedure is that defending all measurements 3 The attacker doesn’t have access to all data such as the submitted prices, generation limits, etc. So with changing the estimated transmitted power desired direction, the attacker increases the chance of creating or releasing congestion in the attacked line.

is not possible. On the other hand, it is impossible for the attacker to attack all measurements. Instead it tries to attack measurements that have the most effect on the state estimator without being detected by the control center. This behavior can be modeled with a zero–sum strategic game between the attacker and the defender. A. Two-Person Zero-Sum Game Between Attacker and Defender Define A = (N , (Si )iR , (Ui )iN ) as a game in which, the defender and the attacker compete to increase and decrease the change of the estimated transmitted power (∆Pˆij ), respectively. In this game, • Players set: R = {1, 2} (the defender and the attacker), •

Attacker’s strategy: to choose measurements to attack.



Strategy set Si : The set of available strategies for player i, S1 = {α CNa }, S2 = {α CNd }, where Na and Nd are the maximum number of measurements that attacker can attack and defender can defend and α CNa is the combination of Na measurement out of α measurement,. Utility: ∆U1 = Pˆij and ∆U2 = −Pˆij for attacker and defender respectively



B. Noncooperative Finite Games: Two–Person Zero–Sum A strategic game is a model of interactive decision-making, in which each decision-maker chooses its plan of action once and for all, and these choices are made simultaneously. For a given (m × n) matrix game A = {aij : i = 1, . . . , m; j = 1, . . . , n}, let {row i∗ , column j ∗ } be a pair of strategies adopted by the players. Then, if the pair of inequalities ai∗ j ≤ ai∗ j ∗ ≤ aij ∗ ,

(16)

is satisfied ∀i, j. The two–person zero–sum game is said to have a saddle point in pure strategies. The strategies {row i∗ , column j ∗ } are said to constitute a saddle–point equilibrium. Or simply, they are said to be saddle–point strategies. The corresponding outcome ai∗ j ∗ of the game is called the saddle–point value. If a two–person zero–sun game possesses a single saddle point, the value of the game is uniquely given by the value of saddle point. However, the mixed strategies are used to obtain an equilibrium solution in matrix games that do not possess a saddle point in pure strategies. A mixed strategy for a player is a probability distribution on the space of his pure strategies. Given an (m×n) matrix game A = {aij : i = 1, . . . , m; j = 1, . . . , n}, the frequencies with which different rows and columns of the matrix are chosen by the defender and the attacker will converge to their respective probability distributions that characterize the strategies. In this way, the average value of the outcome of the game is equal to J(y, w) =

m X n X i=1 j=1

yi aij wj = y0 Aw,

(17)

where y and w are the probability distribution y = (y1 , · · · , ym )0 ,

w = (w1 , · · · , wn )0 .

(18)

The defender wants to minimize J(y, w) by an optimum choice of a probability distribution vector y ∈ Y , while the attacker wants to maximize the same quantity by choosing an appropriate w ∈ W . The sets Y and W are m X

Y = {y ∈ Rm : y ≥ 0,

yi = 1},

(19)

wj = 1}.

(20)

i=1 n X

W = {w ∈ Rn : w ≥ 0,

j=1

Given an (m×n) matrix game A, a vector y∗ is known as a mixed security strategy for the defender if the following inequality holds ∀y ∈ Y : V m (A) , max y∗ 0 Aw ≤ max y0 Aw,

y ∈ Y.

w∈W

w∈W

(21)

And the quantity V m (A) is known as the average security level of the defender. We can also define the average security level of the attacker as V m (A) if the following inequality holds for all w ∈ W : V m (A) , min y0 Aw∗ ≥ min y0 Aw, y∈Y

w ∈ W.

y∈Y

(22)

The two inequalities can also be given as: V m (A) = min max y0 Aw,

V m (A) = max min y0 Aw. W Y (23) However, it always holds true that V m (A) = V m (A) for a two-person zero-sum game in the mixed strategies. In this way, for an (m×n) matrix game A, A has a saddle point in the mixed strategies, and Vm (A) is uniquely given by Vm (A) = V m (A) = V m (A). We can see that if the players are able to use mixed strategies, the matrix games always have a saddle-point solution Vm (A) as the only solution in the zero-sum two-person game. Y

