Bid Modification Attack in Smart Grid for Monetary Benefits
dc.contributor.author | Khanna, Kush | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Panigrahi, Bijaya Ketan | |
dc.date.accessioned | 2018-10-17T16:39:34Z | |
dc.date.available | 2018-10-17T16:39:34Z | |
dc.date.issued | 2016-12-19 | |
dc.description | 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS) | en_US |
dc.description.abstract | In the quest for reliability and automation, the entire smart grid operation and control depends on the communication infrastructure. This reliance on the information and communication technologies has also opened up possibilities of cyber intrusions. In this paper, a bid modification attack on the power exchange server is presented with the aim of gaining monetary benefits in the real-time power market. The attack is modelled for PJM 5 bus and IEEE 14 bus test system. The minimum number of load bids required to be changed for launching the attack is obtained and impacts on real time locational marginal prices (LMPs) are presented. | en_US |
dc.description.uri | https://ieeexplore.ieee.org/document/7829557 | en_US |
dc.format.extent | 6 pages | en_US |
dc.genre | conference paper pre-print | en_US |
dc.identifier | doi:10.13016/M22V2CD9X | |
dc.identifier.citation | Kush Khanna, Bijaya Ketan Panigrahi, Anupam Joshi, "Bi-level modelling of false data injection attacks on security constrained optimal power flow", Generation Transmission & Distribution IET, vol. 11, no. 14, pp. 3586-3593, 2017, DOI: 10.1109/iNIS.2016.059 | en_US |
dc.identifier.uri | 10.1109/iNIS.2016.059 | |
dc.identifier.uri | http://hdl.handle.net/11603/11578 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2016 IEEE | |
dc.subject | Real-time systems | en_US |
dc.subject | Generators | en_US |
dc.subject | Schedules | en_US |
dc.subject | Mathematical model | en_US |
dc.subject | Load modeling | en_US |
dc.subject | Power transmission lines | en_US |
dc.subject | power engineering computing | en_US |
dc.subject | power markets | en_US |
dc.subject | security of data | en_US |
dc.subject | smart power grids | en_US |
dc.subject | bid modification attack | en_US |
dc.subject | Cyber security | en_US |
dc.subject | false data injection | en_US |
dc.subject | power systems | en_US |
dc.subject | state estimation | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.title | Bid Modification Attack in Smart Grid for Monetary Benefits | en_US |
dc.type | Text | en_US |