Abstract
This paper is concerned about the impact of network parameter errors on the reliable operation and management of electricity markets. Specifically, the paper investigates the so-called critical parameters in a network model whose errors cannot be detected or estimated due to the lack of local measurement redundancy. Due to this property of critical parameters, it will be impossible to detect, identify and correct errors in these parameters. Given the fact that electricity market applications are heavily model-dependent, the locational marginal prices (LMPs) can be shown to be seriously distorted in the presence of critical parameter errors. Furthermore, if such errors are maliciously injected by adversaries, they will go undetected. Meanwhile, prices and revenues associated with power transactions may be strategically manipulated. An approach for quantifying the impact of critical parameters on the management of electricity markets is proposed. Conditions related to network topology and measurement configuration leading to the appearance of critical parameters are classified, and meter placement strategies for avoiding critical parameters are presented as well. Simulation results obtained by using IEEE test systems are given to verify the proposed analysis and design methods.
Keywords
Anomaly detection; cyber security; electricity market; parameter estimation; power system modeling; state estimation
MAINTAINING an accurate database of model parameters is crucial for the reliable execution of a number of power network applications such as state estimation (SE), optimal power flow, contingency analysis, protective relaying, and control. In deregulated electricity markets, the market settlement is carried out by solving an economic dispatch (ED) problem. The solution yields the optimal output for each generator, as well as the energy price at each node in the network, known as the locational marginal price (LMP) [
With heavier reliance on communication and information systems, the cyber security of power system operation draws increasing attention in recent years. Intrusion events into various parts of the system with various objectives have been reported in different countries [
Even through establishing high security for a strategic subset of power system measurements has been extensively discussed, there has not been much work reported on the security of the power system model database or its impact on system operation. This database resides and is managed at the energy management systems (EMSs) of control centers, which are generally better protected and thus more difficult to access compared with the networks at the substation level. However, such possibilities cannot be discounted or completely ignored. In fact, the cyber attack against Ukraine power grid in December 2015 [
1) While the access to model databases in control centers is more difficult than that to substation measurements, it is much easier to introduce a one-time change to a certain set of model parameters than to continuously generate plausible real-time false data in a large measurement set.
2) The model database can be accessed and modified by using the credentials of internal personnel, while there is no legitimate means to modify the measurement dataset even for internal personnel.
3) While false data in real-time measurements can only affect online applications, parameter errors can affect both online and offline applications, thus will have a wider impact on power system operation.
In this paper, a new security vulnerability of the model database is identified, and its impact on electricity markets is demonstrated. It involves the so-called “critical parameters” in power network models, which have been formally defined and studied in a recent publication [
In view of the vulnerabilities associated with critical parameters, an effective method for ranking the significance of impacts from different critical parameters on the market outcomes in a given system is subsequently presented in this paper. In order to eliminate critical parameters, they are further classified into two distinct groups: those associated with critical measurements (or critical k-tuples), and those associated with irrelevant branches. The approaches to meter placement are then discussed and shown to be effective for converting critical parameters into non-critical ones. Simulation results on the IEEE 57-bus system are given to illustrate the analyses and methods proposed in this paper.
The contributions of this paper are summarized below:
1) The conceptual linkage between the critical parameter issues in model error identification and the security of electricity market operation is explicitly established, which has been overlooked in the existing body of literature.
2) An effective approach to evaluating the impacts of critical model parameters on the operation of electricity markets is developed.
3) The conditions for existence of critical parameters are classified into two categories, and the guidelines of meter placement for eliminating the criticality of these parameters are proposed and discussed.
The motivations of cyber attacks can be broadly classified into two categories: inflicting heavy damages to power systems, and gaining economic benefits without being detected. The analysis presented in this paper focuses on the security threats based on the second type of motivations.
