iconOpen Access

ARTICLE

DH-LDA: A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid

Yunhao Yu1, Meiling Dizha1, Boda Zhang1, Ruibin Wen1, Fuhua Luo1, Xiang Guo1, Junjie Song2, Bingdong Wang2, Zhenyong Zhang2,*

1 Electric Power Dispatching and Control Center, Guizhou Power Grid Co., Ltd., Guiyang, 550002, China
2 State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, China

* Corresponding Author: Zhenyong Zhang. Email: email

Computers, Materials & Continua 2025, 85(2), 3861-3877. https://doi.org/10.32604/cmc.2025.066097

Abstract

The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling. However, due to the wide adoption of internet-of-things (IoT)-based metering infrastructure, the cyber vulnerability of load meters has attracted the adversary’s great attention. In this paper, we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements. By taking advantage of the changing properties of real-world load profile, we propose a deeply hidden load data attack (i.e., DH-LDA) that can evade bad data detection, clustering-based detection, and price anomaly detection. The main contributions of this work are as follows: (i) We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normal measurements, thereby maximizing concealment; (ii) We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations, enhancing the undetectability of the attack in real-time market operations; (iii) We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs. Our experiments show that the adversary can gain profits from the electricity market while remaining undetected.

Keywords

Smart grid security; load redistribution data; electricity market; deeply hidden attack

1  Introduction

The smart grid serves as a pivotal driver of economic advancement, facilitating cost reductions through the harmonized scheduling of diverse energy sources, including wind, solar, and coal-fired power generation [1]. The electricity market is structured to optimize economic efficiency by enabling transactions among generators, consumers, and other market participants [2]. Precise price signals guide consumers in modifying their consumption habits, thereby contributing to the reduction of energy supply costs. The Local Marginal Price (LMP) is an important metric in the electricity market [3], defined as the incremental cost of producing an additional unit of power. In major electricity markets worldwide, such as the New York Independent System Operator (NYISO), the PJM Interconnection (PJM), and the Unified Electricity Market of China, pricing mechanisms commonly incorporate generation costs, transmission congestion costs, and line-loss costs, which are determined through advanced metering infrastructure that collects data on power injection, power flow, and load. By leveraging historical load data and sophisticated forecasting methodologies [4], the market anticipates electricity demand for the following day and provides a forward market quote. This process ensures that a substantial portion of the anticipated demand is met under an economic generation portfolio for the next day. However, the ease with which load measurements can be tampered with presents an opportunity for malicious actors to manipulate LMPs, enabling them to profit from the market [5]. Data integrity attacks have emerged as a prominent research focus due to their capacity to disrupt grid operations and engender perilous outcomes. Flaws within hardware, software, and communication protocols render load data susceptible to malicious compromise [6].

As early as 2009, research [7] first brought cybersecurity concerns in electricity markets to the forefront, aiming to systematically model the potential impact of network assaults on the functionality of electricity markets. With the introduction of the stealthy network attack known as false data injection attacks (FDIAs) in 2010, authors in [8] and [9] illustrated how attack vectors could be introduced into the power system to capitalize on the electricity market. This line of inquiry has since evolved into a burgeoning field of study. The efficacy of the attack was substantiated by the quantification of illicit profits accrued in the electricity market, as reported in [10]. An optimization problem for constructing attack vectors was formulated to maximize economic returns while circumventing the power system’s bad data detector (BDD), as detailed in [11]. Authors in [12] targeted the security-constrained economic dispatch (SCED) in the power system by manipulating the actual load to escalate the costs for generation enterprises. If an attacker successfully compromised the memory of a measurement device, they could manipulate power demand, leading to an imbalance between supply and demand. An innovative approach was devised to perpetrate FDIAs in the electricity market, capitalizing on advance scheduling in the real-time market to secure financial gains, as described in [13]. The above research indicates that an increasing number of researchers focus on the cybersecurity of the electricity market.

