Impact of Integrity Attacks on Real-time Pricing in Smart Grids Rui - - PowerPoint PPT Presentation

β–Ά
impact of integrity attacks on real time pricing in smart
SMART_READER_LITE
LIVE PREVIEW

Impact of Integrity Attacks on Real-time Pricing in Smart Grids Rui - - PowerPoint PPT Presentation

Impact of Integrity Attacks on Real-time Pricing in Smart Grids Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew Kalbarczyk Presented by: Tianyuan Liu 10/27/2016 Background Real-time Pricing (RTP) in Smart Grid Balance the


slide-1
SLIDE 1

Impact of Integrity Attacks on Real-time Pricing in Smart Grids

Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew Kalbarczyk Presented by: Tianyuan Liu 10/27/2016

slide-2
SLIDE 2

Background

Real-time Pricing (RTP) in Smart Grid

  • Balance the demand and supply
  • (Smart) consumers behave differently under different prices

2

Day-ahead predicted price Real-time price

slide-3
SLIDE 3

Quick Model & Solution

  • Supply

𝑑 πœ‡ = βˆ‘ 𝑑%(πœ‡)

  • %
  • Demand

d πœ‡ = βˆ‘ 𝑓%(πœ‡)

  • %

+ π‘π‘π‘‘π‘“π‘šπ‘—π‘œπ‘“%

3

slide-4
SLIDE 4

Quick Model & Solution

  • Minimize the scheduling error

min

34 𝑑 πœ‡5 βˆ’ 𝑒 πœ‡5

𝑑 πœ‡5 ← 𝑒 πœ‡59:

4

πœ‡5 = 𝑑9:(𝑒 πœ‡59: )

slide-5
SLIDE 5

Unstable RTP

5

slide-6
SLIDE 6

Unstable RTP

6

slide-7
SLIDE 7

Unstable RTP

7

𝑑 πœ‡5 ← 𝑒 πœ‡59:

slide-8
SLIDE 8

Unstable RTP

8

slide-9
SLIDE 9

Unstable RTP

9

slide-10
SLIDE 10

Unstable RTP

10

slide-11
SLIDE 11

Unstable RTP Summary

Diverging price may lead to

  • Overloaded power network
  • Wasted power
  • Increased operational cost

System vulnerable to integrity attacks

  • False data injection
  • Take down the whole Smart Grid system

11

slide-12
SLIDE 12

Stabilizing RTP

Control-theoretic approach

  • Stabilizing the scheduling error
  • Scheduling error ~ supply – elastic demand

12

slide-13
SLIDE 13

Stabilizing RTP

πœ‡5 = πœ‡59: + 2πœƒ 𝑔 πœ‡> (𝑑59: βˆ’ 𝑓59:)

13

slide-14
SLIDE 14

Integrity Attack Models

Scaling attack

  • Inject false price value
  • πœ‡5 β†’ π›Ώπœ‡5
  • 0 < 𝛿 < 1, decreased price -> increased demand
  • 𝛿 > 1, increased price -> decreased demand

Delay attack

  • Use old price information
  • πœ‡5 β†’ πœ‡59E

14

slide-15
SLIDE 15

Analytic Results – Scaling Attack

15

  • 𝛿: scaling factor
  • 𝜍: ratio of compromised smart meters
  • β„Ž β‰œ IΜ‡(3K)

L̇(3K) : marginal demand-supply ratio at fixed operating point

Region of stability

slide-16
SLIDE 16

Analytic Results – Delay Attack

16

  • 𝜐: delay (hours)
  • 𝜍: ratio of compromised smart meters
  • β„Ž β‰œ IΜ‡(3K)

L̇(3K) : marginal demand-supply ratio at fixed operating point

slide-17
SLIDE 17

Simulation

17

GridLAB-D

  • Physical characteristics
  • 1405 consumers
  • Simulating consumers with/without attacks

Results

  • The system is stable without attack or with weak attack
  • The system can be destabilized only if attackers are super strong (large 𝜍, 𝜐

and small 𝛿)

slide-18
SLIDE 18

Discussion

18

Contributions

  • Comprehensive theoretical analysis
  • Good resilience under attacks

Limitations

  • Simple Model? Less important security issue?

Results too good? Or not a problem to worry about? How do you like the idea of applying control-theoretic approach here?