Abstract
Load profile for a household is key to understanding and applying automated load scheduling executed by the Home Energy Management Systems (HEMS). The provision of securing this basic domestic information as well as preventing intruders from being able to accessing and modifying them should be a matter of high priority. Any malicious attack on this data will have serious impact on the performance of the load scheduling algorithms. This paper is an investigation of how the scheduled load profile of a household can be deformed due to false data injection on the original load profile as a result of cyber-attack on the HEMS. Various incremental false data levels are introduced during an optimization process and the corresponding effect on the overall scheduled load profile is evaluated to understand the actual impact of the cyber-attack. Results show that as noise attack level increases, the optimized load profile shrinks and approaches a straight line which is equivalent to the average value of the original load profile. The implication of having such a load profile as a schedule is the obvious excessive disruption of a household’s energy use which results to having appliances switched ON or OFF at highly undesired times of the day thereby exacerbating user inconvenience.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lee, R.M., Assante, M.J., Conway, T.: Analysis of the cyber attack on the Ukranian power grid. E-ISAC (2016). https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf. Assessed 31 Dec 2016
Kumar, M.: DDoS Attack takes down central heating system amidst winter in Finland. http://thehackernews.com/2016/11/heating-system-hacked.html. Accessed 21 June 2017
Amini, S., Pasqualetti, F., Mohsenian-Rad, H.: Detecting Dynamic Load Altering Attacks: A data-driven time-frequency analysis (2016)
Amini, S., Pasqualetti, F., Mohsenian-Rad, H.: Dynamic load altering attacks against power system stability: attack models and protection designs. IEEE Trans. Smart Grid (Submitted) (2016)
Duhamel, P., Vetterli, M.: Fast fourier transforms: a tutorial review and a state of the art. Signal Process. 19, 259–299 (1990)
Zhang, F., Geng, Z., Yuan, W.: The algorithm of interpolating windowed FFT for harmonic analysis of electric power system. IEEE Trans. Power Deliv. 16(2), 160–164 (2001)
Anuebunwa, U., Rajamani, H.S., Pillai, P., Okpako, O.: Novel genetic algorithm for scheduling of appliances. In: Proceedings of the 2016 IEEE PES Power Africa Conference, Livingstone, Zambia, pp. 57–61 (2016)
Anuebunwa, U., Rajamani, H.S., Pillai, P., Okpako, O.: Investigating the impact of discomfort in load scheduling using genetic algorithm. In: IEEE International Conference on Power Systems Technology (IEEE POWERCON2016), Australia (2016)
U.S Department of Energy.: Commercial and residential hourly load profiles for all TMY3 Locations in the United States, OpenEI, 2nd July 2013
Illinois, A.: Day Ahead Pricing used for billing RTP and HSS service, Ameren, 1st May 2015
Acknowledgement
This work was supported by the British Council and the UK Department of Business Innovation and Skills under GII funding for the SITARA project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Anuebunwa, U., Rajamani, HS., Pillai, P., Okpako, O. (2018). Investigating the Impact of Cyber-Attack on Load Profile of Home Energy Management System. In: Pillai, P., Sithamparanathan, K., Giambene, G., Vázquez, M., Mitchell, P. (eds) Wireless and Satellite Systems. WiSATS 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 231. Springer, Cham. https://doi.org/10.1007/978-3-319-76571-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-76571-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76570-9
Online ISBN: 978-3-319-76571-6
eBook Packages: Computer ScienceComputer Science (R0)