However, attackers need to have a large amount of power grid information to successfully implement FDIA, and obtaining power system information is difficult and cumbersome. Therefore, based on the idea of FDIA, Yuan et al. [12] were the first to put forward a stealthy attack targeting BDD, specifically the load redistribution attack (LRA). This attack is carried out by coordinating the modification of load measurements, it is easier to implement. Xiang et al. [14] proposed a coordinated attack that combines LRA and switching attacks, thus, misleading the power dispatching and putting the power system in a vulnerable operating state. Zhang et al. [15] proposed LRA against the direct current (DC) grid, which can cause the operator to schedule incorrect instructions, thus damaging the operation of the smart grid. By injecting false data into meter readings, attackers can orchestrate local load redistribution [16]. In [17], the authors conducted load redistribution attacks (LRAs) using phase-shifting devices and assessed the impact of this attack on the optimal power flow. Due to its consistency with the physical laws of the power system, LRAs possess a high level of stealthiness, allowing them to evade detection by BDD successfully.

Unfortunately, with the development of machine learning techniques, machine learning-based detectors have exhibited notable efficacy in identifying FDIAs. Although coordinated FDIA and LRAs can bypass traditional BDDs, they are susceptible to detection by clustering-based methods like distance-based principal component analysis [18]. Esmalifalak et al. [19] pioneered the use of principal component analysis to segregate false data from normal measurement data. Their subsequent work [20] delved into various machine learning methods, including K-Nearest Neighbor, Support Vector Machines, and Neural Networks, achieving satisfied accuracy in detecting LRAs. Pinceti et al. [21] leveraged the Support Vector Machine and extracted the attack deviation based on historical measurements. Besides, Khaleghi et al. [22] emphasized the importance of accurate load pattern prediction using Support Vector Regression, followed by Support Vector Machine-based attack detection. To counter this, the Dummy Data Attack (DDA) was designed to circumvent these clustering-based detectors [23] by stealthy compromised data within normal measurements. In 2019, Liu et al. [24] proposed the dummy data attack by minimizing the distance between malicious data and normal historical measurements, allowing the malicious data to masquerade as normal data and thus enhancing the stealthiness of the attack.

Although DDA can evade detection by BDD and clustering-based methods, it can still be easily detected in the electricity market scenario due to the abnormal nodal prices changes caused by it. This is because the load profile displays periodic patterns. If load measurements are altered to be inconspicuous during the afternoon, the attack can be readily detected [25]. Moreover, the periodic nature of the load profile engenders strong regularity in nodal prices. If an attack is conducted at an inopportune time, the resulting abnormal price fluctuations may reveal the presence of malicious activities.

To our knowledge, the stealthy attack has not yet been deeply investigated in the scenario of the electricity market. In this paper, we propose a deeply hidden load data injection attack (DH-LDA) to reveal the vulnerability of the electricity market with manipulated load measurements. As shown in Fig. 1, attackers can construct covert attacks against load measurement, tamper with nodal prices, and profit from the electricity market. This attack can simultaneously avoid BDD, clustering-based methods, and price anomaly detection. The main contributions of this paper are summarized in four folds:

images

Figure 1: Attacker attack and profit flowchart

•   We analyze the vulnerability of the electricity market against the load data injection attack. We propose a DH-LDA that can bypass BDD, clustering-based detection, and price-abnormality detection.

•   We analyze the optimal time window for injecting the load data to avoid the detection caused by the sudden change. This design can guarantee that the modified nodal price aligns with the natural fluctuation of the normal nodal price.

•   To assess the power system’s vulnerability, we propose an optimization problem to evaluate the resilience of the electricity market against DH-LDAs.

•   We conduct extensive simulations to evaluate the performance of the DH-LDA and its countermeasure.

The rest of this paper is organized as follows. In Section 2, we analyzed the relationship between nodal prices and power flow distribution. Section 3 presents the mathematical model for the deeply hidden load attack scheme. Section 4 introduces the electricity market resilience against DH-LDAs. Section 5 validates the effectiveness of this attack through experiments. Section 6 concludes this paper.

2  Electricity Market Price Model

The nodal price, also known as the Locational Marginal Price [2628], is a key pricing indicator in the operation and planning of electricity markets, used to determine the prices at different buses in the power system and to manage congestion in the transmission network. The nodal electricity price mechanism is widely used worldwide by independent system operators such as PJM, New York, and New England. In China, the Guangdong electricity trading market also adopts this mechanism.

