A Framework for Analyzing the Impact of Data Integrity/Quality on Electricity Market Operations

Similar documents
Impacts of Bad Data and Cyber Attacks on Electricity Market Operations

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids

Some Observations on the Locational Marginal Prices and Loads

Role of Synchronized Measurements In Operation of Smart Grids

Quantifying Cyber Security for Networked Control Systems

Dynamic Attacks on Power Systems Economic Dispatch

Malicious Data Detection in State Estimation Leveraging System Losses & Estimation of Perturbed Parameters

THE electric power system is a complex cyber-physical

An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems π

WITH the increasing integration of real-time monitoring,

Weighted Least Squares Topology Error Detection And Identification

SIGNIFICANT increase in amount of private distributed

Power System Security. S. Chakrabarti

Bilevel Programming-Based Unit Commitment for Locational Marginal Price Computation

Deregulated Electricity Market for Smart Grid: A Network Economic Approach

Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation

Software Tools: Congestion Management

Detection and Identification of Data Attacks in Power System

Tutorial 2: Modelling Transmission

Analysis of Coupling Dynamics for Power Systems with Iterative Discrete Decision Making Architectures

SMART GRID FORECASTING

DIMACS, Rutgers U January 21, 2013 Michael Caramanis

A Decomposition Based Approach for Solving a General Bilevel Linear Programming

Congestion and Price Prediction in Locational Marginal Pricing Markets Considering Load Variation and Uncertainty

STATE ESTIMATION IN DISTRIBUTION SYSTEMS

elgian energ imports are managed using forecasting software to increase overall network e 칁 cienc.

Optimization Basics for Electric Power Markets

ECE 476. Exam #2. Tuesday, November 15, Minutes

Course notes for EE394V Restructured Electricity Markets: Locational Marginal Pricing

Autonomous Demand Response in Heterogeneous Smart Grid Topologies

arxiv: v1 [math.oc] 8 Nov 2010

A Unified Framework for Defining and Measuring Flexibility in Power System

Mixed Integer Linear Programming Formulation for Chance Constrained Mathematical Programs with Equilibrium Constraints

Introduction to State Estimation of Power Systems ECG 740

Renewables and the Smart Grid. Trip Doggett President & CEO Electric Reliability Council of Texas

A Progressive Hedging Approach to Multistage Stochastic Generation and Transmission Investment Planning

The DC Optimal Power Flow

Energy System Modelling Summer Semester 2018, Lecture 7

Optimal Demand Response

Fine Tuning Of State Estimator Using Phasor Values From Pmu s

Chapter 5. Transmission networks and electricity markets

Stochastic Unit Commitment with Topology Control Recourse for Renewables Integration

Multi-Area Interchange Scheduling under Uncertainty

Bringing Renewables to the Grid. John Dumas Director Wholesale Market Operations ERCOT

Local Cyber-physical Attack with Leveraging Detection in Smart Grid

California Independent System Operator (CAISO) Challenges and Solutions

Perfect and Imperfect Competition in Electricity Markets

A Benders Decomposition Approach to Corrective Security Constrained OPF with Power Flow Control Devices

Developing Correlation Indices to Identify Coordinated Cyber-Attacks on Power Grids

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model

Detecting Data Tampering in Synchrophasors using Power Flow Entropy

UNIT-I ECONOMIC OPERATION OF POWER SYSTEM-1

Topology control algorithms in power systems

The AR OPF: an Exact Convex Formulation for the Optimal Power Flow in Radial Distribution Networks

Enterprise GIS to Support ADMS ESRI GeoConx EGUG 2016 Parag Parikh

Game Theoretic Approach for Elastic and Inelastic Demand Management in Microgrid

CECOER. Renewable Energy Control Center. How technologies have boosted remote operations. Agder Energi-konferansen

03-Economic Dispatch 1. EE570 Energy Utilization & Conservation Professor Henry Louie

Appendix A Solving Systems of Nonlinear Equations

Cyber-Physical Intrusion Detection Incorporating μpmu Measurements in Automated Distribution Systems

Optimal PMU Placement

Better Weather Data Equals Better Results: The Proof is in EE and DR!

