Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems
As the penetration rate of flexible loads and Distributed Energy Resources in the distribution networks increases, congestion management techniques that utilize Demand Side Management (DSM) have been developed. These are indirect methods that rely on information exchange between the Distribution Net...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , , |
| التنسيق: | article |
| منشور في: |
2021
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | http://hdl.handle.net/11073/21633 |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513437558636544 |
|---|---|
| author | Mohammed, Omniyah Gul |
| author2 | El-Saadany, Ehab Youssef, Amr Shaaban, Mostafa |
| author2_role | author author author |
| author_facet | Mohammed, Omniyah Gul El-Saadany, Ehab Youssef, Amr Shaaban, Mostafa |
| author_role | author |
| dc.creator.none.fl_str_mv | Mohammed, Omniyah Gul El-Saadany, Ehab Youssef, Amr Shaaban, Mostafa |
| dc.date.none.fl_str_mv | 2021-03 2022-02-08T12:38:40Z 2022-02-08T12:38:40Z |
| dc.format.none.fl_str_mv | application/pdf |
| dc.identifier.none.fl_str_mv | O. G. M. Khan, E. F. El-Saadany, A. Youssef and M. F. Shaaban, "Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems," in IEEE Transactions on Industrial Informatics, vol. 17, no. 12, pp. 8142-8153, Dec. 2021, doi: 10.1109/TII.2021.3065714. 1941-0050 http://hdl.handle.net/11073/21633 10.1109/TII.2021.3065714 |
| dc.language.none.fl_str_mv | en_US |
| dc.publisher.none.fl_str_mv | IEEE |
| dc.relation.none.fl_str_mv | https://doi.org/10.1109/TII.2021.3065714 |
| dc.subject.none.fl_str_mv | Cyber security Load Altering Attack (LAA) Congestion Management Optimization |
| dc.title.none.fl_str_mv | Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems |
| dc.type.none.fl_str_mv | Peer-Reviewed Postprint info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/article |
| description | As the penetration rate of flexible loads and Distributed Energy Resources in the distribution networks increases, congestion management techniques that utilize Demand Side Management (DSM) have been developed. These are indirect methods that rely on information exchange between the Distribution Network Operator, aggregators, and consumers’ meters to encourage customers to change their demand to relieve congestion. Cyber attacks against aggregators can compromise the operation of DSM-based congestion management methods, and hence, affect the security and reliability of electrical networks. In this paper, the vulnerability of indirect congestion management methods to Load Altering Attacks is studied. An optimizationalgorithm is developed to determine the aggregators a cyber attacker would compromise, via minimum alteration of their load profiles, to cause congestion problems. The impact of such attacks on congestion and consumers’ electricity bill is then studied. A mitigation scheme is formulated to determine the most critical aggregators in the network. The security of these aggregators is then reinforced to mitigate such cyber attacks. |
| format | article |
| id | aus_abf20b43edf61e8e84f9f64fb10aef01 |
| identifier_str_mv | O. G. M. Khan, E. F. El-Saadany, A. Youssef and M. F. Shaaban, "Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems," in IEEE Transactions on Industrial Informatics, vol. 17, no. 12, pp. 8142-8153, Dec. 2021, doi: 10.1109/TII.2021.3065714. 1941-0050 10.1109/TII.2021.3065714 |
| language_invalid_str_mv | en_US |
| network_acronym_str | aus |
| network_name_str | aus |
| oai_identifier_str | oai:repository.aus.edu:11073/21633 |
| publishDate | 2021 |
| publisher.none.fl_str_mv | IEEE |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | Cyber Security of Market-Based Congestion Management Methods in Power Distribution SystemsMohammed, Omniyah GulEl-Saadany, EhabYoussef, AmrShaaban, MostafaCyber securityLoad Altering Attack (LAA)Congestion ManagementOptimizationAs the penetration rate of flexible loads and Distributed Energy Resources in the distribution networks increases, congestion management techniques that utilize Demand Side Management (DSM) have been developed. These are indirect methods that rely on information exchange between the Distribution Network Operator, aggregators, and consumers’ meters to encourage customers to change their demand to relieve congestion. Cyber attacks against aggregators can compromise the operation of DSM-based congestion management methods, and hence, affect the security and reliability of electrical networks. In this paper, the vulnerability of indirect congestion management methods to Load Altering Attacks is studied. An optimizationalgorithm is developed to determine the aggregators a cyber attacker would compromise, via minimum alteration of their load profiles, to cause congestion problems. The impact of such attacks on congestion and consumers’ electricity bill is then studied. A mitigation scheme is formulated to determine the most critical aggregators in the network. The security of these aggregators is then reinforced to mitigate such cyber attacks.Khalifa University of Science, Technology and ResearchNSERC CanadaIEEE2022-02-08T12:38:40Z2022-02-08T12:38:40Z2021-03Peer-ReviewedPostprintinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfO. G. M. Khan, E. F. El-Saadany, A. Youssef and M. F. Shaaban, "Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems," in IEEE Transactions on Industrial Informatics, vol. 17, no. 12, pp. 8142-8153, Dec. 2021, doi: 10.1109/TII.2021.3065714.1941-0050http://hdl.handle.net/11073/2163310.1109/TII.2021.3065714en_UShttps://doi.org/10.1109/TII.2021.3065714oai:repository.aus.edu:11073/216332024-08-22T12:08:37Z |
| spellingShingle | Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems Mohammed, Omniyah Gul Cyber security Load Altering Attack (LAA) Congestion Management Optimization |
| status_str | publishedVersion |
| title | Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems |
| title_full | Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems |
| title_fullStr | Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems |
| title_full_unstemmed | Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems |
| title_short | Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems |
| title_sort | Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems |
| topic | Cyber security Load Altering Attack (LAA) Congestion Management Optimization |
| url | http://hdl.handle.net/11073/21633 |