The LMP is composed of three parts: energy costs, congestion costs, and loss costs [29], as shown in Eq. (1). Energy costs represent the generation costs for power producers, including the cost of fuel, as well as the operation and maintenance costs of power plants. This ensures that the generation unit with the lowest cost is given priority in supply, thereby optimizing the overall energy cost. Congestion costs come into play when there is congestion in the transmission network and can effectively reflect price differences between different buses. Higher congestion prices incentivize market participants to find alternative transmission paths or adjust their power transactions, thus alleviating line congestion. Loss costs encourage grid operators to take measures to reduce network losses, such as optimizing the operation and dispatch of transmission lines, to improve transmission efficiency. The LMP can be defined as

LMPi=LMPienergy+LMPicongestion+LMPiloss.(1)

The calculation of LMP is achieved through optimal power flow solutions. Due to the high demand for real-time performance in real-time markets, incremental linear programming models based on direct current optimal power flow (DCOPF) are often used. Currently, DCOPF is widely adopted by many industrial LMP simulators, such as ABB’s GridView, GE’s MAPS, Siemens’ Promod IV, and PowerWorld, for price forecasting and system planning. The next will introduce the mathematical model of nodal prices.

A deregulated electricity market consists of the day-ahead market and the real-time market. They use the same generator bidding, with the main difference being that one is clearing based on forecast or planned load while the other is clearing based on actual load. The real-time market is a spot market with a shorter time horizon, such as every 5 or 15 min. As a critical indicator in the electricity market, LMP calculation can be formulated with the SCED. Assume that each bus has one generator and one load for easy description. Then, we have

minpii=1nϕi(pi)(2)

s.t.   i=1npi=i=1ndi(3)

piminpipimaxi,i{1,2,,n},(4)

fkminfkfkmaxk,k{1,2,,l},(5)

fk=i=1nΨki×(pidi),{ }k,{ }k{1,2,,l},(6)

where n is the number of buses, l is the number of lines, i is the ith bus which may be a power generation or a load, pi is the generation dispatch of the ith bus (if the bus is not a generator, its value is zero), ϕi(pi) is the generation cost function of bus i, where ϕi(pi)=a×pi2+b×pi+c, where a, b, and c are constants, di is the load of the ith bus, fk is the power flow of line k, and fkmax=fkmin>0 is the transmission limit. The equality Eq. (6) describes the relationship between the power flow and power generation and load, where Ψ is the power transfer distribution factor matrix, and the subscript ki denotes the elements in row k column i of the matrix Ψ, which is computed according to the derivation.

Ψ=F(PL),(7)

where F is the vector of power flows, P is the vector of power generations, and L is the vector of loads. Let ARl×n is the incidence matrix and DRl×l is the diagonal matrix of susceptance, the symmetric admittance matrix can be represented as

B=ATDA,(8)

The branch-bus shift factor matrix is given by

S=DA.(9)

Considering the DC power flow, we can obtain the power flow F=Sθ and the bus injected active power (PL)=Bθ, where θ is a vector of voltage angles. We have

Ψ=SB1=DA(ATDA)1.(10)

Eq. (6) represents the relationship between bus-injected active power and the power flow on transmission lines. Ψki represents the element at the kth row and ith column. That is, the power flow on transmission line k is equal to the sum of the injected active powers of all buses connected to it.

The nodal price (i.e., LMP) is a fundamental concept in the electricity market and plays a crucial role in optimizing the allocation of generations and managing congestion. To solve the SCED problem (2), a dual problem is designed as

=i=1nϕi(pi)λ(i=1npii=1ndi)i=1nμi(pipimax)i=1nνi(piminpi)k=1lηk(fkfkmax)k=1lζk(fkminfk),(11)

where λ, μi, νi, ηk, and ζk are Lagrange multipliers, which can be solved using the KKT conditions in the following. For pi, we have

pi= γiλμi+νik=1lηkfk(pidi)+k=1lζkfk(pidi)=0.(12)

In general, the power generations do not exceed the upper and lower bounds, which means μi=0 and νi=0. Then, the LMP of bus i can be calculated as

γi=λ+k=1lηkfk(pidi)k=1lζkfk(pidi).(13)

Substituting Eq. (13) into Eq. (7), we have

γi=λ+k=1lΨki(ηkζk).(14)