Robust Corrective Topology Control for System Reliability and Renewable Integration. Akshay Shashikumar Korad

Contents Economic dispatch of thermal units

Inverse Optimization for the Recovery of Market Structure from Market Outcomes

A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids

04-Economic Dispatch 2. EE570 Energy Utilization & Conservation Professor Henry Louie

On-Line TSA and Control at EMS Control Centers for Large Power Grids

A three-level MILP model for generation and transmission expansion planning

Optimal Locating and Sizing of TCPST for Congestion Management in Deregulated Electricity Markets

What s under the hood? Improving SCADA security with process awareness

THE future smart grid, which leverages advanced information. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid

Fast Real-Time DC State Estimation in Electric Power Systems Using Belief Propagation

A Stochastic-Oriented NLP Relaxation for Integer Programming

Analytical Study Based Optimal Placement of Energy Storage Devices in Distribution Systems to Support Voltage and Angle Stability

Impact of Photovoltaic Generation On The Power System Stability

Edinburgh Research Explorer

EUROPEAN EXPERIENCE: Large-scale cross-country forecasting with the help of Ensemble Forecasts

Energy Flow in Electrical Grids

CIGRE US National Committee 2015 Grid of the Future Symposium. Setting-less Protection: Laboratory Experiments and Field Trials

SUBMITTED TO IEEE TRANSACTIONS ON POWER SYSTEMS, AUGUST

Javier Contreras Sanz- Universidad de Castilla-La Mancha Jesús María López Lezama- Universidad de Antioquia Antonio Padilha-Feltrin- Universidade

A Novel Technique to Improve the Online Calculation Performance of Nonlinear Problems in DC Power Systems

Smart Grid Opportunities Being Pursued. Stephanie Hamilton Brookhaven National Laboratory June 5, 2013

R O B U S T E N E R G Y M AN AG E M E N T S Y S T E M F O R I S O L AT E D M I C R O G R I D S

Dynamic Decomposition for Monitoring and Decision Making in Electric Power Systems

Power Engineering II. Fundamental terms and definitions

Control Strategies for Microgrids

Game theory and market power

Reduced MIP Formulation for Transmission Topology Control

Coding Sensor Outputs for Injection Attacks Detection

PowerApps Optimal Power Flow Formulation

A Data-driven Voltage Control Framework for Power Distribution Systems

Optimal Demand Response

International Workshop on Wind Energy Development Cairo, Egypt. ERCOT Wind Experience

Congestion Management in a Smart Grid via Shadow Prices

Distributed Approach for DC Optimal Power Flow Calculations

Vedant V. Sonar 1, H. D. Mehta 2. Abstract

URD Cable Fault Prediction Model

Transcription:

A Framework for Analyzing the Impact of Data Integrity/Quality on Electricity Market Operations Dae-Hyun Choi (Advisor: Prof. Le Xie) Department of Electrical and Computer Engineering Texas A & M University February 4, 2014 1/51

1 Introduction 2 Research Goals 3 Part I: Data Attack on Look-Ahead Dispatch 4 Part II: Sensitivity Analysis of LMP to Data Corruption 5 Conclusions 2/51

Smart Grid: A Cyber-Physical System Image Source: http://www.sgiclearinghouse.org/sites/default/files/images/nist/slide1-1.png 3/51

Advanced Grid Sensors Improve Smart Grid Operations Transmission Operator Distribution Operator Distributed Resources Industrial Customer Energy Storage Substation Commercial Customer Residential Customer Other Substation Other Substation Microgrid Communication s Smart Switching Devices Sensor Advanced Computing Image Source: EPRI 4/51

Advanced Grid Sensors Improve Smart Grid Operations Transmission Operator Distribution Operator Distributed Resources Industrial Customer Energy Storage Substation Commercial Customer Residential Customer Other Substation Other Substation Microgrid Communication s Smart Switching Devices Sensor Advanced Computing Image Source: EPRI 5/51

