4.7 Article

Market-Level Defense Against FDIA and a New LMP-Disguising Attack Strategy in Real-Time Market Operations

Journal

IEEE TRANSACTIONS ON POWER SYSTEMS
Volume 36, Issue 2, Pages 1419-1431

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPWRS.2020.3020870

Keywords

State estimation; Transmission line measurements; Cyberattack; Electricity supply industry; Topology; Load modeling; Real-time systems; False data injection attack (FDIA); critical load level (CLL); LMP-disguising attack; electricity market; bad data detection

Funding

  1. US Department of Energy (DOE) CEDS Project Watching Grid Infrastructure Stealthily Through Proxies (WISP) [DE-OE0000899]
  2. US NSF/DOE Engineering Research Center under NSF [EEC-1041877]

Ask authors/readers for more resources

Traditional cyberattack strategies focused on bypassing data detections in the electricity market can be detected by experienced operators during real-time operations. By using the concept of critical load level, risky periods with abnormal pricing mechanisms can be identified to prevent oversight by operators.
Traditional cyberattack strategies on the electricity market only consider bypassing bad data detections. However, our analysis shows that experienced market operators can detect abnormal locational marginal prices (LMPs) under the traditional attack model during real-time (RT) operations, because such attack model ignores the characteristics of the LMP itself and leads to price spikes that can be an easy-to-detect signal of abnormality. A detection approach based on the concept of critical load level (CLL) is used to help operators identify risky periods when operators would be prone to overlooking abnormal LMPs. During safe periods, the abnormal LMPs are identified according to the operator's experience, while in risky CLL intervals, a N-x cyber contingency analysis is proposed to help independent system operators (ISOs) detect abnormal LMPs. Further, this paper constructs a new type of cyberattack strategy capable of not only bypassing bad data detection in the state estimation stage but also disguising the compromised LMPs as regular LMPs to avoid market operators' alerts in a realistic scenario wherein the attacker has imperfect information on system topology. Finally, the proposed analysis method and the attack strategy are evaluated through numerical studies on the PJM 5-bus system and the IEEE 118-bus system.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available