Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Towards Multistep Electricity Prices in Smart Grid Electricity Markets

Published: 01 January 2016 Publication History

Abstract

The multistep electricity price (MEP) policy has been introduced by many countries to promote energy saving, load balancing, and fairness in electricity consumption. Nonetheless, with the development of the smart grid, how to determine the quantity of electricity and at what price in a step-like fashion has not been fully investigated in the past. To address this issue, in this paper, we introduce two types of MEP models: a one-dimensional MEP model and a two-dimensional MEP model, which can be used to formally analyze and determine the desirable quantities of electricity and pricing in multiple steps. Particularly, in the one-dimensional MEP model, the steps are scaled only by the quantity of electricity whereas in the two-dimensional MEP model, the steps are scaled by both the quantity of electricity and the time when the electricity is used. Based on the proposed MEP models, we further investigate the vulnerability of the electricity market operation and investigate false data injection attacks against electricity prices and charges to consumers. Through an extensive simulation study, our data shows that the proposed MEP models can achieve fairness in electricity consumption, balance loads between peak and non-peak times, and improve electricity resource utilization. Our data also indicates that false data injection attacks can only partially compromise prices in our MEP models, leading to a limited impact on users’ charges.

References

[3]
PJM Manual 11: Scheduling Operations [Online]. Available: http://swww.pjm.com/contributions/pjm-manuals/pdf/m11v23.pdf, 2009.
[4]
TIME-OF-USE PRICES [Online]. Available: http://www.ieso.ca/imoweb/siteshared/tou_rates.asp, 2014.
[5]
TIME-OF-Use Prices: A new way to manage your electricity use (and costs), reduce strain on the electricity system, and help the environment [Online]. Available: http://www.hydroone.com/TOU/Pages/Default.aspx, 2014.
[6]
L. van Doorn, A. Seshadri, M. Luk, and P. Khosla, “ Scuba: Secure code update by attestation in sensor networks,” in Proc. 5th ACM Workshop Wireless Security, 2006, pp. 85–94.
[7]
L. van Doorn, A. Seshadri, A. Perrig, and P. Khosla, “ SWATT: Software-based attestation for embedded devices,” in Proc. IEEE Symp. Security Privacy, 2004, pp. 272–282.
[8]
R. Akella and B. M. McMillin, “ Information flow analysis of energy management in a smart grid,” Lecture Notes Comput. Sci., vol. 6351, pp. 263– 276, 2010.
[9]
C. Arackaparambil, S. Bratus, J. Brody, and A. Shubina, “Distributed monitoring of conditional entropy for anomaly detection in streams,” in Proc. IEEE Int. Symp. Parallel Distrib. Process., Workshops Phd Forum, 2010, pp. 1–8.
[10]
S. Bi and Y. J. Zhang, “ False-data injection attack to control real-time price in electricity market,” in Proc. IEEE Global Commun. Conf., 2013, pp. 772–777.
[11]
S. Bi and Y. J. Zhang, “ Mitigating false-data injection attacks on dc state estimation using covert topological information,” in Proc. IEEE Global Commun. Conf., 2013, pp. 766 –771.
[12]
R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, “ Detecting false data injection attacks on dc state estimation,” in Proc. Preprints 1st Workshop Secure Control Syst., 2010, pp. 1–9.
[13]
C. C. C. Cecati and P. Siano, “Combined operations of renewable energy systems and responsive demand in a smart grid,” IEEE Trans. Sustainable Energy, vol. 2, no. 4, pp. 468–476, Oct. 2011.
[14]
H. Chan and A. Perrig, “Security and privacy in sensor networks,” Computer, vol. 36, no. 10, pp. 103–105, Oct. 2003.
[15]
F. Cleveland, “Cyber security issues for advanced metering infrastructure (AMI),” in Proc. IEEE Power Energy Soc. General Meeting—Convers. Del. Elect. Energy 21st Century, 2008, pp. 1–5.
[16]
F. E. R. Commission, “Remedying undue discrimination through open access transmission service and standard electricity market design,” Notice of Proposed Rulemaking, IV FERC Stats. Regs. 32,563, Docket No. RM01-12-000, 2005.