W

C. Computation of A Two-Person Zero-Sum Game One way to get the saddle point in the mixed strategies is to convert the original matrix game into a linear programming (LP) problem. Given A = {aij : i = 1, . . . , m; j = 1, . . . , n} with all entries positive (i.e., aij > 0), the average value of the game in mixed strategies is given by Vm (A) = min max y0 Aw = max min y0 Aw. Y

W

W

Y

(24)

Obviously, Vm (A) must be a positive quantity on A. Furthermore, the expression can also be written as min v1 (y),

(25)

y∈Y

where v1 (y) is defined as v1 (y) = max y0 Aw ≥ y0 Aw, W

∀w ∈ W.

(26)

In addition, it can also be written as A0 y ≤ 1n v1 (y),

0

1n , (1, . . . , 1) ∈ Rn .

(27)

Now the mixed security minimize v1 (y) over Rm ˜ ≥ 0, y = [v1 (y)]−1 , y y/v1 (y). This is further problem

strategy for the defender is to ˜ ≤ 1n , y ˜ 0 1m = subject to A0 y ˜ v1 (y) where y ˜ is defined as y equivalent to the maximization 

0

max y ˜ 1m , y ˜

s.t.

˜ ≤ 1n , A0 y ˜ ≥ 0, y

(28)

which is a standard LP problem. Similarly, we can get the standard LP problem for the attacker  ˜ ≥ 1m , Aw 0 ˜ 1n , s.t. min w (29) ˜ ≥ 0, w w ˜ where w ˜ is defined as w/v2 (w), and v2 , min y0 Aw ≤ Y y0 Aw, ∀y ∈ Y. V. N UMERICAL R ESULTS In this section, we analyze the effect of attack on the PJM 5-bus test system in [12] with a slightly modifications. Transmission lines’ parameters are given in Table I and II. Generators’ and loads’ parameters (including Gmax , Ci , and i Di ) are shown in the Figure 2. Solving (8) for Ex–Ante market shows that L54 (line form B5 to B4 ) is congested. Here attacker chooses L54 to attack. Knowing H, from (13) the attacker obtains Q = [0.2 0.05 0 0.19 0.25 0.04 − 0.04 − 0.08 − 0.13 0.18 0.05]. Positive and negative arrays of this vector correspond to z+ and z− vectors, respectively, T T i.e., z+ = [z1 , z2 , z4 , z5 , z6 , z10 ] and z− = [z7 , z8 , z9 ]. The greater values of Q(i) correspond to measurements that have more effect on Pˆij . Suppose there are 4 insecure measurements {z1 , z3 , z4 , z5 } and the attacker can compromise 2 of them, also the defender can defend 2 measurements simultaneously. So the attacker should choose 2 measurements among these measurements that have more effect on Pˆij and a sufficiently low probability of detection by the defender. In this example, the attacker can choose from strategy set S1 = {z1 z4 , z1 z5 , z1 z3 , z4 z5 , z4 z3 , z5 z3 }, and the defender can choose from strategy set S2 = {z1 z5 , z1 z3 , z4 z5 , z4 z3 , z5 z3 }. It is assumed that if the attacker for example chooses {zi zj } (to attack measurement i and j, i 6= j) and the defender chooses {zi zk } (to defend measurement i and k, i 6= k), compromising {zj } will be successful, and the change in Pˆij is only because of compromising {zj }. If ξ = [5M W , · · · , 5M W ]0(12×1) , solving (14) and (15) gives ∆Pˆ54 = U1 = −U2 . Table III shows the payoffs of the defender (row player) in different strategies, which both the defender and the attacker choose. TABLE I L INE R EACTANCE AND THERMAL LIMIT FOR 5– BUS TEST SYSTEM Line X (%) Fkmax (M W )

L12 2.81 999

L14 3.04 999

L15 0.64 999

L23 1.08 999

L34 2.97 999

L45 2.97 240

Table III shows that min(max) = 2.41, which is not equal row to max( min ) = 0. So there is no ai∗ j ∗ that satisfies (16). column

Fig. 2.