Data Quality in Future Grid Exabytes year (1 exabyte=250 million DVDs) 3.5 3.0 2.5 2.0 1.5 1.0 0.5 Distribution automation Workforce management Substation automation Building energy management Transmission Sensors Smart in-home devices AMI deployment Distribution management 0.0 1980 1990 2000 2010 2020 2030 Image Source:EPRI Big data explosion! Big data analytics Data quality analysis Pre-processing for big data analytic Transmission sensors SCADA/PMU data 6/51

Data Integrity in SCADA System Stuxnet Worm, 2010 Nuclear power plant attacked via SCADA systems Stuxnet: Malware more Stuxnet: Computer worm complex, targeted and opens new era of warfare dangerous than ever * SCADA (Supervisory Control And Data Acquisition) A Silent Attack, but Not a Subtle One SmartGrid Update Report* Even small changes in the data could affect the stability of the grid and even jeopardize human safety SCADA Weak Cybersecurity+Data Integrity Violation Grid Malfunction * http://www.smartgridupdate.com/dataforutilities/pdf/datamanagementwhitepaper.pdf 7/ 51

Motivation Noise EMS (Energy Management System) SCADA Network RTU (Remote Terminal Unit) Adversary MMS (Market Management System) MTU (Master Terminal Unit) Control Center SCADA system Data quality/integrity violation blackouts & financial losses 8/51

Background: Power System State Estimation Three-bus system Base case power flow solution G G G G = (, ) = (, ) = (, ) Measurement model = + = (,,,, ) = (,,,, ) = (,,,,, ) Weighted least squares method minimize = s.t = ( ) State estimation solution = (,,,,, ) 9/51

Background: Electricity Market Operations State Estimation Base Case Power Flow Solution s.t. Real-time economic dispatch Min ( ) Balance constraint of supply and demand Operational system constraints Day-ahead Day(k-1) Hour(j) Ex-ante real-time price Day(k) Present 5-min(i) Ex-post real-time price Time Static dispatch Look-ahead dispatch Time (5-min) : Forecasted load for static dispatch : Forecasted load for look-ahead dispatch 10/51

Problem Statement Normal Condition Control/Computation Layer (Control Center) Economic Dispatch State Estimation Measurement Layer (Sensor Network) SCADA Network Physical Layer (Power Network) 11/51

Problem Statement Normal Condition Control/Computation Layer (Control Center) Economic Dispatch After Data Corruption Control/Computation Layer (Control Center) Economic Dispatch State Estimation Measurement Layer (Sensor Network) SCADA Network State Estimation Bad/Malicious Data SCADA Network Physical Layer (Power Network) Physical Layer (Power Network) 1 What are the impacts of data integrity/quality on real-time market prices, namely locational marginal price (LMP), via state estimation? 2 What are analytical tools for quantifying such impacts? 11/51

Previous and Missing Work I. Data Integrity Attack on Physical and Economical Grid Operations Attack modeling & analysis based on continuous data manipulation: [1, Liu et al., 2009], [2, Kosut et al., 2010], [3, Kim et al., 2011] Attack modeling & analysis based on discrete data manipulation: [4, Kim et al., 2013] Data attack on static economic dispatch: [5, Xie et al., 2011] Data attack on look-ahead economic dispatch:? II. LMP Sensitivity Analysis Subject to Power System Condition Impact of physical system conditions (e.g., load variations) on LMP sensitivity: [6, Conejo et al., 2005], [7, Li et al., 2007] Impact of sensor data quality on LMP sensitivity:? 12/51

Research Goals A Market Participant s Perspective Part I: Data Integrity Attack on Look-Ahead Economic Dispatch Ramp-induced data (RID) attack [Choi, Xie, TSG2013] Undetectable and profitable RID attack strategy Economic impact of RID attack A System Operator s Perspective Part II: Sensitivity Analysis of LMP to Data Corruption Impact of continuous data quality on real-time LMP [Choi, Xie, TPS2014] Impact of discrete data quality on real-time LMP [Choi, Xie, SmartGridComm2013] 13/51

Part I: Malicious Ramp-Induced Data (RID) Attack A Market Participant s Perspective RID Attack on Look-Ahead Dispatch in Real-Time Market 1 Attack Modeling - Generation capacity withholding - Covert change of generators inter-temporal ramp constraints 2 Performance Evaluation - Undetectability - Profitability 14/51