[17]
G. Dan and H. Sandberg, “ Stealth attacks and protection schemes for state estimators in power systems,” in Proc. 1st IEEE Int. Conf. Smart Grid Commun., 2010, pp. 214– 219.
[18]
M. Esmalifalak, G. Shi, Z. Han, and L. Song, “ Bad data injection attack and defense in electricity market using game theory study,” IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 160–169, Mar. 2013.
[19]
X. Fang, S. Misra, G. Xue, and D. Yang, “Smart grid—The new and improved power grid: A survey,” IEEE Commun. Surv. Tutos., vol. 14, no. 4, pp. 944–980, 2012.
[20]
A. Francillon and C. Castelluccia, “Code injection attacks on harvard-architecture devices,” in Proc. 15th ACM Conf. Comput. Commun. Security, 2008, pp. 15– 26.
[21]
Y. Gu, T. Liu, D. Wang, X. Guan, and Z. Xu, “Bad data detection method for smart grids based on distributed state estimation,” in Proc. IEEE Int. Conf. Commun., 2013, pp. 4483– 4487.
[22]
Q. Huang and P. Lee, “Ld-sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams,” in Proc. IEEE INFOCOM, 2014, pp. 1420–1428.
[23]
S.-Y. Huang and Y.-N. Huang, “Network traffic anomaly detection based on growing hierarchical SOM,” in Proc. 43rd Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw., 2013, pp. 1 –2.
[24]
Y. Huang, J. Tang, Y. Cheng, H. Li, K. A. Campbell, and Z. Han, “Real-time detection of false data injection in smart grid networks: An adaptive cusum method and analysis,” IEEE Syst. J., vol. PP, no. 99, pp. 1–12, 2014.
[25]
L. Jia, R. J. Thomas, and L. Tong, editors, “Malicious data attack on real-time electricity market,” in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., 2011, pp. 5952–5955.
[26]
P. Jokar, N. Arianpoo, and V. Leung, “Intrusion detection in advanced metering infrastructure based on consumption pattern,” in Proc. IEEE Int. Conf. Commun., 2013, pp. 4472–4476.
[27]
Y. Law, T. Alpcan, and M. Palaniswami, “ Security games for risk minimization in automatic generation control,” IEEE Trans. Power Syst., vol. 30, no. 1, pp. 223–232, Jan 2015.
[28]
X. Lei, D. xian Yu, and X. li Bai, “Research on multistep electricity price model with bidirectional regulation for large consumers,” Proc. Int. Conf. Elect. Control Eng., 2010, pp. 4114–4117.
[29]
F. Li and B. Luo, “ Preserving data integrity for smart grid data aggregation,” in Proc. IEEE 3rd Int. Conf. Smart Grid Commun., 2012, pp. 366–371.
[30]
J. Lin, G. Xu, W. Yu, X. Yang, and S. Bhattarai, “On distributed energy routing protocols in smart grid,” in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Studies in Computational Intelligence, vol. 492. New York, NY, USA: Springer, 2013, pp. 143–159.
[31]
J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, “On false data injection attacks against distributed energy routing in smart grid,” in Proc. IEEE/ACM 3rd Int. Conf. Cyber-Phys. Syst., 2012, pp. 183 –192.
[32]
J. Liu, Y. Xiao, S. Li, W. Liang, and C. Chen, “Cyber security and privacy issues in smart grids,” IEEE Commun. Surv. Tuts., vol. 14, no. 4, pp. 981–997, 2012.
[33]
L. Liu, M. Esmalifalak, and Z. Han, “Detection of false data injection in power grid exploiting low rank and sparsity,” in Proc. IEEE Int. Conf. Commun., 2013, pp. 4461–4465.
[34]
Y. Liu, M. K. Reiter, and P. Ning, “False data injection attacks against state estimation in electric power grids,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 21–32.
[35]
C.-H. Lo and N. Ansari, “Consumer: A novel hybrid intrusion detection system for distribution networks in smart grid,” IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, pp. 33–44, Jun. 2013.
[36]
X. Ma, Y. Chen, and J. Wan, “Midwest iso co-optimization based real-time dispatch and pricing of energy and ancillary servicest,” in Proc. IEEE Power Energy Soc. General Meeting Convers. Del. Elect. Energy 21st Century, 2009, pp. 1 –6.
[37]
K. Manandhar, X. Cao, F. Hu, and Y. Liu, “ Detection of faults and attacks including false data injection attack in smart grid using kalman filter,” IEEE Trans. Control Netw. Syst., vol. 1, no. 4, pp. 370–379, Dec. 2014.
