Entry Tan:2015:IAR from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Tan:2015:IAR,
author = "Rui Tan and Varun Badrinath Krishna and David K. Y.
Yau and Zbigniew Kalbarczyk",
title = "Integrity Attacks on Real-Time Pricing in Electric
Power Grids",
journal = j-TISSEC,
volume = "18",
number = "2",
pages = "5:1--5:??",
month = dec,
year = "2015",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2790298",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Mon Dec 21 18:18:49 MST 2015",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Modern information and communication technologies used
by electric power grids are subject to cyber-security
threats. This article studies the impact of integrity
attacks on real-time pricing (RTP), an emerging feature
of advanced power grids that can improve system
efficiency. Recent studies have shown that RTP creates
a closed loop formed by the mutually dependent
real-time price signals and price-taking demand. Such a
closed loop can be exploited by an adversary whose
objective is to destabilize the pricing system.
Specifically, small malicious modifications to the
price signals can be iteratively amplified by the
closed loop, causing highly volatile prices,
fluctuating power demand, and increased system
operating cost. This article adopts a control-theoretic
approach to deriving the fundamental conditions of RTP
stability under basic demand, supply, and RTP models
that characterize the essential behaviors of consumers,
suppliers, and system operators, as well as two broad
classes of integrity attacks, namely, the scaling and
delay attacks. We show that, under an approximated
linear time-invariant formulation, the RTP system is at
risk of being destabilized only if the adversary can
compromise the price signals advertised to consumers,
by either reducing their values in the scaling attack
or providing old prices to over half of all consumers
in the delay attack. The results provide useful
guidelines for system operators to analyze the impact
of various attack parameters on system stability so
that they may take adequate measures to secure RTP
systems.",
acknowledgement = ack-nhfb,
articleno = "5",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- adequate,
2(1)65,
17(2)8
- adopt,
12(4)21,
16(4)15,
17(4)14
- advanced,
14(1)5,
16(1)2,
18(2)7
- adversary,
10(4)6,
11(3)13,
11(4)19,
11(4)23,
13(3)21,
14(4)28,
15(2)9,
15(3)12,
15(3)14,
17(2)7,
17(3)9,
17(3)11,
18(1)4,
18(4)14
- all,
1(1)93,
2(2)159,
2(3)332,
2(4)416,
10(1)4,
10(2)5,
10(4)2,
10(4)4,
11(2)1,
11(2)3,
11(2)4,
11(2)5,
11(2)6,
11(3)13,
11(4)18,
11(4)20,
11(4)22,
12(2)10,
12(3)18,
13(1)10,
13(3)25,
13(3)28,
13(4)38,
