2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2015
DOI: 10.1109/iccad.2015.7372606
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of proactive participation of smart buildings in smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…For instance, in [81], a proactive demand participation scheme calculates the building scheduling flexibility based on guideline pricing, and then captures such flexibility as demand-bid curves for grid-level optimization. As observed in [81], [82], such scheme faces potential pricing attack on the guideline pricing and also possible manipulation on the demand-bid curves. Cross-layer detection: Finally, it is worth noting that at least part of detection code for pricing attack or energy theft needs to be implemented on the smart meter, while the smart meter itself is hacked.…”
Section: A Smart Energy Systemsmentioning
confidence: 97%
“…For instance, in [81], a proactive demand participation scheme calculates the building scheduling flexibility based on guideline pricing, and then captures such flexibility as demand-bid curves for grid-level optimization. As observed in [81], [82], such scheme faces potential pricing attack on the guideline pricing and also possible manipulation on the demand-bid curves. Cross-layer detection: Finally, it is worth noting that at least part of detection code for pricing attack or energy theft needs to be implemented on the smart meter, while the smart meter itself is hacked.…”
Section: A Smart Energy Systemsmentioning
confidence: 97%
“…Some other papers have considered the interplay between SB and other smart infrastructures like smart grids. For instance, [37] discussed a guideline price manipulation attack, where malicious customers alter the guideline price (which is used to predict the future electricity price to guide electricity demand of customers) in the electricity market and delude scheduling decision of other customers. By this type of attack, a malicious customer can reduce his electricity cost while increasing electricity bill of other normal customers.…”
Section: Othersmentioning
confidence: 99%