According to Eq. (1), we can see that the LMP consists of generation costs, transmission-congestion costs, and loss costs. Due to the exclusion of loss costs from our research scope, under the assumption of ignoring loss costs, the LMPs are as shown in Eq. (14). The multiplier λ denotes the marginal price of the generation. As the load increases, if there are no security constraints, the generators are activated with the lowest generating cost, to fulfill the demand. However, when considering the transmission limitation, the generators cannot supply some buses with the lowest cost. Hence, the higher-cost generation units need to be activated, resulting in transmission-congestion cost, which is expressed by the term k=1lΨki(ηkζk). Besides, the difference of LMP between two buses can be described as

γiγj=k=1lΨki(ηkζk)k=1lΨkj(ηkζk),(15)

where ηk and ζk are Lagrange multipliers, denoting the corresponding constraints’ relaxation when the power flow reaches the upper or lower bound. In other words, if the power flow satisfies the Eq. (5), transmission-line congestion can be eliminated. That is, ηk=0 and ζk=0, then we have γiγj=0.

From the forgoing analysis, the attack aims to eliminate the transmission-line congestion to tamper with nodal prices. Therefore, the transmission-line congestion sets are defined. The set PC is the positive congestion set, which is designed as

PC={k{fkfkmax,k=1,2,,l}},(16)

and the set NC is the negative congestion set

NC={k{fkfkmin,k=1,2,,l}}.(17)

To eliminate the transmission-line congestion, if line kPC, then Δfk0; if line kNC, then Δfk0, where Δfk denotes the incremental power flow of line k. Next, we present the details to design the DH-LDA.

3  Deeply Hidden Load Data Attack

Here we introduce the deeply hidden load data injection attack. Based on the discussion in Section 2, the Eq. (14) indicates that, in the absence of transmission-line losses, the nodal price is derived from the generation and congestion costs. The generation cost depends on the total load of the system, which is difficult to predict but is equal at all buses in the system. The marginal generation cost equals the Lagrange multiplier λ. The reason for having different nodal prices is the presence of transmission-line congestion. Therefore, if an attacker can eliminate the transmission-line congestion, it can be predicted that in the real-time market, the nodal prices satisfy γ1=γ2=...=γn=λ. Therefore, the attacker’s goal is to eliminate the transmission-line congestion during the real-time electricity market.

3.1 Hidden LDA

A hidden LDA has the capability of bypassing the BDD. In our context, the injected load error should maintain the power balance. Meanwhile, the distribution of power flow should be consistent with Kirchhoff’s law. Therefore, we have

i=1ndia=0(18)

di=di0+dia(19)

dimindidimax(20)

fk=i=1nΨki×(pidi),(21)

where dia is the injected load error of bus i, di0 is the load before the attack, and di is the load data received by the state estimation after the smart meter has been attacked. Given that the load change is solely due to the attack, the load increment at bus i is Δdi=dia. Therefore, the power flow measurements are manipulated correspondingly as follows

Δfk=i=1nΨki×(Δdi).(22)

When the malicious data meets the aforementioned conditions, the tampered measurements will be able to pass the BDD smoothly. However, when the detection mechanism considers comparing historical measurements with the compromised data, the compromised data will exhibit features that deviate from normal measurements. To enhance the hiddenness, we consider the variation characteristic of load profiles. We analyze the variation in load from the real-world load data of New York State1. We can see that the electricity consumption is lowest in the early morning and reaches the peak in the evening.

3.2 Deeply Hidden LDA

To ensure that the manipulated measurements are close to the normal, the Euclidean distance is usually used to measure the distance, which is denoted by 2 norm

z1z22=i=1n(z1iz2i)2,(23)

where z1 and z2 are two n-dimensional measurement vectors. The distance between the modified measurement and historical measurements can be minimized to enhance the hiddenness of LDA.

The attack scheme requires that the malicious measurements satisfy the following optimization objective

minzazaz1+zaz2++zazm,(24)

where z denotes the measurements collected by sensors, which include the output power of generators, bus loads, and power flows on transmission lines. The dataset of historical measurement values has a size of m. The notation za is the malicious data that the attacker needs to carefully design.