13(4)41,
14(1)6,
14(1)14,
14(3)27,
15(1)4,
15(2)9,
15(3)14,
15(4)16,
15(4)17,
16(1)4,
17(1)2,
17(3)9,
17(3)11,
18(1)2
- amplified,
12(4)21
- analyze,
2(3)230,
2(4)416,
9(4)421,
10(1)4,
10(3)9,
10(4)5,
11(2)1,
11(2)3,
11(3)14,
11(3)15,
11(4)23,
12(3)16,
12(3)17,
13(3)27,
15(1)5,
15(2)8,
15(3)11,
16(3)10,
16(4)16,
16(4)17,
18(1)1,
18(1)2,
18(1)3
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
10(4)4,
11(1)3,
11(3)15,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)35,
13(4)36,
14(1)8,
14(3)23,
14(4)29,
15(1)4,
15(3)12,
15(3)13,
15(4)15,
15(4)17,
15(4)18,
16(2)5,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)7,
18(3)11
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- basic,
2(4)354,
9(4)461,
10(1)4,
10(2)8,
11(2)3,
11(3)12,
12(2)8,
13(3)27,
14(3)26,
14(4)31,
15(3)12,
17(4)13
- behavior,
2(3)295,
2(4)354,
10(4)6,
11(4)19,
12(1)5,
12(3)14,
12(3)19,
14(1)10,
14(4)32,
15(1)2,
15(2)10,
15(3)14,
16(3)12,
17(2)8,
18(2)7,
18(3)9
- being,
9(4)421,
10(4)3,
11(2)2,
11(3)14,
11(3)15,
12(2)12,
12(3)17,
13(4)35,
14(4)32,
16(2)6,
18(1)1
- causing,
15(4)16
- characterize,
1(1)26,
2(3)295,
12(1)2,
12(1)5,
14(3)23
- class,
2(2)177,
9(4)391,
10(1)2,
10(1)3,
10(4)5,
11(2)1,
11(4)19,
12(1)2,
12(3)18,
12(4)20,
13(3)21,
14(1)13,
16(1)2,
16(4)17,
18(4)13
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
10(4)6,
11(1)2,
11(2)2,
11(2)3,
11(3)14,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(1)5,
15(2)6,
15(2)7,
15(2)9,
15(3)14,
16(3)10,
16(4)15,
17(1)4,
17(3)9,
18(2)7
- compromise,
2(2)159,
2(3)230,
11(4)22,
14(1)7,
14(4)28,
14(4)32,
15(1)5,
15(2)9,
17(2)7,
17(3)11
- condition,
1(1)26,
2(3)295,
10(4)1,
11(1)3,
11(2)2,
11(4)21,
12(2)11,
13(3)26,
16(1)3,
17(1)2,
18(1)2,
18(2)6
- consumer,
10(4)3,
14(1)13
- cost,
4(1)72,
9(4)461,
11(4)20,
12(2)13,
13(3)22,
14(1)2,
14(1)12,
14(2)17,
16(4)16,
17(3)11,
18(1)2,
18(2)7
- create,
12(2)11,
12(2)12,
14(1)9,
18(1)1,
18(4)13
- delay,
11(4)19,
11(4)20,
11(4)23
- demand,
12(2)13,
15(2)10,
17(1)4
- dependent,
17(4)13
- efficiency,
9(4)461,
10(2)6,
10(3)12,
11(2)1,
11(4)17,
11(4)18,
11(4)23,
12(1)3,
13(4)30,
13(4)31,
13(4)33,
15(1)4,
15(2)9,
16(4)17
- either,
2(4)390,
10(1)2,
11(1)2,
11(2)3,
11(4)18,
11(4)23,
12(1)2,
13(4)33,
14(1)9,
15(3)14,
15(4)17,
16(4)15,
16(4)16,
16(4)17,
17(1)2
- electric,
14(1)13
- essential,
10(4)1,
10(4)2,
11(2)2,
13(4)32,
13(4)34,
15(3)14,
18(1)2
- exploited,
12(2)12,
13(4)31
- feature,
2(1)34,
2(2)177,
2(3)295,
3(4)227,
10(1)2,
10(3)12,
11(4)22,
13(3)24,
13(4)32,
13(4)35,
13(4)41,
16(2)5,
16(2)7,
16(4)13,
16(4)14,
17(3)10,
17(4)16,
18(3)11
- formulation,
11(4)19,
16(4)17
- fundamental,
10(2)5,
11(4)18,
14(1)4,
14(4)31
- grid,
11(1)3,
14(1)13,
16(3)11,
18(2)7
