메뉴 건너뛰기




Volumn , Issue , 2017, Pages

Data integrity attacks against the distributed real-time pricing in the smart grid

Author keywords

Data integrity attacks; Distributed real time pricing; Smart grid; Vulnerabilities analysis

Indexed keywords

ELECTRIC POWER TRANSMISSION NETWORKS; SMART POWER GRIDS; SYSTEMS ENGINEERING;

EID: 85013441181     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2016.7820657     Document Type: Conference Paper
Times cited : (12)

References (29)
  • 2
    • 84887048546 scopus 로고    scopus 로고
    • Sensing-driven energy purchasing in smart grid cyber-physical system
    • C.-K. Tham and T. Luo, "Sensing-driven energy purchasing in smart grid cyber-physical system," IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 43, no. 4, pp. 773-784, 2013.
    • (2013) IEEE Trans. on Systems, Man, and Cybernetics: Systems , vol.43 , Issue.4 , pp. 773-784
    • Tham, C.-K.1    Luo, T.2
  • 7
    • 84960127390 scopus 로고    scopus 로고
    • Realtime pricing mechanism for electricity market with built-in incentive for participation
    • T. Namerikawa, N. Okubo, R. Sato, Y. Okawa, and M. Ono, "Realtime pricing mechanism for electricity market with built-in incentive for participation," IEEE Trans. on Smart Grid, vol. 6, no. 6, pp. 2714-2724, 2015.
    • (2015) IEEE Trans. on Smart Grid , vol.6 , Issue.6 , pp. 2714-2724
    • Namerikawa, T.1    Okubo, N.2    Sato, R.3    Okawa, Y.4    Ono, M.5
  • 10
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. on Information and System Security, vol. 14, no. 1, p. 13, 2011.
    • (2011) ACM Trans. on Information and System Security , vol.14 , Issue.1 , pp. 13
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 11
    • 84897621622 scopus 로고    scopus 로고
    • Impact of data quality on real-time locational marginal price
    • L. Jia, J. Kim, R. J. Thomas, and L. Tong, "Impact of data quality on real-time locational marginal price," IEEE Trans. on Power Systems, vol. 29, no. 2, pp. 627-636, 2014.
    • (2014) IEEE Trans. on Power Systems , vol.29 , Issue.2 , pp. 627-636
    • Jia, L.1    Kim, J.2    Thomas, R.J.3    Tong, L.4
  • 14
    • 82155175605 scopus 로고    scopus 로고
    • Integrity data attacks in power market operations
    • L. Xie, Y. Mo, and B. Sinopoli, "Integrity data attacks in power market operations," IEEE Trans. on Smart Grid, vol. 2, no. 4, pp. 659-666, 2011.
    • (2011) IEEE Trans. on Smart Grid , vol.2 , Issue.4 , pp. 659-666
    • Xie, L.1    Mo, Y.2    Sinopoli, B.3
  • 16
    • 84904127298 scopus 로고    scopus 로고
    • On false data injection attack against multistep electricity price in electricity market in smart grid
    • J. Lin, W. Yu, and X. Yang, "On false data injection attack against multistep electricity price in electricity market in smart grid," in Proc. of Global Communications Conference (GLOBECOM), 2013.
    • (2013) Proc. of Global Communications Conference (GLOBECOM)
    • Lin, J.1    Yu, W.2    Yang, X.3
  • 17
    • 82155185205 scopus 로고    scopus 로고
    • Distributed internet-based load altering attacks against smart power grids
    • A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed internet-based load altering attacks against smart power grids," IEEE Trans. on Smart Grid, vol. 2, no. 4, pp. 667-674, 2011.
    • (2011) IEEE Trans. on Smart Grid , vol.2 , Issue.4 , pp. 667-674
    • Mohsenian-Rad, A.-H.1    Leon-Garcia, A.2
  • 21
    • 0033355765 scopus 로고    scopus 로고
    • Optimization flow controli: Basic algorithm and convergence
    • S. H. Low and D. E. Lapsley, "Optimization flow controli: basic algorithm and convergence," IEEE/ACM Trans. on Networking, vol. 7, no. 6, pp. 861-874, 1999.
    • (1999) IEEE/ACM Trans. on Networking , vol.7 , Issue.6 , pp. 861-874
    • Low, S.H.1    Lapsley, D.E.2
  • 22
  • 24
    • 85028151153 scopus 로고    scopus 로고
    • Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study
    • M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, "Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study," IEEE Systems Journal, vol. 9, no. 1, pp. 31-44, 2015.
    • (2015) IEEE Systems Journal , vol.9 , Issue.1 , pp. 31-44
    • Faisal, M.A.1    Aung, Z.2    Williams, J.R.3    Sanchez, A.4
  • 25
    • 84919466772 scopus 로고    scopus 로고
    • A novel en-route filtering scheme against false data injection attacks in cyberphysical networked systems
    • X. Yang, J. Lin, W. Yu, P. Moulema, X. Fu, and W. Zhao, "A novel en-route filtering scheme against false data injection attacks in cyberphysical networked systems," IEEE Trans. on Computers (TC), vol. 61, no. 1, pp. 4-18, 2015.
    • (2015) IEEE Trans. on Computers (TC) , vol.61 , Issue.1 , pp. 4-18
    • Yang, X.1    Lin, J.2    Yu, W.3    Moulema, P.4    Fu, X.5    Zhao, W.6
  • 26
    • 84894537318 scopus 로고    scopus 로고
    • On false data-injection attacks against power system state estimation: Modeling and countermeasures
    • Q. Yang, J. Yang, W. Yu, D. An, N. Zhang, and W. Zhao, "On false data-injection attacks against power system state estimation: Modeling and countermeasures," IEEE Trans. on Parallel and Distributed Systems, vol. 25, no. 3, pp. 717-729, 2014.
    • (2014) IEEE Trans. on Parallel and Distributed Systems , vol.25 , Issue.3 , pp. 717-729
    • Yang, Q.1    Yang, J.2    Yu, W.3    An, D.4    Zhang, N.5    Zhao, W.6
  • 27
    • 84960349614 scopus 로고    scopus 로고
    • Electricity theft detection in ami using customers' consumption patterns
    • P. Jokar, N. Arianpoo, and V. Leung, "Electricity theft detection in ami using customers' consumption patterns," IEEE Trans. on Smart Grid, vol. 7, no. 1, pp. 216-226, 2016.
    • (2016) IEEE Trans. on Smart Grid , vol.7 , Issue.1 , pp. 216-226
    • Jokar, P.1    Arianpoo, N.2    Leung, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.