State Estimation Model Economic Dispatch State Estimation Sensor Data z Power Network Measurement Model z = Sx+e z: measurements vector, e N(0,R) [ ] I S = : system factor matrix H d x: (nodal power injection) states vector Weighted Least Squares Estimate ˆx(z) = (S T R 1 S) 1 S T R 1 z = Bz Bad Data Detection (Chi-squares test) where r = z Sˆx(z) J(ˆx(z)) = r T R 1 r H1 H 0 η χ 15/51

Economic Dispatch Model Look-Ahead Dispatch Model Economic Dispatch State Estimation Sensor Data Power Network Pgi(z) s.t. min K C i (P gi [k]) P gi [k] k=1 i G P gi [k] = i G N D n [k] k = 1,...,K n=1 P gi [k] P gi [k 1] R i T k = 1,...,K Pg min i Fl min P gi [k] P max g i F l [k] F max l k = 1,...,K k = 1,...,K l = 1,...,L Attack Target: P gi [0] is updated with ˆP gi (z) at every dispatch interval! 16/51

Data Attack Model P*gi(za) (za) Economic Dispatch State Estimation Bad/Malicious Data Power Network Pgi(za) za Attack Measurement Model z a = Sx+e+a z a : corrupted measurement vector a: injected attack vector A Domino Effect of Data Attack z a ˆP gi (z a ) λ(z a ) 17/51

Two Main Features of RID Attack: (1) Undetectability After data attack, we have New estimator: ˆx(z a ) = Bz a = ˆx(z)+Ba New residual: r 2 = r+(i SB)a 2 r }{{} 2 + (I SB)a }{{ 2 } Without attack With attack For undetectability, the attacker s goal is to Construct a such that the contribution of (I SB)a 2 still makes the following healthy detection condition hold true: r 2 < η 18/51

Two Main Features of RID Attack: (2) Profitability Without Attack With Attack Pgi,max Pgi,max Ri - Ri P*gi[1] P*gi[1] P*gi,a[1] P*gi[0]= Pgi[0] Ri P*gi[0] -CM(a) Pgi,a[0] : Ri - (Shortage Power) Pgi,min :(Excess Power) Pgi,min Capacity withholding condition: C M (a) > R i T L increasing LMP and profit 19/51

Attack Strategy: Compute the Attack Vector a s.t. where max δ a span(a) (I SB)a 2 ɛ Undetectable Condition αc M (a)+βc B (a) L R i T δ Profitable Condition δ > 0 C M (a) = E[ˆP gi,a [0] Pg i [0]] = B i a C B (a) = E[ˆP gj,a [0]+R j T Pg max j [0]] = [B j a+r j T] j G c M j G c M α = 1, β = 0: Marginal unit attack (Case I) α = 0, β = 1: Binding unit attack (Case II) α = 1, β = 1: Coordinated attack (Case III) 20/51

Simulation Setup 12 13 14 11 10 6 9 G G G 8 7 1 5 4 2 G : Compromised Injection Sensor G 3 Figure : IEEE 14-Bus System. Unit Type P min P max Ramp Rate Marginal Cost Coal(1) 0MW 200MW 10MW/5min 30/MWh Wind(2) 0MW 300MW 150MW/5min 20/MWh Nuclear(3) 0MW 300MW 8MW/5min 40/MWh Coal(6) 50MW 250MW 15 MW/5min 55/MWh Oil(8) 60MW 150MW 60 MW/5min 60/MWh Table : Generator Parameters. 21/51

Attack Performance Case Static (PE(3)%) Look-ahead (PE(3)%) J (η χ =37.6) I 131.9 148.9 28.2 II 101.2 102.6 35.5 III 108.9 113.8 31.5 Case I: P 3 injection sensor compromised Case II: P 1 injection sensor compromised Case III: P 1, P 3 injection sensors compromised Observation 1 Attack profitability (PE(3) > 100%) Attack undetectability (J < η χ =37.6) 22/51

Ramp-Induced Data Attack Increases LMPs 30 25 LMP increase (\MWh) 20 15 10 5 0 0 50 100 150 200 250 300 Time interval (5 min) Figure : LMP Increase of Look-ahead Dispatch with Case 1 Attack. 23/51