- guidelines,
10(4)5
- half,
16(3)10,
17(3)10
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)7,
18(4)13
- highly,
4(1)72,
13(3)24,
15(1)4,
18(1)1
- impact,
10(4)6,
11(4)17,
12(3)14,
13(3)22,
13(4)35,
13(4)36,
15(1)4,
16(2)8,
16(4)17,
17(3)11
- improve,
11(2)3,
11(4)17,
12(1)3,
12(3)19,
15(1)4,
16(1)4,
16(3)10,
18(1)1,
18(3)10
- increased,
10(4)6,
14(1)7,
17(4)15
- integrity,
1(1)26,
1(1)93,
2(1)65,
2(1)105,
3(1)51,
10(2)8,
10(3)11,
11(3)14,
12(1)6,
12(3)14,
13(1)4,
13(1)5,
13(3)25,
14(3)24,
17(2)6,
17(4)15
- iteratively,
11(4)22,
15(4)15,
18(4)12
- linear,
11(2)1,
11(3)13,
11(4)21,
12(3)16,
12(3)18,
12(4)20,
14(4)29,
15(1)4,
16(4)17,
17(3)11,
18(2)7
- malicious,
2(2)177,
2(3)295,
10(3)11,
10(4)6,
11(2)2,
11(3)13,
11(3)14,
11(3)15,
11(4)22,
11(4)23,
12(2)12,
12(3)14,
14(1)13,
15(1)2,
15(4)17,
16(2)6,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13
- may,
2(2)138,
2(2)177,
9(4)391,
10(3)12,
10(4)2,
11(2)2,
11(2)5,
11(3)12,
11(4)18,
11(4)21,
12(1)5,
12(2)8,
12(3)15,
12(3)16,
13(1)10,
13(3)22,
13(3)25,
13(4)35,
13(4)38,
13(4)40,
15(2)10,
16(1)4,
17(1)2,
17(1)4,
18(1)1
- measure,
2(3)269,
2(3)295,
9(2)162,
10(4)5,
11(4)17,
12(3)17,
12(4)22,
13(3)22,
13(4)36,
15(1)2,
16(2)6,
17(1)1,
18(1)1
- modern,
10(3)10,
13(3)22,
15(2)9,
17(4)16
- modification,
9(4)461,
12(2)8,
12(3)18,
13(3)20,
13(3)25,
16(2)6
- mutually,
10(2)5,
16(2)5,
17(2)6
- namely,
12(2)13,
13(1)10,
13(3)26,
17(3)12,
18(1)4
- objective,
8(1)78,
13(4)36
- old,
2(3)332
- only,
2(3)230,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)16,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)8
- operating,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
4(1)72,
5(1)36,
11(4)20,
12(3)14,
13(1)10,
13(4)30,
14(1)6,
14(1)8,
14(3)24,
15(4)16,
17(4)14,
18(3)11
- operators,
14(1)8,
14(1)9,
14(4)32
- parameter,
9(4)461,
10(4)5,
11(3)13,
12(1)2,
15(1)5,
17(3)10
- power,
1(1)93,
9(2)162,
10(4)1,
12(2)10,
14(1)7,
14(1)8,
14(1)13,
15(1)2,
18(2)7
- price,
17(4)15
- pricing,
17(3)10
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)7,
18(4)13,
18(4)14
- providing,
10(1)3,
11(4)18,
12(3)16,
13(4)31,
13(4)41,
18(3)10
- Real-Time,
4(1)1
- real-time,
14(4)31,
15(4)17
- recent,
2(1)65,
2(2)138,
10(2)8,
10(3)9,
11(1)2,
11(4)22,
12(1)2,
12(2)12,
14(1)7,
14(1)14,
14(4)29,
15(1)3,
16(2)7,
16(3)10,
18(1)1,
18(2)7,
18(4)13
- reducing,
2(3)295,
11(4)18,
14(1)3,
15(2)6,
15(4)17
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- risk,
2(3)269,
3(1)1,
10(1)3,
17(1)1
- secure,
1(1)93,
2(2)159,
2(2)177,
2(3)332,
2(4)390,
4(1)72,
4(2)103,
4(2)134,
4(4)321,
5(3)290,
6(4)472,
7(4)523,
9(1)1,
9(1)31,
9(1)94,
9(2)162,
9(4)461,
10(2)8,
10(3)10,
10(3)11,
10(4)3,
10(4)6,