Compared with the related work [
It should also be noted that it is possible to have simultaneous measurement and model parameter errors, but measurement errors are not explicitly discussed in this paper, partly because they are irrelevant to the analysis of critical parameters, and partly because this problem has been well addressed in the previous work such as [
The rest of this paper is organized as follows. In Section II, the formulation and solution of the parameter error detection and identification problem are reviewed. In Section III, the ED problem and LMPs are briefly described. Section IV introduces the concept of critical parameters, shows its impact on the electricity markets, and proposes an approach to quantifying the impact of critical parameters. Section V further studies various circumstances of critical parameters, and proposes a simple meter placement approach to handle them. Simulation results in the IEEE 57-bus system are given in Section VI. Finally, Section VII concludes the paper.
In general, the principle of detecting model parameter errors is based on checking the network model against the measurements. Based on the understanding of measurement error distribution, statistical tests can be designed to detect the inconsistency between the measurements and the model parameters. The chi-square test [
Suppose there are n state variables and m measurements in a power system. Consider the set of measurement equations:
(1) |
where z is the measurement vector; x is the state vector; e is the measurement error vector; p is the parameter vector; and h is the nonlinear function linking the state variables to the measurements. Assuming Gaussian distribution for the measurements, the maximum likelihood estimator of the state variables can be obtained by solving the WLS SE problem given below [
(2) |
where R is the covariance matrix associated with the measurement errors; and p0 is the vector containing the original values of the parameters. The equality constraints are equivalent to assuming that all parameter values are error-free. At the solution point
(3) |
For the
(4) |
where is the standard deviation of error of the
(5) |
If the parameters are actually error-free and the measurement errors obey normal distributions, will approximately have a chi-square distribution with degrees of freedom:
(6) |
With a specified confidence level , a threshold t can be set up such that
(7) |
where is the chi-square cumulative distribution function.
If , it can be inferred with the false alarm probability that either the model parameters are erroneous or the measurements contain gross errors. Hence, it can be used as an approach to the detection of model parameter errors.
For more accurate detection and identification of model parameter errors, the LNLM test has later been developed [
The Lagrangian formulation of (2) can be written as:
(8) |
where is the Lagrange multiplier vector associated with the equality constraints p = p0. At the point of solution, the first-order necessary condition must be met:
(9) |
where is the Jacobian matrix of the measurement vector with respect to the parameter vector p.
The measurement residual vector is defined as:
(10) |
Then, the Lagrange multiplier vector can be recovered by:
(11) |
In the absence of parameter errors, the measurement residuals can be linked to the measurement errors as [
(12) |
(13) |
where S is the sensitivity matrix; I is an identity matrix; and H is the Jacobian matrix of h with respect to the state vector. Hence, the Lagrange multipliers will have a zero mean:
(14) |
where is the expectation function.
The covariance matrix of the Lagrange multipliers can be expressed as:
(15) |
It is known that the covariance matrix of the residuals can be expressed as:
(16) |
Combining (15) and (16) will yield
(17) |
Denoting as , the normalized Lagrange multiplier (NLM) associated with the
(18) |
where and are the elements of and , respectively.
In the absence of parameter errors, it should follow a standard normal distribution. Hence, for a specified confidence level , a threshold t can be set up such that
(19) |
where is the standard normal distribution function.
If for any i, , an error is detected, and the parameter associated with the LNLM will be identified as the erroneous parameter.
In current industrial practice, the electricity market is settled by solving an ED problem, where a DC power flow model is used. For simplicity, consider the lossless ED problem:
(20) |
where L is the number of branches; N is the number of buses; cj is the marginal generation cost at bus j; sj is the power generation at bus j; dj is the load at bus j; and are the lower and upper limits of the power flow along branch l determined by security constraints, respectively; and are the lower and upper limits for the power generation at bus j, respectively; is an entry in the ISF matrix representing the incremental power flow along branch l induced by per-unit increment of power injection at bus j; is the Lagrange multiplier associated with the power balance constraint; and are Lagrange multipliers associated with the generation capacity constraints; and and are the Lagrange multipliers associated with the branch capacity constraints. The determination of the ISF matrix is solely dependent on the network model:
(21) |
where is the primitive susceptance matrix; Ais the branch-bus incidence matrix; and B is the nodal susceptance matrix. Since the DC power flow model is adopted, only branch reactance is involved in the computation of .