[38]
S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, and S. Zonouz, “ A multi-sensor energy theft detection framework for advanced metering infrastructures,” IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1319–1330, Jul. 2013.
[39]
S. McLaughlin, D. Podkuiko, and P. McDaniel, “Energy theft in the advanced metering infrastructure,” in Proc. 4th Int. Conf. Critical Inform. Infrastructures Security, 2010, pp. 176–187.
[40]
M. Negrete-Pincetic, F. Yoshida, and G. Gross, “Towards quantifying the impacts of cyber attacks in the competitive electricity market environment,” in Proc. IEEE PowerTech, 2009, pp. 1–8.
[41]
New England Power PoolłMarket Rule 1, Chapter 2 [Online]. Available: http://www.iso-ne.com, 2014.
[42]
T. Rabenoro, J. Lacaille, M. Cottrell, and F. Rossi, “Anomaly detection based on indicators aggregation,” in Proc. Int. Joint Conf. Neural Netw., 2014, pp. 2548–2555.
[43]
H. Sandberg, A. Teixeira, and K. H. Johansson, “On security indices for state estimators in power networks,” presented at the Preprints 1st Workshop Secure Control Syst., Stockholm, Sweden, 2010.
[44]
F. C. Schweppe, M. C. Caramanis, R. D. Tabors, and R. E. Robn, Spot Pricing of Electricity. Norwell, MA, USA: Kluwer, 1998.
[45]
K. Song, D. Seo, H. Park, H. Lee, and A. Perrig, “OMAP: One-way memory attestation protocol for smart meters,” in Proc. 9th IEEE Int. Symp. Parallel Distrib. Process. Appl. Workshops, 2011, pp. 111–118.
[46]
K. C. Sou, H. Sandberg, and K. Johansson, “On the exact solution to a smart grid cyber-security analysis problem,” IEEE Trans. Smart Grid , vol. 4, no. 2, pp. 856–865, Jun. 2013.
[47]
A. Teixeira, G. Dan, H. Sandberg, and K. H. Johansson, “A cyber security study of a scada energy management system: Stealthy deception attacks on the state estimator,” in Proc. 18th IFAC World Congr., 2011, pp. 1–11.
[48]
Transmission and Dispatching Operations [Online]. Available: http://www.nyiso.com/services/documents/manuals/index.html
[49]
A. P. V. Calderaro, C. Hadjicostis, and P. Siano, “ Demand side management: Demand response, intelligent energy systems, and smart loads,” IEEE Trans. Ind. Electron., vol. 7, no. 3, pp. 4613– 4623, Oct. 2011.
[50]
W. Wang, Y. Xu, and M. Khanna, “A survey on the communication architectures in smart grid,” Comput. Netw., vol. 55, pp. 3604–3629, 2011.
[51]
L. Xie, Y. L. Mo, and B. Sinopoli, “False data injection attacks in electricity markets,” in Proc. 1st IEEE Int. Conf. Smart Grid Commun., 2010, pp. 226–231.
[52]
K. Xing and X. Cheng, “From time domain to space domain: Detecting replica attacks in mobile ad hoc networks,” in Proc. 29th Conf. Inf. Commun., 2010, pp. 1 –9.
[53]
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A survey on smart grid communication infrastructures: Motivations, requirements and challenges,” IEEE Commun. Surv. Tuts., vol. 15, no. 1, pp. 5–20, 2013.
[54]
L. Yang and F. Li, “Detecting false data injection in smart grid in-network aggregation,” in Proc. IEEE Int. Conf. Smart Grid Commun., 2013, pp. 408–413.
[55]
Q. Yang, J. Yang, W. Yu, N. Zhang, and W. Zhao, “On a hierarchical false data injection attack on power system state estimation,” in Proc. IEEE Global TeleCommun. Conf., 2011, pp. 1 –5.
[56]
X. Yang, J. Lin, P. Moulema, W. Yu, X. Fu, and W. Zhao, editors, “ A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems,” in Proc. 32nd IEEE Int. Conf. Distrib. Comput. Syst., 2012, pp. 92–101.
[57]
L. Ying, The system of multistep electricity price is conducive to conserve energy and fairness in electricity consumption [Online]. Available: http://www.sgeri.sgcc.com.cn/english/Center/Viewpoints/72528.shtml, 2014.
[58]
Y. Younan, P. Philippaerts, F. Piessens, W. Joosen, S. Lachmund, and T. Walter, “Filter-resistant code injection on arm,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 11–20.
[59]
T. Zheng and E. Litvinov, “On ex post pricing in the real-time electricity market,” IEEE Trans. Power Syst., vol. 26, no. 1, pp. 153–164, Feb. 2011.