Besides, the temporal characteristic of the load profile should be considered. To be stealthy, the injected error of the load meter is generated by limiting its distance from historical measurements on different time slots. Then, the weight ωt is computed according to the time slots. The historical measurements are sorted by time and divided into h data sets, denoted as T1, T2, …, Th. The weight computed according to the time slots is

ωt=e|TaTt|,(25)

where Ta is the targeted measurement batch of LDA and Tt is the time batch of historical measurements. Thus, the DH-LDA is designed to solve the following optimization problem.

minza t=1hωtj=1mzaztj(26)

s.t.   i=1nΔdi=0(27)

τidiΔdiτidi,i,i{1,2,...,n}(28)

Δfk=i=1lΨki×(Δdi),k,k{1,2,...,l}(29)

Δfk0,   k,{ }kPC(30)

Δfk0,   k,kNC,(31)

where za is the attack vector of DH-LDA, which consists of load and power flow measurements, zt1, zt2, ..., ztm are historical measurements at time batch Tt, h is the number of considered time batches, m is the number of historical measurements in each time batch Tt, and τi is a constant to limit the injected load error to satisfy Eq. (20).

Considering that the objective function (26) is a nonlinear optimization problem, and the distance metric for the attack data does not require high precision, the 1 norm can be used instead of the 2 norm. This means that the objective function (26) can be transformed as

minzat=1hωtjTt|zazj|.(32)

Furthermore, let |zazj|=x+y, zazj=xy, where x=(|zazj|+zazj)/2,y=[|zazj|(zazj)]/2. Then, the objective function (32) can be transformed into a linear programming problem

minxj,yjt=1hωtjTt(xj+yj)(33)

s.t.jTt(xjyj)=0(34)

xj0,yj0,jTt(35)

(27)(31).(36)

By making the above transformation, we have transformed the nonlinear optimization problem into a linear optimization problem, which can be solved using a solver such as Gurobi. Finally, we can obtain the smart meters that can be tampered with and the corresponding load error.

Considering the periodic variation of the load profile, the LMPs also show a certain regularity within a day. The nodal price in a day is shown in Fig. 2. We can see that the nodal prices do not change suddenly under normal conditions. Therefore, the attacker also needs to observe the best time to launch the attack to avoid being detected due to the abnormality. According to our observation, the load profile returns to the bottom at midnight which eliminates the congestion. During this period, the prices of all buses remain the same. The best attack time window is before this period. We can force all nodal prices to be consistent after the attack time. That is, the best time to launch the DH-LDA is to make all nodal prices identical before the load reaches the bottom level.

images

Figure 2: The LMPs are changed dramatically under a random attack (at 18:00:00, LMPs of all buses suddenly changed to 25$ due to the attack.), which shows a potentially malicious activity

By utilizing the DH-LDA, the attackers can generate deeply hidden malicious load data. Then, they can make profits from the electricity market by executing the following operational process. The specific attack process is shown in Fig. 3.

images

Figure 3: The data injection attack process for nodal electricity prices

•   Step 1: In the day-ahead market, the attacker is engaged in the electricity trading between any two buses based on the day-ahead prices published by the market. They purchase electricity at the bus at a lower price, incurring a cost γi0. Then, they sell the electricity at the bus with the higher price, gaining a profit γj0 (i.e., γj0>γi0).

•   Step 2: In the real-time market, the attacker launches the cyberattack to infiltrate the smart meter and tamper with the sensor measurements.

•   Step 3: The attacker calculates the attack vector based on the proposed DH-LDA and injects it into the smart meters.

•   Step 4: At the agreed-upon trading time, the real-time market clears the electricity auction. The attacker sells electricity at the bus where they were originally supposed to buy, gaining a profit γi. They buy electricity at the buses where they were originally supposed to sell, incurring a cost γj. Ultimately, the profit made from this electricity trading is π=γj0γi0+γiγj>0.

4  Resilience of the Electricity Market against DH-LDAs

In this section, we propose a countermeasure to mitigate the impact of DH-LDA. Although data-driven detection methods have gained prominence in attack detection by utilizing extensive data to extract correlations of the high-dimension power data, the DH-LDA has the capability of manipulating the load measurements to hide in the normal measurements, without being detected. Therefore, we consider the resilience of the electricity market against DH-LDAs. The resilience quantifies the load manipulation that induces the change in the bus price. Besides, we examine the difficulty of launching DH-LDAs in different power systems.