The solution of (20) will not only provide the generation dispatch that yields the lowest total cost for the entire system, but also yield the LMPs as by-products. The LMP at a given bus j can be recovered by [
(22) |
where , , and are the values of , , and at the solution point of (20), respectively. and are also known as the shadow prices associated with the congestion along the corresponding branch. They represent the increment of the total cost with per-unit incremental change of the power flow limit of the branch. When the power flow along a branch reaches its limit, i.e., the corresponding inequality constraint is binding, the shadow price or will be nonzero. When there is no congestion across the system, all the terms associated with the congestion shadow prices will be zero, and will be the LMP for all nodes. Obviously, the branch congestion pattern has a significant impact on the LMPs.
Although various types of methods for detection and estimation of parameter errors have been proposed, their capabilities are always limited by the redundancy of measurements. The concept of critical parameters is used to describe one type of such situations [
(23) |
where pe is the parameter error vector.
Critical parameters can be identified by checking the rows or columns of the matrix . For the
(24) |
Hence, it will not be reflected in . Furthermore, since , it is also impossible to evaluate the NLM associated with this parameter.
Note that the incapability of detecting an error in a critical parameter is not a limitation of the LNLM approach, but rather a limitation of the measurement configuration of the system. This issue cannot be resolved by developing an alternative method, if the measurement configuration has already been specified. For example, if the augmented SE approach [
Apparently, if errors are present in critical parameters, they are likely to remain in the database permanently without being detected. If it occurs, the LMPs in the electricity market can be biased. From (22), it can be observed that the impact of undetectable parameter errors on LMPs are three-fold:
1) Congestion patterns. In the ED solution, the Lagrange multipliers (shadow prices) or will be zero if the corresponding branches are not congested, i.e., the corresponding flow constraints in (20) are not binding. On the other hand, or will be nonzero if the corresponding branches become congested, i.e., the corresponding flow constraints in (20) become binding. In the presence of critical parameter errors, those flow constraints which are not actually binding can appear to be binding, and vice versa. In other words, with parameter errors, branches that are not actually congested can appear congested, and vice versa. This bias will abruptly change Lagrange multipliers or , from zero to nonzero, or the other way around, creating a jump in the second or third term of (22), thus creating a jump in the LMPs.
2) Congestion shadow prices. For those branches that are congested, the Lagrange multipliers or indicate the sensitivity of the objective function to the binding constraints in the ED problem (20). In other words, they show how sensitive the total generation cost is, if the flow limit of the congested branch changes. When parameter errors are present, the shape of the flow constraints will change, since their expressions contain the ISFs which are determined by the model parameters. As the flow constraints are reshaped, the sensitivity of the objective function to the constraints will also change, which is then reflected in the changes of the Lagrange multipliers (shadow prices) or . This will result in continuous (instead of abrupt) changes of the second or third term of (22), thus affecting the LMPs.
3) ISFs on their own. Besides exerting indirect influences on LMPs through the Lagrange multipliers or , the ISFs also appear in (22) by themselves. This implies that even with specified shadow prices of congested branches (fixed or ), the change of ISFs will still influence the second and third terms of (22), thus contributing to the distortion of LMPs. The interpretation for such influences is that ISFs represent the contributions of incremental bus injections to incremental branch flows, thereby representing the effect of selling or purchasing electricity at a specific bus on the degree of congestion in a specific branch.
Therefore, there may be two types of situations jeopardizing electricity market operation:
1) Random errors in critical parameters due to natural or unintentional reasons such as device aging, variation of ambient conditions, unreported device status changes, or human entry errors. An unfair trading environment will be formed for different market participants.