Attack Relative Magnitude vs Attack Performance Attack Relative Magnitude (ARM) 0.25 0.5 0.75 1 Static (PE(3)) 111.8 120.8 126.4 126.9 Look-ahead (PE(3)) 112.2 125.8 127.6 137.7 J 21.1 25.4 29.2 33.1 ( a z % ) Observation 2 Increasing ARM increasing attack profit at the expense of increasing J 24/51

Ramp Rate & Data Accuracy vs Attack Profit Ramp Rate (MW/5min) Variance (σ 2 ) 8 10 12 14 0.0005 0.005 0.05 0.5 Static (PE(3)) 131.9 119.7 106.4 100.5 123.2 129.1 130.3 136.9 Look-ahead (PE(3)) 148.9 123.5 108.5 103.1 143.5 144.75 146.1 152.8 Observation 3 A slower ramp rate unit targeted increasing attack profit Observation 4 A less accurate sensor compromised increasing attack profit 25/51

Part I: Remarks Main Contributions 1 Problem formulation of a novel ramp-induced data attack covert generation capacity withholding 2 An optimization-based undetectable/profitable attack strategy 3 Economic impacts on real-time electricity market operations 26/51

Part II: Sensitivity Analysis of LMP to Data Corruption A System Operator s Perspective SCADA Telemetry Topology Processor Observability Analysis State Estimation (b) (a) SCED SCADA Bad Data Topology Error Processing Processing EMS MMS Impact flow of continuous data Impact flow of discrete data Data corruption (a): Power Flow Estimate (b): Network Topology Estimate Part II-A: impact of undetectable error in (a) on LMP Part II-B: impact of undetectable error in (b) on LMP 27/51

Research Goal Develop analysis tools to study the impact of data quality on LMP 12 6 13 11 10 14 9 12 6 13 11 10 14 9 1 G G 5 G 8 7 4 1 G G 5 G 8 7 4 2 G : Injection sensor : Flow sensor : Voltage magnitude sensor : LMP change G 3 2 G : On circuit breaker : Line exclusion : Off circuit breaker : LMP change G 3 (a) Continuous data corruption (Part II-A) (b) Discrete data corruption (Part II-B) 28/51

Part II-A: LMP Sensitivity to Continuous Data Corruption Ex-ante Pricing Ex-post Pricing SCED Ex-ante Dispatch ( ) ( ) {, ( ( ))} ( ) = ( ( )) State Estimation G Power System = ( ) + G Composite function of the Ex-ante and Ex-post LMP vectors: LMP = π(ˆx(z)) Proposed sensitivity matrix: Λ = π z = π }{{} ˆx Λ A ˆx z }{{} Λ B Λ A : Sensitivity matrix of LMPs to state estimates (Economic Impact) Λ B : Sensitivity matrix of state estimates to sensor data (Cyber Impact) A unified closed-form LMP sensitivity matrix Λ 29/51

Continuous Data Corruption Manipulates LMP s.t. min P gi N b i=1 C i (P gi ) N b N b λ(z a ) : P gi = τ(z a ) : i=1 µ(z a ) : F min l i=1 L di min ˆP g i (z a ) P gi N b Domino effect: z a i=1 ˆP max g i (z a ) i = 1,...,N b S li (P gi L di ) F max l l = 1,...,N l {ˆPmin } max g i (z a ), ˆP g i (z a ) {λ(z a ),µ(z a )} LMP(z a ) LMP(z a ) = λ(z a )1 Nb S T [µ max (z a ) µ min (z a )] 30/51

Derivation of Λ A : KKT Condition Perturbation Approach KKT equations (i) C B i(p gi ) Bg f λ + τ j A ji + µ l S li = 0 P gi j=1 l=1 N b N b (ii) P gi = L di i=1 i=1 N b (iii) A ji P gi = Ĉ j i=1 i = 1,...,N b j = 1,...,B g N b (iv) S li [P gi L di ] = D l l = 1,...,B f. i=1 Perturbed KKT equations ( ) Ci (P gi ) Bg (i) dp gi dλ + A ji dτ j P gi P gi j=1 }{{} M i N b N b (ii) dp gi = dl di i=1 i=1 N b (iii) A ji dp gi = dĉ j i=1 B f + S li dµ l = 0 i = 1,...,N b l=1 j = 1,...,B g N b N b (iv) S li dp gi = S li dl di l = 1,...,B f. i=1 i=1 For example, (ii) N b i=1 P g i = N b i=1 L d i = N b i=1 dp g i = N b i=1 dl d i 31/51

