Learn More
—MATPOWER is an open-source Matlab-based power system simulation package that provides a high-level set of power flow, optimal power flow (OPF), and other tools targeted toward researchers, educators, and students. The OPF architecture is designed to be extensible, making it easy to add user-defined variables, costs, and constraints to the standard OPF(More)
— Malicious attacks against power systems are investigated , in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so that the network state becomes unobservable by the control center.(More)
Bluetooth is a new promising local area wireless technology designed to enable voice and data communication among various electronic devices. We believe that Bluetooth networks will provide reliable, flexible and cost-efficient telecommunication support for the post-deregulation electric power systems. Though not specified in version 1.0 of the Bluetooth(More)
— The problem of constructing malicious data attack of smart grid state estimation is considered together with countermeasures that detect the presence of such attacks. For the adversary, using a graph theoretic approach, an efficient algorithm with polynomial-time complexity is obtained for the design of unobservable malicious data attacks. When the(More)
—This paper describes the optimal power flow (OPF) architecture implemented in MATPOWER, an open-source Mat-lab power system simulation package. It utilizes an extensible architecture that allows the user to easily add new variables, constraints and costs to the standard OPF problem formulation while preserving the structure needed to use pre-compiled(More)
—In order to design an efficient communication scheme and examine the efficiency of any networked control architecture in smart grid applications, we need to characterize statistically its information source, namely the power grid itself. Investigating the statistical properties of power grids has the immediate benefit of providing a natural simulation(More)
—Impacts of malicious data data attack on the real-time electricity market are studied. It is assumed that an adversary has access to a limitted number of meters and has the ability to construct data attack based on what it observes. Different observation models are considered. A geometric framework is introduced based on which upper and lower bounds on the(More)
—Stability is an important constraint in power system operation. Often trial and error heuristics are used that can be costly and imprecise. A new methodology that eliminates the need for repeated simulation to determine a transiently secure operating point is presented. The theoretical development is straightf-forward: dynamic equations are converted to(More)
—Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters. Such information is difficult to acquire in practice. The subspace methods presented in this paper, on the other(More)
Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at several meters in a power system, it can sometimes change the state estimate at the control center in a way that will never be detected by classical bad data detectors. However, in cases(More)