2) False values in critical parameters injected by cyber adversaries. This can occur when credentials of internal personnel are leaked to cyber adversaries, and the model parameter database is hacked. In this case, electricity market operation can be manipulated to create unlawful economic benefits for cyber adversaries.
In order to evaluate the impacts of critical parameter errors on market operation, the relationships between critical parameters and market LMPs should be obtained. Such relationships are very complicated: they are discontinuous at points where the congestion pattern is changed. Therefore, it is very difficult, if not impossible, to derive this relationship in a closed-form. In order to find this relationship, numerical analysis is developed and exploited in this paper. This analysis is important, since not all critical parameters may significantly impact market operation, and only those with high impact need to be treated by additional measures. In this case, the worse-case analysis is applied: for a given system with its typical power flow profile, the greatest deviations of LMPs resulting from possibly undetectable errors are found for each critical parameter.
The steps for obtaining the relation between LMPs and errors in critical parameters, as well as identifying the critical parameters with high impacts on market operations, are summarized as below.
Step 1: for a given system, denote the set of bus numbers as N. The LMPs in the original case can be obtained by doing the following.
1) Set all the parameters at their original values, and form ISF matrix using (21).
2) Solve the ED problem (20).
3) Compute the LMPs for each node of the system using (22). Denote the LMP of bus j as .
Step 2: form matrix using (17).
Step 3: identify all the critical parameters by identifying the null columns of . Since the DC power flow model is applied in the market analysis, only reactance-type parameters need to be considered. Denote the critical parameter set as .
Step 4: for each critical parameter, determine its plausible interval using the rules of thumb. A simple example is that line reactance cannot be negative. In addition, typical ranges of reactance per length for overhead transmission lines of a given voltage level are readily known, and based on the estimated lengths of the lines, the plausible interval for the reactance of each line can be determined. Denote the plausible interval of parameter pi as .
Step 5: for each critical parameter pi, do the following.
1) Select an increment , such that (). Set parameter error step index .
2) Set , and form ISF matrix using (21).
3) Solve the ED problem (20).
4) Compute the LMPs for each bus of the system using (22). Denote the LMP of bus j as .
5) Compute the deviation of the LMPs due to the parameter error: .
6) Find the largest differences of LMP deviations between different nodes when :
(25) |
7) If , set , and go to 2); otherwise, find the largest difference of LMP deviations between different nodes induced by possible errors in critical parameter pi:
(26) |
8) Proceed to the next critical parameter in .
Step 6: rank all the critical parameters in according to , and the parameters corresponding to greater values are those with higher impact on the security of electricity market operation.
The whole procedure is illustrated in

Fig. 1 Flow chart for identifying high-impact critical parameters.
It should be mentioned that the computational efficiency of the above procedure is not considered as a major factor limiting its implementation. The reasons are two-fold.
1) Searching for the high-impact critical parameters is not a time-sensitive task. It is performed in the time scale of system planning (months), not in the time scale of system operation.
2) The determination of the impact of each individual parameter is completely independent, thus fully parallel or distributed computing architecture can be used if necessary. Specifically, Step 5 of the procedure, which carries a vast majority of computational burden, can be performed fully in parallel for each critical parameter pi.
Another concept related to critical parameters is the “critical k-tuples” of parameters. The definitions and properties of “critical k-tuples” are also given in [
Finally, it should be mentioned that the LMP deviations resulting from parameter errors will change with respect to load scenarios. However, as the principle of analysis remain unchanged, the security assessment framework presented above can be immediately extended to incorporate multiple load scenarios. For example, the system operator may pick the load curve of a typical day, and the index defined in (26) can be evaluated for each time interval of the day: , where D is the number of intervals. Finally, the comprehensive security risk index can be obtained by summing up all the entries of , because when a permanent parameter error is introduced, the total distortion of market revenue of a day will be the sum of the distortion of the market revenues during each interval. If needed, the proposed security assessment procedure for critical parameters can also be extended to AC/DC power systems. The SE problem (2) and the ED problem (20) have to be replaced by their respective formulations incorporating DC components, which have been studied in detail in [
Based on the above analysis, meter placement can be developed for converting the critical parameters which have potential great effects on the market to non-critical parameters, as will be discussed in the next section.
