LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems

Photo from wikipedia

As the penetration rate of flexible loads and distributed energy resources in the distribution networks increases, congestion management techniques that utilize demand-side management (DSM) have been developed. These are indirect… Click to show full abstract

As the penetration rate of flexible loads and distributed energy resources in the distribution networks increases, congestion management techniques that utilize demand-side management (DSM) have been developed. These are indirect methods that rely on information exchange between the distribution network operator, aggregators, and consumers’ meters to encourage customers to change their demand to relieve congestion. Cyber attacks against aggregators can compromise the operation of DSM-based congestion management methods, and hence, affect the security and reliability of electrical networks. In this article, the vulnerability of indirect congestion management methods to load-altering attacks is studied. An optimization algorithm is developed to determine the aggregators a cyber attacker would compromise, via minimum alteration of their load profiles, to cause congestion problems. The impact of such attacks on congestion and consumers’ electricity bill is then studied. A mitigation scheme is formulated to determine the most critical aggregators in the network. The security of these aggregators is then reinforced to mitigate such cyber attacks.

Keywords: management methods; management; congestion; congestion management; security; distribution

Journal Title: IEEE Transactions on Industrial Informatics
Year Published: 2021

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.