Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study
Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems. This paper specifies the effect of compromising each measure...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on smart grid 2013-03, Vol.4 (1), p.160-169 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 169 |
---|---|
container_issue | 1 |
container_start_page | 160 |
container_title | IEEE transactions on smart grid |
container_volume | 4 |
creator | Esmalifalak, M. Ge Shi Zhu Han Lingyang Song |
description | Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems. This paper specifies the effect of compromising each measurement on the price of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing). Attacking and defending all measurements are impossible for the attacker and defender, respectively. This situation is modeled as a zero-sum game between the attacker and defender. The game defines the proportion of times that the attacker and defender like to attack and defend different measurements, respectively. From the simulation results based on the PJM 5-Bus test system, we can show the effectiveness and properties of the studied game. |
doi_str_mv | 10.1109/TSG.2012.2224391 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_6410468</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6410468</ieee_id><sourcerecordid>3931702541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c333t-adc815f96abbbb15c211c081c6758d9dbf925e76a86d0802bac4dd9f66d0c453</originalsourceid><addsrcrecordid>eNo9UE1PAjEUbIwmEuRu4qWJ58W-dtvdHhERSTAeWM9Nabu6fOxiWw777y2BMJf3XmbmTTIIPQIZAxD5Uq3mY0qAjimlOZNwgwYgc5kxIuD2unN2j0YhbEgCY0xQOUCrV23xm44aL9qNM7HpWjyJUZst1m1iXO3a4HDT4tku0b4xTezxp_ZbF_F3aNofPNd7h6tf1_ker-LR9g_orta74EaXOUTV-6yafmTLr_liOllmJqXHTFtTAq-l0OsE4IYCGFKCEQUvrbTrWlLuCqFLYUlJ6Fqb3FpZi3SanLMhej6_Pfju7-hCVJvu6NuUqKDgkuW8IEVSkbPK-C4E72p18M1e-14BUafyVCpPncpTl_KS5elsaZxzV7nIgeSiZP9Demml</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1759345707</pqid></control><display><type>article</type><title>Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study</title><source>IEEE Electronic Library (IEL)</source><creator>Esmalifalak, M. ; Ge Shi ; Zhu Han ; Lingyang Song</creator><creatorcontrib>Esmalifalak, M. ; Ge Shi ; Zhu Han ; Lingyang Song</creatorcontrib><description>Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems. This paper specifies the effect of compromising each measurement on the price of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing). Attacking and defending all measurements are impossible for the attacker and defender, respectively. This situation is modeled as a zero-sum game between the attacker and defender. The game defines the proportion of times that the attacker and defender like to attack and defend different measurements, respectively. From the simulation results based on the PJM 5-Bus test system, we can show the effectiveness and properties of the studied game.</description><identifier>ISSN: 1949-3053</identifier><identifier>EISSN: 1949-3061</identifier><identifier>DOI: 10.1109/TSG.2012.2224391</identifier><identifier>CODEN: ITSGBQ</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Electricity ; Game theory ; Games ; please supply index terms/keywords for your paper. To download the IEEE Taxonomy go to http://www.ieee.org/documents/2009Taxonomy_v101.pdf. ; query-in-text message="Author ; Real-time systems ; Smart grids ; Transmission line measurements ; Vectors</subject><ispartof>IEEE transactions on smart grid, 2013-03, Vol.4 (1), p.160-169</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Mar 2013</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c333t-adc815f96abbbb15c211c081c6758d9dbf925e76a86d0802bac4dd9f66d0c453</citedby><cites>FETCH-LOGICAL-c333t-adc815f96abbbb15c211c081c6758d9dbf925e76a86d0802bac4dd9f66d0c453</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6410468$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6410468$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Esmalifalak, M.</creatorcontrib><creatorcontrib>Ge Shi</creatorcontrib><creatorcontrib>Zhu Han</creatorcontrib><creatorcontrib>Lingyang Song</creatorcontrib><title>Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study</title><title>IEEE transactions on smart grid</title><addtitle>TSG</addtitle><description>Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems. This paper specifies the effect of compromising each measurement on the price of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing). Attacking and defending all measurements are impossible for the attacker and defender, respectively. This situation is modeled as a zero-sum game between the attacker and defender. The game defines the proportion of times that the attacker and defender like to attack and defend different measurements, respectively. From the simulation results based on the PJM 5-Bus test system, we can show the effectiveness and properties of the studied game.