In order to develop methods for addressing the critical parameter issue, it is important to understand how they may occur in a network. Insights can be gained by looking at the expression of the Lagrange multipliers associated with parameter errors (11). For the
(27) |
where and are the elements of r and Hp, respectively.
Actually, the Jacobian matrix Hp is a sparse matrix, and in its
(28) |
Based on (28), it can be observed that two major categories of critical parameters exist. They will be referred to as “SE-relevant critical parameters” and “SE-irrelevant critical parameters”.
In [
Similar situations can be found for model parameters. Based on (28), the simplest and most common situation is when , but all the measurements in are critical measurements, as shown in (29), since the residuals of critical measurements are identically zero.
(29) |
In this case, although this parameter is associated with some measurements, its Lagrange multiplier will be identically zero, hence its error cannot be detected. Meanwhile, since it still appears in measurement functions, the state estimate can be significantly biased by its error. Therefore, its properties are exactly analogous to the properties of a critical measurement. More complicated situations of this type appear when a parameter is associated with a critical pair (or more generally, a k-tuple) of measurements (the definitions can be found in [
(30) |
In this paper, the critical parameters which may affect the SE solution are defined as SE-relevant critical parameters.
Definition 1: for a critical parameter pi, if , this parameter is referred to as a SE-relevant critical parameter.
Remark 1: a SE-relevant critical parameter can be eliminated by turning at least one of the associated critical measurements into non-critical, or breaking at least one of the associated critical pair/k-tuple of measurements.
The rationale for Remark 1 is straightforward. If , and it is converted into a non-critical measurement, doesn’t hold; and since , doesn’t hold any more, thus pi becomes non-critical. A similar conclusion can be drawn for more complicated situations when a critical pair/k-tuple of measurements is broken and (30) no longer holds.
Obviously, based on the above analysis, the problem of removing SE-relevant critical parameters is converted into the problem of removing the criticality of the associated measurements. For the latter, meter placement approaches have been developed in literature. For example, the method described in [
Based on (28), it can be observed that the other type of situations that can lead to critical parameters is the absence of associated measurements. Specifically, if , then there will be no term on the right-hand side, thus (30) can be rewritten as:
(31) |
Consequently, any error in this parameter will be undetectable. When a model parameter does not appear in any of the measurement functions, it means that it is associated with an “irrelevant branch” [

Fig. 2 An example of irrelevant branch (branch 2-3).
If a parameter is associated with an irrelevant branch, it is not of concern from the perspective of SE, since it does not have any impact on SE. However, it is still of concern in this paper, because other applications in power system operation may be impacted by this type of parameters. The electricity market is certainly one of them, since the ED solution is determined by the parameters of all branches, and parameters of irrelevant branches are apparently part of the vulnerability of the model database due to the fact that there is no capability of detecting and estimating their errors. In view of this, they are still broadly considered as one category of critical parameters in this paper, despite the fact that they are not exactly analogous to the concept of critical measurement.
Definition 2: for a critical parameter pi, if , this parameter is referred to as a SE-irrelevant critical parameter.
Remark 2: SE-irrelevant critical parameters can be eliminated by turning the corresponding irrelevant branch into a relevant one. If the system is observable, it can be done by placing a pair of real and reactive injection measurements at one of the terminal buses, or placing a pair of real and reactive flow measurements along this branch.
Clearly, either injection measurements at terminal buses or flow measurements along the branch contain the parameters of this branch in their measurement equations, so the set of associated measurements will no longer be empty for these parameters. Furthermore, given that the system is originally observable, the added measurements will not be critical, i.e., their removal will not lead to loss of observability of the system. Therefore, after they are added, the parameters of concern will not become SE-relevant critical parameters (see Definition 1). Consequently, they will become non-critical.
