Cyber Attacks on Distributed Congestion Management Methods

Omniyah Gul M. Khan, Ehab El-Saadany, Khaled Saleh, Mostafa Shaaban, Amr Youssef

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

With the increased dependency on Demand Side Management (DSM) for congestion mitigation in the distribution network (DN), cyber physical security of such congestion management methods need to be investigated. DSM based distributed congestion management methods rely on the aggregators' communication of consumers load profiles to the distribution network operator (DNO). Compromising the aggregator would hence affect the congestion management results. To gain insights into the vulnerability of such congestion management methods, different cyber attack scenarios are studied in this paper assuming a compromised aggregator. Simulation results, based on the IEEE 33 bus system, show how the electricity prices can be manipulated by attacks that increase the load profiles faking congestion. On the other hand, a multiplicative attack that decreases an aggregator's load profile would cause the concealment of congestions when in reality the line is overloaded. These results demonstrate the vulnerability of such congestion management methods to cyber attacks.

Original languageBritish English
Title of host publication2019 IEEE Power and Energy Society General Meeting, PESGM 2019
PublisherIEEE Computer Society
ISBN (Electronic)9781728119816
DOIs
StatePublished - Aug 2019
Event2019 IEEE Power and Energy Society General Meeting, PESGM 2019 - Atlanta, United States
Duration: 4 Aug 20198 Aug 2019

Publication series

NameIEEE Power and Energy Society General Meeting
Volume2019-August
ISSN (Print)1944-9925
ISSN (Electronic)1944-9933

Conference

Conference2019 IEEE Power and Energy Society General Meeting, PESGM 2019
Country/TerritoryUnited States
CityAtlanta
Period4/08/198/08/19

Fingerprint

Dive into the research topics of 'Cyber Attacks on Distributed Congestion Management Methods'. Together they form a unique fingerprint.

Cite this