Measurement configuration in PJM 5-bus test system

TABLE II G ENERATION SHIFT FACTORS OF LINES IN 5– BUS TEST SYSTEM PP P Bus B1 B2 B3 B4 B5 Line PP P L1−2 0.1939 -0.476 -0.349 0 0.1595 L1−4 0.4376 0.258 0.1895 0 0.36 L1−5 0.3685 0.2176 0.1595 0 -0.5195 L2−3 0.1939 0.5241 -0.349 0 0.1595 L3−4 0.1939 0.5241 0.6510 0 0.1595 L5−4 0.3685 0.2176 0.1595 0 0.4805

Therefore the game doesn’t have a single saddle point and the problem shifts to finding the proportion of times that the attacker and the defender, play their own strategies. Solving such a game (which does not have a single saddle point) is a linear programming. From (28) defender defines y ˜, we have max

y ˜0 1m ,

 1.13˜ y2 + 1.13˜ y3 + 1.24˜ y4 + 1.24˜ y5 + 2.41˜ y6     2.97˜ y + 2.97˜ y + 1.24˜ y + 4.25˜ y + 1.24˜ y6  1 3 4 5    y1 + 2.76˜ y2 + 2.41˜ y4 + 1.24˜ y5 + 1.24˜ y6  2.76˜ 2.97˜ y1 + 1.13˜ y2 + 4.13˜ y3 + 2.97˜ y5 + 1.13˜ y6 s.t.   2.76˜ y + 3.93˜ y + 1.13˜ y + 2.76˜ y + 1.13˜ y6  1 2 3 4    5.77˜ y + 2.76˜ y + 2.97˜ y + 2.76˜ y + 2.97˜ y5  1 2 3 4   y˜1 , y˜2 , y˜3 , y˜4 , y˜5 , y˜6 ≥ 0,

(30) ≤ 1, ≤ 1, ≤ 1, ≤ 1, ≤ 1, ≤ 1,

which gives y ˜ = [0 0.028 0.168 0.154 0 0.244]. Therefore, ˜ v1 (y) = y ˜ (˜ y=y y0 1m )−1 = [0 0.047 0.283 0.259 0 0.41]. Similarly, solving (29) for the attacker gives w ˜ = [0.397 0 0 0.013 0.025 0.159], and therefore, w = ˜ 1 (w) = w( ˜ w ˜ 0 1m )−1 = [0.669 0 0 0.021 0.043 0.267]. wv Table IV shows the proportion of times that the defender and the attacker should defend and attack different measurements, respectively. As discussed in section III, changing the estimated transmitted power in line L54 can change the prices in either bus 5 or bus 4. In Ex-Post market the control center estimates transmitted power and then knowing dispatch schedule (which is defined in Ex-Ante market) load level in different buses is estimated. This estimated load together with the current state of the network is applied to a DCOPF, and this program defines the real–time prices. If the

w1

P Att. Def. PP P z1 z4 z1 z5 z1 z3 z4 z5 z4 z3 z5 z3

PP y1 y2 y3 y4 y5 y6

z1 z4

z1 z5

z1 z3

z4 z5

z4 z3

z5 z3

0 1.13 1.13 1.24 1.24 2.41

2.97 0 2.97 1.24 4.25 1.24

2.76 2.76 0 2.41 1.24 1.24

2.97 1.13 4.13 0 2.97 1.13

2.76 3.93 1.13 2.76 0 1.13

5.77 2.76 2.97 2.76 2.97 0

TABLE IV P ROPORTION OF TIMES THAT THE ATTACKER AND THE DEFENDER PLAY THEIR STRATEGIES

wi yi

i=1 {z1 z4 } 0.67 0

i=2 {z1 z5 } 0 0.05

i=3 {z1 z3 } 0 0.28

i=4 {z4 z5 } 0.02 0.26

i=5 {z4 z3 } 0.04 0

i=6 {z5 z3 } 0.27 0.41

prices in the desired direction (decreasing in this example) in 69% of cases, is successful. 36

32 30 28 26 24 22 20 18

operating condition (such as the load level) has not changed and there is no error in the measurements, the real–time prices should be the same as the Ex-Ante prices. Here without loss of generality, we assume that the actual load level doesn’t change and any change in the estimated load level is because of bad data injection to the state estimator. Figure 3 shows the prices for the case that the attacker compromise z1 z4 and the defender defends z5 z3 . Table IV shows that, the attacker will not attack z1 z5 and z1 z3 , and the defender will not defend z1 z4 and z4 z3 ; Considering this fact, the effect of game on the price of bus 5, under different attack and defend scenarios, is give in table V. This table shows that in this case study, the attacher is PRICE CHANGE

TABLE V (4LM P ) AT BUS 5 IN DIFFERENT ATTACK AND DEFEND SCENARIOS ( IN $/M W ).