Derivation of Λ A : KKT Condition Perturbation Approach Perturbed KKT equations in matrix form dp M 1 Nb Υ g 1 T N b 0 0 dλ Υ T dτ 0 0 s = [ T T U 1 U ] [ dld 2 }{{} dĉ s }{{} dµ s Φ Ξ Sensitivity of lagrangian multipliers to estimated capacity limit dp g [ ] dλ dτ s = dld } Ξ 1 {{ Φ } = Λ dĉ p = [ ] Λ Ld ΛĈs = s Λ dµ p s Finally, Λ A is constructed with λ Ĉ s and µ s Ĉ s P g L d λ L d τ s L d µ s L d ] P g Ĉ s λ Ĉ s τ s Ĉ s µ s Ĉ s 32/51

Derivation of Λ B : Iterative State Estimation Equation Gauss-Newton iterative equation for state estimation dˆx k+1 = [G(ˆx k )] 1 H T (ˆx k )R 1 dz k }{{} Ψ(ˆx k ) [ dˆθ k+1 dˆv k+1 ] [ Ψˆθ(ˆx = k ) ΨˆV(ˆx k ) ] dz k Sensitivity of linearized real power estimates to sensor data dẑ r = Desired sensitivity matrix BS Pθ B Pθ B Fθ Λ B = dˆθ = BS Pθ B Pθ B Fθ BS Pθ B Pθ B Fθ Ψˆθ Ψˆθdz 33/51

Simulation Setup 12 13 14 11 10 6 9 G G G 8 7 1 5 4 2 G : Injection sensor : Flow sensor : Voltage magnitude sensor G 3 Figure : IEEE 14-bus system with a given measurement configuration. Table : Generator parameters in the IEEE 14-bus system. Bus P min (MW) P max (MW) ai(/mwh) bi(/(mw) 2 h) gi gi 1 0 332.4 20 0.043 2 0 140 20 0.25 3 0 100 40 0.01 6 0 100 40 0.01 8 0 100 40 0.01 34/51

Simulation Results Using a closed-form LMP sensitivity matrix Λ = Λ A Λ B, π n / z m 1 0 1 Bus 1 2 Bus 2 The most vulnerable bus 3 Bus 3 Bus 4 3 Bus 5 Bus 10 The most impacting measurement 8 Bus 13 4 1 2 3 4 5 6 7 8 9 10 11 12 Real Power Flow Measurement (a) π n / z m 0.4 0.3 0.2 0.1 0 Bus 1 0.1 Bus 2 Bus 3 0.2 Bus 4 Bus 5 0.3 Bus 10 Bus 13 0.4 1 2 3 4 5 6 7 8 9 10 11 12 Reactive Power Flow Measurement (b) 35/51

Key Observations 1 Sensitivity grouping property Identical positive or negative sensitivity bus group to data corruption 2 Economically sensitive physical and cyber assets Buses with LMP highly sensitive to data corruption. Significantly influential sensors on LMP change. 3 Impact of different types of sensor data on LMP A more significant impact of real power sensor data on LMP sensitivity 36/51

Part II-B: LMP Sensitivity to Network Topology Error Two types of topology error 1 2 Line Exclusion/ Inclusion 1 2 Bus Split/ Merging closed open 2 37/51

Part II-B: LMP Sensitivity to Network Topology Error Two types of topology error Attack scenario [4, Kim et al., 2013] 1 2 1 2,, (a) Without attack Line Exclusion/ Inclusion Bus Split/ Merging 1 2 1 2, 0 0, (b) With attack (line exclusion) closed open 2 [Continuous data sensor] Injection sensor Flow sensor [Discrete data sensor] Circuit breaker sensor ( Closed=0 ) Circuit breaker sensor ( Open=1 ) 37/51

