Data Injection Attacks on Electricity Markets by Limited Adversaries: Worst-case Robustness
نویسندگان
چکیده
Electricity markets consist of multiple look-ahead and real-time spot markets, across which energy price is generally volatile. Moreover, dispatch and pricing decisions in the real-time markets strongly hinge on the quality of the real-time state estimates, which are formed dynamically in order to delineate real-time information about operation state of the grid. Adversaries can leverage price volatility in conjunction with the dependence of the real-time markets on the state estimates in order to carry out profitable financial misconduct, e.g., via virtual bidding on the locational marginal prices. When the adversaries are omniscient (i.e., have full and instantaneous access to grid topology and dynamics), the attack strategies for maximizing financial profits are studied extensively in the existing literature. This paper focuses on limited adversaries who have only partial and imperfect information about the grid, and offers a framework for analyzing the attack strategies for limited adversaries and the associated confidence about profitable attacks. Specifically, adversaries’ information is considered to be within a measure of bounded error, and attack strategies are designed such that the adversaries are guaranteed a certain level of confidence to gain profit. Designing such attacks is investigated analytically and examined in the IEEE 14and 118-bus systems.
منابع مشابه
Cascade Adversarial Machine Learning Regularized with a Unified Embedding
Deep neural network classifiers are vulnerable to small input perturbations carefully generated by the adversaries. Injecting adversarial inputs during training, known as adversarial training, can improve robustness against one-step attacks, but not for unknown iterative attacks. To address this challenge, we propose to utilize embedding space for both classification and low-level (pixel-level)...
متن کاملAdversarial Risk and the Dangers of Evaluating Against Weak Attacks
This paper investigates recently proposed approaches for defending against adversarial examples and evaluating adversarial robustness. The existence of adversarial examples in trained neural networks reflects the fact that expected risk alone does not capture the model’s performance against worst-case inputs. We motivate the use of adversarial risk as an objective, although it cannot easily be ...
متن کاملRobustness envelopes of networks
We study the robustness of networks under node removal, considering random node failure, as well as targeted node attacks based on network centrality measures. Whilst both of these have been studied in the literature, existing approaches tend to study random failure in terms of average-case behavior, giving no idea of how badly network performance can degrade purely by chance. Instead of consid...
متن کاملCryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations
In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only make classical queries but use quantum computers for offline computations. Our attacks are not as efficient as polynomial-time attacks making quantum superposition queries, while our attacks use the realistic model and overwhelmingly improve the classical attacks. Our attacks convert a type of c...
متن کاملA robust optimization approach to energy and reserve dispatch in electricity markets
To a large extent, electricity markets worldwide still rely on deterministic procedures for clearing energy and reserve auctions. However, larger and larger shares of the production mix consist of renewable sources whose nature is stochastic and non-dispatchable, as their output is not known with certainty and cannot be controlled by the operators of the production units. Stochastic programming...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017