The analysis in Section IV and this section can be readily combined to form a systematic meter placement strategy for removing the security risks in electricity market operation imposed by critical model parameters. First, the critical parameters are identified, and their impacts on the LMPs can be obtained and ranked as described in Section IV. Then, if the budget is limited, meter placement is considered to remove critical parameters with impacts from high to low. They are classified as either SE-relevant or irrelevant, then additional meters can be placed as described in this section.
In this section, simulation cases on the IEEE 57-bus system will be presented. The objectives of this section are three-fold:
1) Verifying the concept that critical parameter errors may have a significant impact on the energy prices in electricity markets, thus becoming a potential security vulnerability for system operation.
2) Illustrating how the proposed security assessment can be implemented to evaluate the security risks imposed by each critical parameter, and prioritizing them for the investment of countermeasures.
3) Verifying that the proposed meter placement strategy is effective for transforming a critical parameter into a non-critical one, thus eliminating the security risk identified in this paper.
It should be noted that numerical results may vary with respect to the chosen test system or network topology, but it does not affect the verification and illustration of the proposed concept and method, or the general conclusions reached from the demonstrated results.
All simulations for SE and ED are performed in MATLAB 2018b. Dispatchable generators are assumed at buses 1, 2, 3, 6, 8, 9, 12, 23, and 37. In order to consider the effect of congestion patterns, branch flow limits are set such that the following 6 branches are congested in the correct network model: 4-3, 2-1, 3-15, 45-44, 15-1, and 38-37. There exist 41 pairs of power injection measurements, 61 pairs of power flow measurements, and 9 voltage measurements, yielding a measurement redundancy of 1.88. Applying the analysis of Sections IV and V, the critical parameters (reactance only) and their types are identified as shown in Table I. There are 13 critical parameters in the system, among which 9 are SE-relevant and 4 are SE-irrelevant.
The impact of their errors on the LMPs can be found by following the steps given in Section IV. As an illustrative example, the results associated with the critical parameter (reactance) of branch 45-44, are shown in Figs.

Fig. 3 LMP deviations of buses with respect to parameter error in x45-44.

Fig. 4 Largest difference between LMP deviations of buses with respect to parameter error is x45-44.
Obviously, the LMPs at different buses have different responses to the parameter error. When the error is zero, the deviations of LMPs are all zero; as the error grows in the positive direction, deviations of LMPs first keep close to zero, then have a jump at 17% of the error. This is due to the change of the congestion pattern: the parameter error removes congestion on originally congested branch 45-44. In response to the change of the congestion pattern, some buses experience positive or negative LMP changes, and others stay almost unchanged. Beyond this point, LMPs change slightly as the error grows, but the changes are quite modest. No further jumps are observed which implies that the congestion pattern stays unchanged. LMP deviations are more complicated in the negative direction, but can be explained in a similar way. It is found that LMPs deviate most severely in the range of to parameter error. When the magnitude of the parameter error gets larger, another congestion pattern change occurs, which interestingly reduces the deviations of LMPs. It is evident from this example that the deviations of LMPs do not always grow proportional to the magnitude of the parameter error.
The largest difference between the deviations of LMPs of different buses is plotted against the magnitude of the parameter error in
A similar study can be repeated for each critical parameter, and their impacts on the electricity market can be ranked accordingly, as shown in Table I. It is seen that some critical parameters can lead to drastic distortion of LMPs, such as the reactance of branch 34-32, 48-49, 45-44, and so forth. It is also observed that some critical parameters have insignificant impact on the market. For example, the largest difference of the deviations of LMPs that can be incurred from an error of the reactance of branch 25-30 is $0.13, a negligible amount. This analysis provides useful information for prioritization of critical parameters for mitigation measures such as meter placement.