</description><subject>Electricity</subject><subject>Game theory</subject><subject>Games</subject><subject>please supply index terms/keywords for your paper. To download the IEEE Taxonomy go to http://www.ieee.org/documents/2009Taxonomy_v101.pdf.</subject><subject>query-in-text message="Author</subject><subject>Real-time systems</subject><subject>Smart grids</subject><subject>Transmission line measurements</subject><subject>Vectors</subject><issn>1949-3053</issn><issn>1949-3061</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9UE1PAjEUbIwmEuRu4qWJ58W-dtvdHhERSTAeWM9Nabu6fOxiWw777y2BMJf3XmbmTTIIPQIZAxD5Uq3mY0qAjimlOZNwgwYgc5kxIuD2unN2j0YhbEgCY0xQOUCrV23xm44aL9qNM7HpWjyJUZst1m1iXO3a4HDT4tku0b4xTezxp_ZbF_F3aNofPNd7h6tf1_ker-LR9g_orta74EaXOUTV-6yafmTLr_liOllmJqXHTFtTAq-l0OsE4IYCGFKCEQUvrbTrWlLuCqFLYUlJ6Fqb3FpZi3SanLMhej6_Pfju7-hCVJvu6NuUqKDgkuW8IEVSkbPK-C4E72p18M1e-14BUafyVCpPncpTl_KS5elsaZxzV7nIgeSiZP9Demml</recordid><startdate>20130301</startdate><enddate>20130301</enddate><creator>Esmalifalak, M.</creator><creator>Ge Shi</creator><creator>Zhu Han</creator><creator>Lingyang Song</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope></search><sort><creationdate>20130301</creationdate><title>Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study</title><author>Esmalifalak, M. ; Ge Shi ; Zhu Han ; Lingyang Song</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c333t-adc815f96abbbb15c211c081c6758d9dbf925e76a86d0802bac4dd9f66d0c453</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Electricity</topic><topic>Game theory</topic><topic>Games</topic><topic>please supply index terms/keywords for your paper. To download the IEEE Taxonomy go to http://www.ieee.org/documents/2009Taxonomy_v101.pdf.</topic><topic>query-in-text message="Author</topic><topic>Real-time systems</topic><topic>Smart grids</topic><topic>Transmission line measurements</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Esmalifalak, M.</creatorcontrib><creatorcontrib>Ge Shi</creatorcontrib><creatorcontrib>Zhu Han</creatorcontrib><creatorcontrib>Lingyang Song</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on smart grid</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Esmalifalak, M.</au><au>Ge Shi</au><au>Zhu Han</au><au>Lingyang Song</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study</atitle><jtitle>IEEE transactions on smart grid</jtitle><stitle>TSG</stitle><date>2013-03-01</date><risdate>2013</risdate><volume>4</volume><issue>1</issue><spage>160</spage><epage>169</epage><pages>160-169</pages><issn>1949-3053</issn><eissn>1949-3061</eissn><coden>ITSGBQ</coden><abstract>Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have serious technical and economical problems. This paper specifies the effect of compromising each measurement on the price of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing). Attacking and defending all measurements are impossible for the attacker and defender, respectively. This situation is modeled as a zero-sum game between the attacker and defender. The game defines the proportion of times that the attacker and defender like to attack and defend different measurements, respectively. From the simulation results based on the PJM 5-Bus test system, we can show the effectiveness and properties of the studied game.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TSG.2012.2224391</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1949-3053 |
ispartof | IEEE transactions on smart grid, 2013-03, Vol.4 (1), p.160-169 |
issn | 1949-3053 1949-3061 |
language | eng |
recordid | cdi_ieee_primary_6410468 |
source | IEEE Electronic Library (IEL) |
subjects | Electricity Game theory Games please supply index terms/keywords for your paper. To download the IEEE Taxonomy go to http://www.ieee.org/documents/2009Taxonomy_v101.pdf. query-in-text message="Author Real-time systems Smart grids Transmission line measurements Vectors |
title | Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T21%3A18%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Bad%20Data%20Injection%20Attack%20and%20Defense%20in%20Electricity%20Market%20Using%20Game%20Theory%20Study&rft.jtitle=IEEE%20transactions%20on%20smart%20grid&rft.au=Esmalifalak,%20M.&rft.date=2013-03-01&rft.volume=4&rft.issue=1&rft.spage=160&rft.epage=169&rft.pages=160-169&rft.issn=1949-3053&rft.eissn=1949-3061&rft.coden=ITSGBQ&rft_id=info:doi/10.1109/TSG.2012.2224391&rft_dat=%3Cproquest_RIE%3E3931702541%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1759345707&rft_id=info:pmid/&rft_ieee_id=6410468&rfr_iscdi=true |