2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017
DOI: 10.1109/dsn.2017.60
|View full text |Cite
|
Sign up to set email alerts
|

Compromising Security of Economic Dispatch in Power System Operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…In this work, we focus on intelligent adversaries causing physical damage by disrupting control operations, usually formulated in optimization problems. Compared to random disruptions, these attacks, determined based on theoretical analysis of control operations, can introduce severe physical damage without raising alerts [19], [61].…”
Section: Appendix B Generalization Of Decoy Data Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this work, we focus on intelligent adversaries causing physical damage by disrupting control operations, usually formulated in optimization problems. Compared to random disruptions, these attacks, determined based on theoretical analysis of control operations, can introduce severe physical damage without raising alerts [19], [61].…”
Section: Appendix B Generalization Of Decoy Data Constructionmentioning
confidence: 99%
“…In FDIAs, adversaries' objectives are to minimize estimation errors, with compromised measurements leading to wrongly estimated system state (i.e., z + a in the figure). In another attack that disrupts optimal power flow analysis, adversaries can maximize the costs of power generation instead of minimizing them, to reduce economical revenues [19], [61].…”
Section: Appendix B Generalization Of Decoy Data Constructionmentioning
confidence: 99%
“…These blocks include state estimation, optimal power flow and economic dispatch. The structure of EMS and associated operator actions are shown 2009 FDIA DC SE [39] 2010 FDIA Locational Marginal Price [88] 2011 PMU Code injection [75] 2011 Load Redistribution Attack [50] 2011 FDIA DC SE incomplete information [43] 2012 FDIA DC SE incomplete information [44] 2012 FDIA AC SE [41] 2012 FDIA Distributed Energy Routing [84] 2013 Topology Attacks [61] 2013 PMU GPS Time Sync Attack [72] 2014 Load Redistribution incomplete information [52] 2014 Attack against AGC [66] 2014 Data Attack volt/VAR control [70] 2014 IEC61850 Attacks [76] 2014 Switching Attacks [78] 2015 FDIA AMI [80] 2015 FDIA Residential Load Control [83] 2015 FDIA Microgrid Partition [85] 2016 FDIA + Topology Attacks [60] 2016 Co-oridnated Attacks [63] 2016 PMU Packet Drop Attack [73] 2016 FDIA Multistep Electricity price [89] 2017 FDIA AC SE incomplete information [42] 2017 FDIA Dynamic SE [47], [90] 2017 FDIA Security Constrained OPF [48] 2017 FDIA Economic Dispatch [49] 2017 FDIA Rotor Angle Stability [65] 2017 FDIA Automatic Generation Control [68] 2018 FDIA Automatic Voltage Control [69] 2018 DoS Attack Mircogrid [87] 2018 FDIA FACTS devices [71] 2019 FDIA Microgrid Distributed Load Sharing [91] Fig. 2: Chronology of benchmark papers in cyber attack design and impact on power systems [2009][2010][2011][2012]…”
Section: Attacks On Steady State Controlmentioning
confidence: 99%
“…General assumptions to carry out successful attacks include (1) availability of complete or partial system topology and Jacobian matrix, (2) non-attackable zero-injection buses, (3) nonattackable generator measurements or attackable small distributed generators, (4) access to dynamic line limit monitoring devices, meter measurements and meter ID mapping in EMS and (5) available historical load, generation capacity, cost, dispatch sequences and locational marginal price data [38]- [41], [43]- [46], [49], [52], [64].…”
Section: A Static State Estimationmentioning
confidence: 99%
See 1 more Smart Citation