P Att. z1 z4 Def. PP P z1 z5 10 z1 z3 10 z4 z5 10 z5 z3 10

PP

z4 z5

z4 z3

z5 z3

10 10 0 10

10 10 0 10

0 10 0 0

able to change the prices in almost 69% of the cases4 . VI. C ONCLUSION In this paper, first we analyzed the effect of compromising each measurement on the state estimator results. Compromising these measurements can change the congestion and consequently the price of electricity, and thus, the attacker has an intensive to change the congestion in the desired direction. Since a typical power system has a huge number of measurements, attacking or defending all of those becomes impossible for attacker and defender, respectively. To this end, this behavior is modeled and analyzed in the framework of game theory. The simulation results on PJM 5–Bus test system indicate that, in the specified load level, changing the 4 The attacker does not know the results of the real–time market before publishing the results by the control center. So, it can’t play the game based on Table V. Instead, using Pˆij as the pay–off, the attacker increases the chance of changing congestion in its desired direction (increasing or decreasing the congestion).

LMP Ex−Ante (No Attack) LMP Ex−Post (Attacked)

34

Locational Marginal Price ($/MWh)

TABLE III ATTACKER AND THE D EFENDER w2 w3 w4 w5 w6

ZERO – SUM GAME BETWEEN THE

1

2

3

4

5

Bus Number

Fig. 3. Locational Marginal Prices for PJM 5-Bus test system for both with attack and without attack

R EFERENCES [1] T. F. Garrity, “Getting Smart,” IEEE Power and Energy Magazine, vol. 6, no. 2, pp. 38–45, March–April 2008. [2] A. Monticelli, “Electric Power System State Estimation,” Proceedings of IEEE, vol. 88, no. 2, pp. 262–282, Feb. 2000. [3] X. Fang. S. Misra, G. Xue, and D. Yang, “Smart Grid – The New and Improved Power Grid: A Survey,” IEEE Communications Surveys & Tutorials, no. 99, pp. 1–37. [4] H. E. Brown and S. Suryanarayanan, “A Survey Seeking a Defenition of a Smart Distribution System,” North American Power Symposium 2009, pp. 1–7, 2009. [5] S. Rohjansand, M. Uslar, R. Bleiker, J. Gonz´ alez, M. Specht, T. Suding, and T. Weidelt., “Survey of Smart Grid Standardization Studies and Recommendations,” Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, Oldenburg, Germany, Oct. 2010. [6] Y. Liu, M. K. Reiter, and P. Ning, “False data injection attacks against state estimation in electric power grids,” the 16th ACM conference on Computer and communications security., Nov. 2009. [7] M. Esmalifalak, H. Nguyen, R. Zheng, and Z. Han “Stealth False Data Injection using Independent Component Analysis in Smart Grid”, Second IEEE second conference on smart grid Communications, Brussels, Belgium, Oct. 2011. [8] A. R. Metke and R. L. Ekl, “Smart Grid Security Technology,” Innovative Smart Grid Technologies (ISGT), 2010, Schaumburg, IL, USA, Jan. 2010. [9] G. Chen, Z. Y. Dong, D. J. Hill, and Y. S. Xue, “Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks,” IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 1000–1009, Aug. 2011. [10] A. J. Wood and B. F. Wollenberg, Power Generation, Operation, and Control, Wiley New York et al., 1996. [11] A. Abur and A. G. Exposito, Power System State Estimation: Theory and Implementation, Marcel Dekker, Inc., 2004. [12] F. Li, and R. Bo “Small Test Systems for Power System Economic Studies,” Power and Energy Society General Meeting, Minneapolis, Minnesota USA, Jul. 2010. [13] F. Li and R. Bo, “DCOPF-Based LMP Simulation: Algorithm, Comparison with ACOPF, and Sensitivity,” IEEE Trans. Power Syst., vol. 22, no. 4, pp. 1475–1485, Nov. 2007. [14] F. Li, J. Pan, and H. Chao, “Marginal Loss Calculation in Competitive Electrical Energy Markets,” in Proc. 2004 IEEE Int. Conf. Electric Utility Deregulation, Restructuring and Power Technologies 2004 (DRPT 2004), Apr. 2004, vol. 1, pp. 205–209. [15] E. Litvinov, T. Zheng, G. Rosenwald, and P. Shamsollahi, “Marginal loss modeling in LMP calculation,” IEEE Trans. Power Syst., vol. 19, no. 2, pp. 880–888, May 2004.