11(2)4,
11(2)5,
11(3)13,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
12(4)22,
13(1)9,
13(3)21,
13(3)28,
13(4)29,
14(3)23,
14(3)27,
14(4)31,
15(2)6,
15(2)9,
16(3)11,
16(4)15,
17(2)5,
17(2)6,
17(4)13,
18(4)13
- shown,
2(1)3,
11(1)2,
11(2)3,
12(3)16,
13(3)25,
13(4)33,
14(1)7,
15(2)7,
15(2)10,
15(3)14,
18(2)6
- signal,
11(4)22,
11(4)23
- small,
2(3)295,
10(3)11,
10(4)3,
10(4)5,
12(1)6,
12(3)15,
12(3)16,
12(3)18,
12(4)21,
14(1)12,
15(1)3,
15(1)4,
15(4)15,
16(1)1,
17(4)15
- specifically,
9(2)181,
10(3)12,
11(1)4,
11(3)16,
12(1)6,
12(2)12,
12(3)16,
15(2)6,
15(2)8,
15(4)16,
16(4)17,
17(4)13,
18(2)6,
18(3)9
- stability,
15(2)7
- study,
2(3)230,
2(4)416,
7(2)206,
10(2)5,
10(4)5,
11(1)3,
11(2)3,
11(4)23,
12(1)6,
12(3)14,
12(4)20,
13(4)40,
14(1)7,
14(2)18,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(2)10,
15(3)13,
17(1)1,
17(2)7,
17(3)12,
17(4)14,
18(1)1,
18(1)2,
18(1)4,
18(2)7,
18(3)9,
18(4)13
- subject,
1(1)26,
9(2)162,
9(4)421,
11(1)3,
11(1)4,
11(3)12,
13(3)26,
14(1)7,
15(3)12,
17(1)2,
17(4)14
- take,
2(4)416,
10(4)1,
12(3)17,
12(3)19,
12(4)22,
13(3)20,
16(2)5,
16(3)9,
16(3)10,
16(4)15,
17(3)10,
18(1)4,
18(4)12
- technology,
4(2)103,
8(4)349,
10(1)1,
11(1)2,
11(4)19,
16(3)10,
17(1)3,
17(2)5,
17(3)11
- threat,
7(4)489,
10(3)11,
11(2)2,
11(2)3,
12(2)12,
14(1)7,
14(3)24,
15(1)2,
15(2)7,
16(2)6,
16(2)8,
16(3)9,
17(4)16,
18(2)7,
18(4)12,
18(4)14
- Time, Real-,
4(1)1
- time, real-,
14(4)31,
15(4)17
- two,
1(1)26,
2(4)416,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
10(4)4,
11(2)1,
11(2)4,
11(2)6,
11(3)13,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(1)5,
15(2)6,
15(3)11,
15(3)12,
16(1)1,
16(1)2,
16(1)4,
16(3)9,
16(3)10,
16(4)15,
17(4)13,
18(4)12,
18(4)13,
18(4)14
- used,
1(1)3,
2(1)65,
2(4)416,
7(2)319,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)2,
11(1)3,
11(2)3,
11(3)14,
11(3)15,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(1)5,
15(3)12,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(2)7,
17(3)9,
17(4)13,
18(1)3,
18(2)6,
18(3)9,
18(4)13,
18(4)14
- useful,
10(3)9,
11(4)20,
12(1)5,
12(1)6,
12(4)20,
13(4)39,
14(1)14,
15(2)10,
18(3)10,
18(3)11
- value,
10(3)10,
10(4)1,
10(4)4,
11(2)5,
11(4)18,
12(1)6,
12(2)10,
13(1)10,
14(1)9,
14(1)14,
15(1)4,
15(2)9,
15(4)17,
16(1)1,
17(3)10,
18(1)1,
18(3)10
- various,
10(1)3,
10(3)11,
10(4)2,
11(1)3,
11(2)3,
11(2)6,
11(3)14,
11(3)15,
12(1)4,
13(4)35,
14(1)13,
14(4)28,
18(1)1
- well,
1(1)93,
10(1)2,
10(2)8,
10(3)11,
10(3)12,
11(1)3,
11(1)4,
11(2)5,
11(3)15,
12(1)1,
12(1)3,
12(1)5,
12(2)10,
13(1)10,
13(3)26,
14(1)3,
14(1)5,
14(1)14,
14(3)23,
15(3)12,
15(4)15,
15(4)16,
15(4)18,
16(2)8,
17(3)9,
17(3)10,
17(3)11,
18(1)3
- whose,
11(4)17,
15(1)2,
16(4)17