Cited By

View all
  • (2024)A combined system based on data preprocessing and optimization algorithm for electricity load forecastingComputers and Industrial Engineering10.1016/j.cie.2024.110114191:COnline publication date: 18-Jul-2024
  • (2022)Internet of Intelligence: A Survey on the Enabling Technologies, Applications, and ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2022.317545324:3(1394-1434)Online publication date: 1-Jul-2022
  • (2021)Towards asynchronous federated learning based threat detectionComputers and Security10.1016/j.cose.2021.102344108:COnline publication date: 1-Sep-2021
  • Show More Cited By

Index Terms

  1. Towards Multistep Electricity Prices in Smart Grid Electricity Markets
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          Publisher

          IEEE Press

          Publication History

          Published: 01 January 2016

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 24 Sep 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)A combined system based on data preprocessing and optimization algorithm for electricity load forecastingComputers and Industrial Engineering10.1016/j.cie.2024.110114191:COnline publication date: 18-Jul-2024
          • (2022)Internet of Intelligence: A Survey on the Enabling Technologies, Applications, and ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2022.317545324:3(1394-1434)Online publication date: 1-Jul-2022
          • (2021)Towards asynchronous federated learning based threat detectionComputers and Security10.1016/j.cose.2021.102344108:COnline publication date: 1-Sep-2021
          • (2018)SecureIoTProceedings of the 1st International Workshop on Future Industrial Communication Networks10.1145/3243318.3243323(15-20)Online publication date: 1-Oct-2018
          • (2018)Scalability for Smart Infrastructure System in Smart GridWireless Personal Communications: An International Journal10.1007/s11277-017-5045-y99:1(161-184)Online publication date: 1-Mar-2018
          • (2017)An Integrated Simulation Study on Reliable and Effective Distributed Energy Resources in Smart GridProceedings of the International Conference on Research in Adaptive and Convergent Systems10.1145/3129676.3129684(140-145)Online publication date: 20-Sep-2017
          • (2017)On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical SystemsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2016.254625928:1(170-187)Online publication date: 1-Jan-2017
          • (2017)Towards double auction for assisting electric vehicles demand response in smart grid2017 13th IEEE Conference on Automation Science and Engineering (CASE)10.1109/COASE.2017.8256333(1604-1609)Online publication date: 20-Aug-2017
          • (2017)On data integrity attacks against optimal power flow in power grid systems2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC.2017.7983272(1008-1009)Online publication date: 8-Jan-2017
          • (undefined)A New Layer Structure of Cyber-Physical Systems under the Era of Digital TwinACM Transactions on Internet Technology10.1145/3674974

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media