67
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Bad Data Injection Attack and Defense in Electricity Market using Game Theory Study

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems. This paper specifies the effect of compromising each measurement on the price of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing). Attacking and defending all measurements are impossible for the attacker and defender, respectively. This situation is modeled as a zero sum game between the attacker and defender. The game defines the proportion of times that the attacker and defender like to attack and defend different measurements, respectively. From the simulation results based on the PJM 5 Bus test system, we can show the effectiveness and properties of the studied game.

          Related collections

          Most cited references28

          • Record: found
          • Abstract: not found
          • Article: not found

          Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Smart Grid — The New and Improved Power Grid: A Survey

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              False data injection attacks against state estimation in electric power grids

                Bookmark

                Author and article information

                Journal
                1210.3252

                Theoretical computer science,Applications,Security & Cryptology
                Theoretical computer science, Applications, Security & Cryptology

                Comments

                Comment on this article