Team for Research in
Ubiquitous Secure Technology

Impacts of Malicious Data on Real-time Price of Electricity Market Operations
Jia Liyan, Robert J. Thomas, Lang Tong

Citation
Jia Liyan, Robert J. Thomas, Lang Tong. "Impacts of Malicious Data on Real-time Price of Electricity Market Operations". 45th Hawaii International Conference on System Sciences, pp.1907-1914, 4, January, 2012.

Abstract
Impacts of malicious data data attack on the real-time electricity market are studied. It is assumed that an adversary has access to a limitted number of meters and has the ability to construct data attack based on what it observes. Different observation models are considered. A geometric framework is introduced based on which upper and lower bounds on the optimal data attack are obtained and evaluated in simulations.

Electronic downloads

Citation formats  
  • HTML
    Jia Liyan, Robert J. Thomas, Lang Tong. <a
    href="http://www.truststc.org/pubs/878.html"
    >Impacts of Malicious Data on Real-time Price of
    Electricity Market Operations</a>, 45th Hawaii
    International Conference on System Sciences, pp.1907-1914,
    4, January, 2012.
  • Plain text
    Jia Liyan, Robert J. Thomas, Lang Tong. "Impacts of
    Malicious Data on Real-time Price of Electricity Market
    Operations". 45th Hawaii International Conference on
    System Sciences, pp.1907-1914, 4, January, 2012.
  • BibTeX
    @inproceedings{LiyanThomasTong12_ImpactsOfMaliciousDataOnRealtimePriceOfElectricityMarket,
        author = {Jia Liyan and Robert J. Thomas and Lang Tong},
        title = {Impacts of Malicious Data on Real-time Price of
                  Electricity Market Operations},
        booktitle = {45th Hawaii International Conference on System
                  Sciences},
        pages = {pp.1907-1914},
        day = {4},
        month = {January},
        year = {2012},
        abstract = {Impacts of malicious data data attack on the
                  real-time electricity market are studied. It is
                  assumed that an adversary has access to a limitted
                  number of meters and has the ability to construct
                  data attack based on what it observes. Different
                  observation models are considered. A geometric
                  framework is introduced based on which upper and
                  lower bounds on the optimal data attack are
                  obtained and evaluated in simulations.},
        URL = {http://www.truststc.org/pubs/878.html}
    }
    

Posted by Mary Stewart on 4 Apr 2012.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.