Topology Data Attack Manipulates LMP s.t. min p i i G C i p i N b N b λ(z a ) : P gn = n=1 τ(z a ) : p min i µ(z a ) : F min l n=1 L dn p i p max i N b n=1 Ĥ l,n (z a )(P gn L dn ) F max l i G l = 1,...,N l Domino effect: z a Ĥl,n(z a ) {λ(z a ),µ(z a )} LMP(z a ) LMP(z a ) = λ(z a )1 Nb Ĥ(z a) T [µ max (z a ) µ min (z a )] 38/51

LMP Sensitivity Analysis to Topology Error Proposition 1 (A Closed-Form Shadow Price Expression) The shadow price µ l for the congested transmission line l: where µ l = C(j,i) H l (i,j) C(j,i) = C j C i : Marginal Unit Energy Costs Difference H l (i,j) = H l,i H l,j : Distribution Factors Difference 39/51

LMP Sensitivity Analysis to Topology Error (cont d) Corollary 2 (A Closed-Form LMP Sensitivity Index to Topology Error) LMP sensitivity index with respect to the line k status error (k l): where LMP k l = C(j,i)v k l ] T LMP k l = [ LMP l,1 k,..., LMPk l,nb v k l = [v k l,1,...,vk l,n b ] T, v k l,n = Hk l,n H k l (i,j) H l,n H l (i,j) Benefit: less computational time than exhaustive numerical simulations 40/51

LMP Sensitivity Analysis to Topology Error (cont d) Corollary 3 (a) vl,n k > 0 decreasing LMP at bus n with topology error A quick prediction of post-lmp direction by topology error (b) vl,n k > vk l,m LMP sensitivity at bus n is higher than at bus m A quick comparison of LMP sensitivity magnitude (c) Increasing C(j,i) increasing LMP sensitivity at any bus Guidelines for a bidding strategy of generation company 41/51

Simulation Setup 12 13 14 6 11 10 9 Table : Generator parameters of the IEEE 14-bus system. 1 5 7 8 4 Bus P min P max Marginal Cost 1 0MW 330MW 30/MWh 2 0MW 140MW 20/MWh 3 0MW 100MW 40/MWh 6 0MW 100MW 55/MWh 8 0MW 100MW 60/MWh 3 Line 5-6 is congested 2 : congested line 5-6 closed open open: line 4-5 exclusion Line 4-5 is excluded due to data corruption Figure : IEEE 14-bus system including bus-breaker model. 42/51

Topology Errors Significantly Change LMPs LMP(/MWh) 140 120 100 80 60 40 Without Topology Change With Topology Change 20 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Bus Location (a) LMP Sensitivity(/MWh) 35 30 25 20 15 10 5 0 5 10 SCED Result Analytical Result 15 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Bus Location (b) 43/51

LMP Sensitivities Under the Same Line 5-6 Congestion LMP Sensitivity(/MWh) 6 The most impacting 5 line/cbs 4 3 2 1 0 1 2 1 2 exclusion 1 5 exclusion 2 4 exclusion 6 12 exclusion 3 The most sensitive bus 6 4 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Bus Location The highest sensitivity at bus 6 to line 1-2, 1-5 and 2-4 exclusions Line 1-2 exclusion (blue plot) changes sensitivities the most 44/51

Part II: Remarks Main Contributions 1 New analytical frameworks to study real-time LMP sensitivity with respect to data corruption 2 Derivation of closed-form LMP sensitivity analysis tools economically sensitive buses to data corruption influential sensors and transmission lines on LMP change 3 Easily integrated with the existing EMS/MMS 45/51

Conclusions Impact of Data Integrity/Quality on Economic Dispatch Bad/Malicious Data State Estimation Economic Dispatch? Part I Data Attack on Look-Ahead Dispatch A market participant s perspective Feasible ramp-induced data (RID) attack strategy for: Undetectability Profitability Part II LMP Sensitivity to Data Corruption A system operator s perspective Analytical tools for LMP sensitivity quantification with respect to: Continuous Data Corruption Discrete Data Corruption 46/51

