Document

Modeling and Detection of Future Cyber-Enabled DSM Data Attacks

About this Digital Document

Demand-Side Management (DSM) is an essential tool to ensure power system reliability and stability. In future smart grids, certain portions of a customer’s load usage could be under the automatic control of a cyber-enabled DSM program, which selectively schedules loads as a function of electricity prices to improve power balance and grid stability. In this scenario, the security of DSM cyberinfrastructure will be critical as advanced metering infrastructure and communication systems are susceptible to cyber-attacks. Such attacks, in the form of false data injections, can manipulate customer load profiles and cause metering chaos and energy losses in the grid. The feedback mechanism between load management on the consumer side and dynamic price schemes employed by independent system operators can further exacerbate attacks. To study how this feedback mechanism may worsen attacks in future cyber-enabled DSM programs, we propose a novel mathematical framework for (i) modeling the nonlinear relationship between load management and real-time pricing, (ii) simulating residential load data and prices, (iii) creating cyber-attacks, and (iv) detecting said attacks. In this framework, we first develop time-series forecasts to model load demand and use them as inputs to an elasticity model for the price-demand relationship in the DSM loop. This work then investigates the behavior of such a feedback loop under intentional cyber-attacks. We simulate and examine load-price data under different DSM-participation levels with three types of random additive attacks: ramp, sudden, and point attacks. We conduct two investigations for the detection of DSM attacks. The first studies a supervised learning approach, with various classification models, and the second studies the performance of parametric and nonparametric change point detectors. Results conclude that higher amounts of DSM participation can exacerbate ramp and sudden attacks leading to better detection of such attacks, especially with supervised learning classifiers. We also find that nonparametric detection outperforms parametric for smaller user pools, and random point attacks are the hardest to detect with any method.

Contributor(s)
Publisher
MDPI AG
Date Issued
2020-08-21
Language
English
Type
Genre
Form
electronic document
Media type
Creator role
Faculty
Identifier
1996-1073
Has this item been published elsewhere?
Volume
13
Volume
17
Hatalis, . K., Zhao, . C., Venkitasubramaniam, . P., Snyder, . L., Kishore, . S., & Blum, . R. S. (2020). (Vols. 17). https://doi.org/10.3390/en13174331
Hatalis, Kostas, Chengbo Zhao, Parv Venkitasubramaniam, Larry Snyder, Shalinee Kishore, and Rick S. Blum. 2020. https://doi.org/10.3390/en13174331.
Hatalis, Kostas, et al. 21 Aug. 2020, https://doi.org/10.3390/en13174331.