The DH-LDA affects LMPs by embedding attack vectors into smart meters. The core strategy behind this attack is to eliminate transmission-line congestion, thereby altering nodal prices. Under the assumption of ignoring losses cost, the LMP comprises the energy cost LMPienergy and the congestion cost LMPicongestion. When the congestion cost is reduced to zero, the nodal prices are determined by the generation cost, resulting in a consistent price across all buses in the system, that is

LMPi=LMPienergy=λ=γ1=γ2==γn,(37)

where γi represents the clearing price of the market for every 15 min. If there are congestion costs, the prices of different buses may vary. The variable λ denotes the Lagrange multiplier, whose physical meaning is the incremental rate of the total cost in the system when a unit of power generation is added.

To manipulate LMPs, the attacker must eliminate the transmission-line congestion. Consequently, the injected load error must induce a variation in the power flow across the lines, that is

{Δfk=fkfkmax0,kPCΔfk=fkfkmin0,kNC.(38)

To cause a variation Δfk in the power flow of the transmission lines, the load error dia injected by the attacker needs to reach a certain level. Specifically, when the load satisfies Δdi=diaαidi0, the power flow change fka=Δfk induced by the attack is sufficient to eliminate the transmission-line congestion, where αi is the coefficient for the minimum of the load error.

Considering the distance metric in the context of DH-LDA, let ϖ denote the distance between the malicious data and historical measurements, then we have

ϖ=1m(zaz1+zaz2++zazm),(39)

where za is the manipulated measurement, z1,z2,,zn are normal historical measurements, which consist of generation power, load, and power flow, i.e., z=[P,L,F]. To ensure that the malicious measurement is close to historical measurements, the ϖ should be less than a specified threshold. In other words, dia should be less than a certain threshold, i.e., Δdi=diaβidi0, where βi is the coefficient for the maximum of the load error.

The resilience of the electricity market is defined as its ability to defend against DH-LDA. When the load measurements are modified within a certain range, the transmission-line congestion cannot be eliminated. A larger range indicates a stronger ability of the electricity market to defend against DH-LDAs. Let δ denote the quantitative indicator of this resilience, then we have

δ=min{α1,α2,,αn}(40)

To determine the electricity market resilience, we construct the following optimization problem

Δdi=argminΔdi||ΔL||(41)

s.t. 1nTΔL=0(42)

ΔFFmaxF^(43)

ΔFFminF^(44)

ΔF=ΨΔL(45)

where ΔL is a vector of load modification, 1n is a vector of all 1s, ΔF is the vector of incremental error of the transmission-line power flow, Fmax and Fmin are vectors of transmission-line limitations, and F^ is a vector of initial power flows. The objective of the optimization problem is to find the minimum value of the maximum load changes at each bus. Furthermore, the resilience value can be measured by

δ=αi=Δdidi0.(46)

5  Simulation Results

In this section, we conduct extensive simulations to evaluate the attack schema and the electricity market resilience against DH-LDAs.

5.1 Evaluation of the Attack Impact

The DH-LDA is evaluated using the real-world load data from NYISO2. We consider different regions in NYISO as the buses and simplify the power system as an IEEE 14-bus system, which includes 14 buses and 20 transmission lines, with 5 generator units and 11 load buses. In terms of data preprocessing, due to the use of real load data from New York, there are no missing values in the actual dataset obtained. But in order to make the research more universal, if other datasets with possible missing values are used in the future, we will adopt the following solution: for a small number of missing values, interpolation methods such as linear interpolation or spline interpolation will be used to estimate the missing values based on the values of adjacent points.

