The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Consider a general security-constrained unit commitment (SCUC) problem for an arbitrary power network. This problem includes discrete variables corresponding to commitment parameters as well as demand and generation constraints, among others. Aside from its nonconvexity, SCUC is a large-scale problem for real-world systems due to the security constraints. The main objective of this paper is to propose...
Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation. This paper presents a generalized attack regime that uses jamming of secure and insecure measurements to greatly expand the scope of common 'hidden' and 'detectable'...
In this paper, we propose a distributed algorithm to solve the Security Constrained Optimal Power Flow (SC-OPF) Problem. We consider a network of devices, each with its own dynamic constraints and objective, subject to reliability constraints across multiple scenarios. Each scenario corresponds to the failure or degradation of a set of devices and has an associated probability of occurrence. The network...
Correct estimation of the state variables of a power grid is indispensable for its stable operation. The advent of smart grid has further enhanced the importance of secure real-time monitoring of the state variables. This paper studies hidden data attacks on power systems by an adversary trying to manipulate the state estimator. A novel graph theoretic formulation is developed for the problem of determining...
In this panel session paper, we discuss the interaction of market power in electricity markets, market power mitigation procedures in place in various independent system operators in North America, particularly in the context of transmission constraints, and the efficiency of the markets.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.