We Can Pay Less: Coordinated False Data Injection Attack against Residential Demand Response in Smart Grids

6Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Advanced metering infrastructure, along with home automation processes, is enabling more efficient and effective demand-side management opportunities for both consumers and utility companies. However, tight cyber-physical integration also enables novel attack vectors for false data injection attacks (FDIA) as home automation/ home energy management systems reside outside the utilities' control perimeter. Authentic users themselves can manipulate these systems without causing significant security breaches compared to traditional FDIAs. This work depicts a novel FDIA that exploits one of the commonly utilised distributed device scheduling architectures. We evaluate the attack impact using a realistic dataset to demonstrate that adversaries gain significant benefits, independently from the actual algorithm used for optimisation, as long as they have control over a sufficient amount of demand. Compared to traditional FDIAs, reliable security mechanisms such as proper authentication, security protocols, security controls or, sealed/controlled devices cannot prevent this new type of FDIA. Thus, we propose a set of possible impact alleviation solutions to thwart this type of attack.

Cite

CITATION STYLE

APA

Dayaratne, T., Rudolph, C., Liebman, A., & Salehi, M. (2021). We Can Pay Less: Coordinated False Data Injection Attack against Residential Demand Response in Smart Grids. In CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (pp. 41–52). Association for Computing Machinery, Inc. https://doi.org/10.1145/3422337.3447826

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free