Attack Against Electricity Market–Attacker and Defender ...

security for smart grid [6], [7], [8], [9]. In [6], an undetectable attack by bad data detectors (BDD) was first introduced, where the attacker knows the state estimation Jacobian matrix. (H) and defines an undetectable attack using this matrix. [7] uses independent component analysis (ICA), and inserts an undetectable attack even ...

433KB Sizes 1 Downloads 40 Views

Recommend Documents

Zero-Sum Defender: Fast and Space-Efficient Defense against Return ...
IEICE TRANS. FUNDAMENTALS, VOL.E97–A, NO.1 JANUARY 2014. 303. LETTER Special Section on Cryptography and Information Security. Zero-Sum ...

NET 3.5 - Pollution Attack: A New Attack Against ...
may be obtained from 1-hop beacons by receiving the location of beacon and measuring the distance between them (e.g., through measuring received signal strength indicator (RSSI). [14] or time difference of arrival (TDoA) [15]), also may be obtained f

Fred Reinfeld Attack And counter attack in chess.Pdf
desarrollando diferentes proyectos e ideas. Tenemos miembros .... Pdf. Fred Reinfeld Attack And counter attack in chess.Pdf. Open. Extract. Open with. Sign In.

Electricity and Electronics.pdf
resistance of IQ and 211 respectively are. connected in ... A sinusoidal carrier voltage of frequency 5 ... Displaying Electricity and Electronics.pdf. Page 1 of 4.

Electricity and Electronics.PDF
Term-End Examination ... (b) A 50 kVA, single phase transformer has. 500 turns on the primary and 100 turns on. the secondary. The primary is connected to. 2100 V, 50 Hz supply. ... How do you convert a given galvanometer ... inductance. 5.

Public Defender Audit FY13.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Public Defender ...

Amazing Adwords Attack-www.InstantStressManagement.com.pdf ...
Amazing Adwords Attack-www.InstantStressManagement.com.pdf. Amazing Adwords Attack-www.InstantStressManagement.com.pdf. Open. Extract. Open with.

Electricity - Learnbps
As parents and teachers, we realize it can be hard to get a child to discuss what he or she is learning in school. We hope the information provided on this page ...

Electricity Generating
Dec 4, 2017 - จากการไม่มีก าลังการผลิตใหม่ๆในปี 2561 การเติบโตก าไรของ. บริษัทจึงไม่น่าตื่นเต้นมากนà

sepa-defender-su-fe.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Union Defender August 2014.pdf
and in bloody fighting near the town of Jones- borough on August 31 the Confederates were. repulsed. ... roar of conflict. ... Union Defender August 2014.pdf.

defender rear step topix.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. defender rear step topix.pdf. defender rear step topix.pdf. Open.

man-6\defender-otterbox.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. man-6\defender-otterbox.pdf. man-6\defender-otterbox.pdf. Open.

PUBLIC DEFENDER 1.pdf
Whoops! There was a problem loading more pages. PUBLIC DEFENDER 1.pdf. PUBLIC DEFENDER 1.pdf. Open. Extract. Open with. Sign In. Details.

Nuclear Attack
... Nuclear Attack Be Launched. Page 2 of 2. 1499609635163atomicattackmedicinalguidingprinciplec ... tenceoutlinesympathizewithtothepublicrobustness.pdf.

Operation Attack News - Apr2016
1310 22nd Avenue South St. Petersburg, FL 33705 (727) 822-1187 ... Sanderlin IB World School for “Soxtober,” a school-wide sock drive that collected 900.