Again, the reactance of branch 45-44 is used as an example to show the removal of criticality by placing additional measurements. Note that the real and reactive power flow measurements on branch 45-44 are the only measurements that are functions of this parameter and that are critical measurements. Therefore, this parameter is a SE-relevant critical parameter. By adding a pair of real and reactive power injection measurements at bus 45, the criticality of the power flow measurements on branch 45-44 is eliminated, i.e., they become redundant measurements. In this case, the reactance of branch 45-44 will become non-critical as well.
Monte Carlo simulations are conducted to demonstrate the detectability of errors in the reactance of branch 45-44 before and after power injection measurements are added at bus 45. The measurements are synthesized from power flow solution, and random Gaussian noise is intentionally added across the entire measurement set. The chi-square test and the LNLM test are carried out 100 times, and the frequency of successful error detection is evaluated for each test. The results before and after meter placement are shown in

Fig. 5 Frequency of successful error detection before and after meter placement.
It is clear from
In order to study the sensitivity of the LMP deviations to the loading condition, more simulations are conducted for the example of the reactance of branch 45-44. The load at one of the terminal buses of this branch, i.e., bus 44, is scaled to 80%, 100%, 120%, and 140% of the base-case load, and the procedure for evaluating the largest difference between LMP deviations with respect to the error in the reactance of branch 45-44 is repeated. The results under different loading conditions are comparatively shown in

Fig. 6 Impact of loading condition on the largest difference between LMP deviations.
Finally, it should be emphasized again that both critical and non-critical parameters may have significant impacts on the evaluation of LMPs, and the discussion of this paper is focused on the critical parameters only because the errors cannot be effectively detected without implementing additional measures, thus imposing a security threat to system operation. The example discussed above can be used again to help clarify this point. In the original measurement configuration, due to the lack of local measurement redundancy, the reactance of branch 45-44 is a critical measurement. It has a significant impact on the energy prices (as shown in
This paper presents the formal linkage between the critical model parameter issue and the security of electricity market operation. It is shown that undetectable errors in critical parameters can significantly bias LMPs, regardless of whether they come from inadvertent mistakes or malicious attacks. A numerical method is developed to obtain the complicated and discontinuous relation between them, and identify the critical parameters which may severely influence electricity market operation. Subsequently, the properties of critical parameters are further studied, and meter placement strategies are discussed for different types of situations. Finally, case studies are performed in the IEEE 57-bus test system, verifying and illustrating the proposed analysis and design methods.
References
A. L. Ott, “Experience with PJM market operation, system design, and implementation,” IEEE Transactions on Power Systems, vol. 18, no. 2, pp. 528-534, May 2003. [百度学术]
T. Zheng and E. Litvinov, “Ex post pricing in the co-optimized energy and reserve market,” IEEE Transactions on Power Systems, vol. 21, no. 4, pp. 1528-1538, Nov.2006. [百度学术]
I. Feranadez. (2013, Apr.). Cybersecurity for industrial automation & control environments. [Online]. Available: http://www2.schneider electric.com/documents/support/white-papers/white-paper-cybersecurity-for-industrial-automation-control.pdf [百度学术]
R. Deng, G. Xiao, R. Lu et al., “False data injection on state estimation in power systems–attacks, impacts, and defense: a survey,” IEEE Transactions on Industrial Informatics, vol. 13, no. 2, pp. 411-423, Apr.2017. [百度学术]
