Abstract

Demand-Side Management (DSM) is an essential tool to ensure power system reliability and stability. In future smart grids, certain portions of a customer’s load usage could be under the automatic control of a cyber-enabled DSM program, which selectively schedules loads as a function of electricity prices to improve power balance and grid stability. In this scenario, the security of DSM cyberinfrastructure will be critical as advanced metering infrastructure and communication systems are susceptible to cyber-attacks. Such attacks, in the form of false data injections, can manipulate customer load profiles and cause metering chaos and energy losses in the grid. The feedback mechanism between load management on the consumer side and dynamic price schemes employed by independent system operators can further exacerbate attacks. To study how this feedback mechanism may worsen attacks in future cyber-enabled DSM programs, we propose a novel mathematical framework for (i) modeling the nonlinear relationship between load management and real-time pricing, (ii) simulating residential load data and prices, (iii) creating cyber-attacks, and (iv) detecting said attacks. In this framework, we first develop time-series forecasts to model load demand and use them as inputs to an elasticity model for the price-demand relationship in the DSM loop. This work then investigates the behavior of such a feedback loop under intentional cyber-attacks. We simulate and examine load-price data under different DSM-participation levels with three types of random additive attacks: ramp, sudden, and point attacks. We conduct two investigations for the detection of DSM attacks. The first studies a supervised learning approach, with various classification models, and the second studies the performance of parametric and nonparametric change point detectors. Results conclude that higher amounts of DSM participation can exacerbate ramp and sudden attacks leading to better detection of such attacks, especially with supervised learning classifiers. We also find that nonparametric detection outperforms parametric for smaller user pools, and random point attacks are the hardest to detect with any method.

Highlights

  • Demand-Side Management (DSM) is an essential component in smart grids for planning, monitoring, and modifying consumer load levels

  • We envision that Advanced Metering Infrastructure (AMI) and smart appliances in residential DSM programs will automatically control specific portions of consumer load as a function of real-time electricity prices to achieve the goal of strategic conservation

  • We simulate each of the three types of attacks, as visualized in Figure 8, each in the form of direct load manipulation attack, under DSM participation levels κ = 0.1 and 0.9

Read more

Summary

Introduction

Demand-Side Management (DSM) is an essential component in smart grids for planning, monitoring, and modifying consumer load levels. DSM programs utilize demand response, a specific tariff or program to motivate customers to respond to changes in price or electricity availability over time by altering their regular electricity use habits We take this a step further and look at future cyber-enabled DSM programs [3] that will autonomously control household loads such as water heaters and HVAC units based on Real. We provide a mathematical formulation of the feedback between utilities and DSM systems, and simulate, analyze, and test different detection methods for attacks on such feedback We propose dependency models for the feedback nature of load and prices, where we showcase simulations of residential load and electricity prices when an automatic DSM program controls certain portions of consumer demand as a function of price. If load usage is increased by an attacker, prices would increase and vice versa

Demand Side Management
Load Forecasting
Real-Time Pricing
Microgrid Simulation
Data Source
Block Bootstrap Simulation
Modeling Elastic Demand
Modeling Consumer DSM
Modeling Strategic Load Conservation
Simulation Parameters and Assumptions
DSM Attack Models
Attack Detection
SARIMA Model
Sequential Detection Methods
Nonparametric Detection Methods
Supervised Learning Methods
Performance Analysis
Detection Experiments and Results
Sequential vs Supervised Learning Detection
GLRT Detection versus Nonparametric Detection
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call