The objective function of SCED is ϕi(pi)=cipi. The maximum output power and generation costs of generation units are shown in Table 1. We assume that only one transmission line is congested, with a transmission limit of 3500 MW on line 3–4.

images

Based on the load profiles collected every 5 min, we calculate the LMPs for each bus. The results at 22:45:00 are shown in Table 2. The output power of the generating unit and the power flow of the transmission line are shown in Fig. 4. Due to the transmission-line limitations, the cheaper generation unit (bus 3, 20 $/MWh) is unable to generate the power at its maximum capacity (5000 MW). Instead, the generation is supplemented by the generator located at bus 2 (25 $/MWh). Therefore, it results in the transmission-line congestion cost, causing different LMPs of buses.

images

images

Figure 4: The output power of generation units and power flows at 22:45:00

Before launching DH-LDAs, we need to choose an appropriate time window because the LMPs change in a periodic pattern, as shown in Fig. 5. The optimal attack time window should be selected at the time period when the nodal prices of all buses become consistent. Interestingly, these time periods occur when the loads decrease at midnight. The reduction of loads can eliminate the congestion cost. At these periods, all nodal prices are the same. Therefore, once the DH-LDA is launched, the change in nodal prices likes the normal case.

images

Figure 5: The LMPs under the DH-LDA

We observe the changes in LMPs after the launch of DH-LDA. The results are shown in Fig. 6. The adversary can obtain economic benefits due to the activation of high-cost generation units.

images

Figure 6: The LMPs with and without attack. By selecting the appropriate buses for electricity trading, the attacker can gain economic benefits from the electricity market

Next, we analyze the stealthiness of DH-LDA. The obtained residual from injecting the abnormal measurements is 0.003, which is smaller than the BDD threshold of 0.5. Furthermore, we evaluate the stealthiness with the principal component analysis and compare their differences through a visualization plot, as shown in Fig. 7. The DH-LDA is hidden within the normal historical measurements. More importantly, according to Fig. 5, the nodal prices are not changed in a sudden under the DH-LDA.

images

Figure 7: Enhanced hiddenness of DH-LDAs compared with DDAs

5.2 Market Resilience Analysis

Next, we analyze the resilience of the electricity market with the IEEE 14-Bus, 24-Bus, 39-Bus and 118-Bus systems. The results are shown in Fig. 8. Assuming that all transmission lines have a maximum capacity of 110 MWh. In a scenario where the actual load demand is met without the security-constrained economic dispatch, the power flow of the first transmission line has already reached 150 MWh, resulting in congestion cost and unpredictable nodal prices. The DH-LDA is launched to eliminate the congestion cost and alter the bus price. Thus, the attack can control the power flow to be less than 150 MWh. From Fig. 8, we can see that the transmission lines are all not congested after DH-LDA. Therefore, the power system only has the generation cost, achieving the attacker’s goal of predicting the clearing price.

images

Figure 8: Changes in transmission tine power flow with and without attack

The resilience of the electricity market against DH-LDAs depends on the modification magnitude of the load measurement. With the IEEE 14-bus power system, if there is a line k whose power flow exceeds the transmission capacity limit, denoted by fk>fkmax=110, then an attacker can launch DH-LDAs to make profits from the electricity market. By solving the problem (41), the resilience of the electricity market is δ=7.36, which indicates that when the load change at load bus i is Δdi7.36di0, the attacker cannot launch an effective DH-LDA to obtain profit from the electricity market.

Furthermore, we analyze the impact of relaxing the load-change limits at the load buses on ϖ. The results are shown in Table 3. When Δdi=7.37di0, the distance between the malicious measurement and historical measurements is ϖ=885. Once the limits are further relaxed, when Δdi=17di0, the distance reaches the minimum value ϖ=637. It means that, under the condition of no load change limits, the optimal DH-LDA against the electricity market can be very close to the historical measurements, with a distance of ϖ=637, which makes it difficult for operators to distinguish malicious data from normal measurements when the data is processed using dimensionality reduction visualization.

images

The resilience of the electricity markets against DH-LDA with different power systems is shown in Table 4. It is observed that as the size of the power system increases, the difficulty of constructing a DH-LDA also grows. With the IEEE 24-bus system, if the transmission line has an upper limit of fkmax=175, the resilience value is δ=0.72. However, with the IEEE 39-bus power system, if the transmission line has an upper limit of fkmax=830, the resilience value is δ=0. This indicates that, even with unlimited load change, the attacker cannot initiate a DH-LDA against the electricity market.

images

6  Conclusion

In this paper, we proposed the deeply hidden load data attack against the electricity market. First, we explored the vulnerability of manipulating nodal prices by injecting false load data into meter measurements, taking into account the cyber vulnerability of load meters. Then, leveraging the changing properties of real-world load profiles, we designed the DH-LDA that can evade multiple detection methods. Next, we analyzed the optimal time window for injecting load data to achieve a deeply hidden attack, making the modified nodal price align with its natural fluctuation. In addition, we propose a method to evaluate the resilience of the electricity market against DH-LDAs. Finally, we conducted experiments to verify that the adversary can profit from the electricity market without being detected.