Y. Song, X. Liu, Z. Li et al., “Intelligent data attacks against power systems using incomplete network information: a review,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 4, pp. 630-641, Jul.2018. [百度学术]
G. Hug and J. A. Giampapa, “Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks,” IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1362-1370, Sept. 2012. [百度学术]
M. Göl and A. Abur, “Identifying vulnerabilities of state estimators against cyber-attacks,” in Proceedings of 2013 IEEE Grenoble Conference, Grenoble, France, Jun.2013, pp. 1-4. [百度学术]
M. Göl and A. Abur, “Effective measurement design for cyber security,” in Proceedings of2014 Power Systems Computation Conference, Wroclaw, Poland, Feb.2014, pp. 1-8. [百度学术]
N. Zivkovic and A. T. Saric, “Detection of false data injection attacks using unscented Kalman filter,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 847-859, Sept. 2018. [百度学术]
L. Xie, Y. Mo, and B. Sinopoli, “Integrity data attacks in power market operations,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 659-666, Dec.2011. [百度学术]
O. Kosut, L. Jia, R. J. Thomas et al., “Malicious data attacks on the smart grid,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 645-658, Dec.2011. [百度学术]
L. Jia, J. Kim, R. J. Thomas et al., “Impact of data quality on real-time locational marginal price,” IEEE Transactions on Power Systems, vol. 29, no. 2, pp. 627-636, Mar.2014. [百度学术]
R. M. Lee, M. J. Assante, and T. Conway. (2016, Mar.). Analysis of the cyber attack on the Ukrainian power grid. [Online]. Available: https://www.nerc.com/pa/CI/ESISAC/Documents/EISAC_SANS_Ukra ine_DUC_18Mar2016.pdf/ [百度学术]
Y. Lin and A. Abur, “A new framework for detection and identification of network parameter errors,” IEEE Transactions on Smart Grid, vol. 9, no. 3, pp. 1698-1706, May 2018. [百度学术]
A. Abur and A. Gómez-Expósito, Power System State Estimation: Theory and Implementation, New York: Marcel Dekker, 2004. [百度学术]
J. Zhu and A. Abur, “Identification of network parameter errors,” IEEE Transactions on Power Systems, vol. 21, no. 2, pp. 586-592, May 2006. [百度学术]
Y. Lin and A. Abur, “Highly efficient implementation for parameter error identification method exploiting sparsity,” IEEE Transactions on Power Systems, vol. 32, no.1, pp. 734-742, Jan.2017. [百度学术]
Y. Lin and A. Abur, “Enhancing network parameter error detection and correction via multiple measurement scans,” IEEE Transactions on Power Systems, vol. 32, no. 3, pp. 2417-2425, May 2017. [百度学术]
O. Alsac, N. Vempati, B. Stott et al., “Generalized state estimation,” IEEE Transactions on Power Systems, vol. 13, no. 3, pp. 1069-1075. Aug. 1998. [百度学术]
X. Bian, X. R. Li, H. Chen et al., “Joint estimation of state and parameter with synchrophasors–Part I: state tracking,” IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 1196-1208, Jul.2011. [百度学术]
X. Bian, X. R. Li, H. Chen et al., “Joint estimation of state and parameter with synchrophasors–Part II: parameter tracking,” IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 1209-1219, Jul.2011. [百度学术]
A. de la Villa-Jaen, E. Acha, and A. Gómez-Exposito, “Voltage source converter modeling for power system state estimation: STATCOM and VSC-HVDC,” IEEE Transactions on Power Systems, vol. 23, no. 4, pp. 1552-1559, Nov.2008. [百度学术]
V. Donde, X. Feng, I. Segerqvist et al., “Distributed state estimation of hybrid AC/HVDC grids by network decomposition,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 974-981, Mar.2016. [百度学术]
V. Sarkar and S. A. Khaparde, “Implementation of LMP-FTR mechanism in an AC-DC system,” IEEE Transactions on Power Systems, vol. 23, no. 2, pp. 737-746, Apr.2008. [百度学术]
S. Chondrogiannis and M. P. Blanco, “Market integration scheme of a multi-terminal HVDC grid in the North Seas,” IEEE Transactions on Power Systems, vol. 31, no. 3, pp. 2415-2422, Sept. 2016. [百度学术]
F. H. Magnago and A. Abur, “A unified approach to robust meter placement against loss of measurements and branch outages,” IEEE Transactions on Power Systems, vol. 15, no. 3, pp. 945-949, Aug.2000. [百度学术]