2019
DOI: 10.1109/access.2019.2899293
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Cyber Attacks on Electricity Market Using Mathematical Programming With Equilibrium Constraints

Abstract: With the development of communication infrastructure in smart grids, cyber security reinforcement has become one of the most challenging issues for power system operators. In this paper, an attacker is considered a participant in the virtual bidding procedure in the day-ahead (DA) and realtime (RT) electricity markets to maximize its profit. The cyber attacker attempts to identify the optimal power system measurements to attack along with the false data injected into measurement devices. Towards the maximum pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…Constraint (10) provides the lower and upper bounds of the UTC bidding capacity on each path, which are specified to avoid the potential unbounded solutions when solving the optimization problem. The properties of the non-increasing UTC bidding curve are taken into account in constraints (11) and (12). Constraint (11) means that the values of , , and , , should be equal if the UTC bidding prices in scenario and are the same.…”
Section: Stochastic Optimization Model For Generating Utc Bidding Curvesmentioning
confidence: 99%
See 3 more Smart Citations
“…Constraint (10) provides the lower and upper bounds of the UTC bidding capacity on each path, which are specified to avoid the potential unbounded solutions when solving the optimization problem. The properties of the non-increasing UTC bidding curve are taken into account in constraints (11) and (12). Constraint (11) means that the values of , , and , , should be equal if the UTC bidding prices in scenario and are the same.…”
Section: Stochastic Optimization Model For Generating Utc Bidding Curvesmentioning
confidence: 99%
“…Constraint (11) means that the values of , , and , , should be equal if the UTC bidding prices in scenario and are the same. Constraint (12) ensures that UTC bidding curve is non-increasing, which indicates the UTC bidding capacity decreases with the DA transmission price of the path, and in this circumstance, if the expected DA transmission price on the path is too high, the corresponding UTC bidding capacity might be zero.…”
Section: Stochastic Optimization Model For Generating Utc Bidding Curvesmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors did extensive research on the analysis of different types of cyber-attacks like denial-of-service attack, false data injection attack, and man-in-the-middle attack in CPPS and shown the jeopardize of stability [35][36][37]. To protect the complex power grid control networks of CPPS, it is necessary to perform the risk and vulnerability assessment under cyber-attacks [38][39][40]. The various methods of risk [41][42][43][44] and vulnerability assessment [45][46][47][48] from the component level to systemwide impacts, with cyber model assessment and physical model assessment, are performed.…”
mentioning
confidence: 99%