The Bigger Picture Data Quality, Integrity, Privacy-Aware Multi-Scale Decision Making Tool MMS EMS Sensor Current Research - Data quality - Data integrity DMS µgems BEMS HEMS Future Research - Data quality - Data integrity - Data privacy DMS: Distribution Management System, µgems: Microgrid Energy Management System BEMS: Building Energy Management System, HEMS: Home Energy Management System 47/51

Multidisciplinary Approach to Future Work A Unified System-Wide Monitoring Tool for Multi-Scale Spatial Data Quality Analysis Smart Meter Solar Power Electric Vehicle Energy Storage Design of interface between EMS and DMS Performance index for the impact analysis of distribution data quality Power system engineering, operations research/optimization Smart Grid Cyber Security and Privacy Data integrity attack modeling and countermeasures Smart meter data privacy-preserving algorithm Power system engineering, computer networking, cyber security, statistical signal processing 48/51

References [1] Y. Liu, M. K. Reiter, and P. Ning, False data injection attacks against state estimation in electric power grids, Proc. 16th ACM Conf. Comput. Commun. Security, 2009. [2] O. Kosut, L. Jia, R. Thomas, and L. Tong, Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures, 2010 First International Conference on Smart Grid Communications, October 2010. [3] T. T. Kim, and H. V..Poor, Strategic Protection Against Data Injection Attacks on Power Grids, IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326 333, May 2011. [4] J. Kim and L. Tong, On Topology Attack of a Smart Grid: Undetectable Attacks and Counter Measures, IEEE J. Selected Areas in Communications, July 2013. [5] L. Xie, Y. Mo, and B. Sinopoli, Integrity Data Attacks in power market operations, IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 659 666, December 2011. [6] A. J. Conejo, E. Castillo, R. Minguez, and F. Milano, Locational marginal price sensitivities, IEEE Trans. Power Syst, vol. 20, no. 4, pp. 2026 2033, November 2005. [7] F. Li and R. Bo, DCOPF-based LMP simulation: Algorithm, comparison with ACOPF, and sensitivity, IEEE Trans. Power Syst, vol. 22, no. 4, pp. 1475 1485, November 2007. 49/51

Publications (During Ph.D. Study) Journal [1] D.-H Choi and L. Xie, Sensitivity Analysis of Real-Time LocationalMarginal Price to SCADA Sensor Data Corruption, IEEE Trans. Power Syst (accepted). [2] D.-H Choi and L. Xie, Ramp-Induced Data Attacks on Look-ahead Dispatch in Real-time Power Markets, IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1235 1243, September 2013. [3] L. Xie, D.-H. Choi, S. Kar and H. Vincent Poor Fully Distributed State Estimation for Wide-Area Monitoring Systems, IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1154 1169, September 2012. [4] S. Wang, L. Cui, J. Que, D.-H. Choi, X. Jiang, S. Cheng and L. Xie A Randomized Response Model for Privacy Preserving Smart Metering, IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1154 1169, September 2012. Conference Proceedings [5] D.-H Choi and L. Xie, Impact Analysis of Locational Marginal Price Subject to Power System Topology Errors, 2013 Fourth International Conference on Smart Grid Communications, October 2013. [6] D.-H Choi and L. Xie, Malicious Ramp-Induced Temporal Data Attack in Power Market with Look-Ahead Dispatch 2012 Third International Conference on Smart Grid Communications, November 2012 (The Best Paper Award). [7] D.-H Choi and L. Xie, Fully Distributed Bad Data Processing for Wide Area State Estimation, 2011 Second International Conference on Smart Grid Communications, October 2011. [8] L. Xie, D.-H. Choi and S. Kar, Cooperative distributed state estimation: Local observability relaxed, Proc. IEEE Power and Energy Society General Meeting, Detroit, 2011. Book Chapter [9] L. Xie, D.-H. Choi, S. Kar and H. Vincent Poor Bad/malicious data detection in distributed power system state estimation, in E. Hossain, Z. Han, and H. V. Poor, editors, Smart Grid Communications and Networking, Cambridge University Press, 2012 (to appear). 50/51

Thank You! 51/51