Acknowledgement: We express our gratitude to the members of our research group, i.e., the Intelligent System Security Lab (ISSLab) of Guizhou University, and Guizhou Power Grid Co., Ltd. Electric Power Dispatching and Control Center, for their invaluable support and assistance in this investigation. We also extend our thanks to our university for providing essential facilities and environment.

Funding Statement: This paper is supported by the project Major Scientific and Technological Special Project of Guizhou Province ([2024]014).

Author Contributions: The authors confirm contribution to the paper as follows: Conceptualization, Yunhao Yu, Meiling Dizha, Boda Zhang, Ruibin Wen, Fuhua Luo, Xiang Guo, Junjie Song, Bingdong Wang, and Zhenyong Zhang; methodology, Yunhao Yu, Meiling Dizha, Boda Zhang, Ruibin Wen, Fuhua Luo, Xiang Guo, Junjie Song, Bingdong Wang, and Zhenyong Zhang; software, Yunhao Yu, Junjie Song, and Zhenyong Zhang; validation, Yunhao Yu and Zhenyong Zhang; formal analysis, Yunhao Yu and Zhenyong Zhang; investigation, Yunhao Yu and Zhenyong Zhang; resources, Yunhao Yu and Zhenyong Zhang; data curation, Yunhao Yu and Zhenyong Zhang; writing—original draft preparation, Yunhao Yu and Zhenyong Zhang; writing—review and editing, Yunhao Yu and Zhenyong Zhang; visualization, Yunhao Yu and Zhenyong Zhang; supervision, Zhenyong Zhang; project administration, Yunhao Yu and Zhenyong Zhang; funding acquisition, Yunhao Yu and Zhenyong Zhang. All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials: Due to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data is not available.

Ethics Approval: Not applicable.

Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.

1NYISO load data. 2023, Available at: https://www.nyiso.com/load-data (accessed on 22 July 2025)

2https://www.nyiso.com/load-data (accessed on 22 July 2025)

References

1. Barbierato L, Estebsari A, Pons E, Pau M, Salassa F, Ghirardi M, et al. A distributed IoT infrastructure to test and deploy real-time demand response in smart grids. IEEE Int Things J. 2022;9(1):123–34. doi:10.1109/jiot.2018.2867511. [Google Scholar] [CrossRef]

2. Zhang T, Wang J, Xia Q, Li G, Zhou M. Extracting umbrella constraint-based representation of local electricity markets. IEEE Trans Smart Grid. 2023;14(2):1632–41. doi:10.1109/tsg.2022.3166793. [Google Scholar] [CrossRef]

3. Liu C, Zhou M, Wu J, Long C, Kundur D. Financially motivated FDI on SCED in real-time electricity markets: attacks and mitigation. IEEE Trans Smart Grid. 2019;10(2):1949–59. doi:10.1109/tsg.2017.2784366. [Google Scholar] [CrossRef]

4. Chen Y, Tang Y, Zhang S, Liu G, Liu T. Weather sensitive residential load forecasting using neural networks. In: 2023 IEEE 6th International Electrical and Energy Conference; 2023 May 12–14; Hefei, China. p. 3392–7. [Google Scholar]

5. Yao D, Wen M, Liang X, Fu Z, Zhang K, Yang B. Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J. 2019;6(5):7659–69. doi:10.1109/jiot.2019.2903312. [Google Scholar] [CrossRef]

6. Zhang Z, Deng R, Tian Y, Cheng P, Ma J. SPMA: stealthy physics-manipulated attack and countermeasures in cyber-physical smart grid. IEEE Transact Inform Foren Secur Publicat Inform. 2023;18:581–96. doi:10.1109/tifs.2022.3226868. [Google Scholar] [CrossRef]

7. Negrete-Pincetic M, Yoshida F, Gross G. Towards quantifying the impacts of cyber attacks in the competitive electricity market environment. In: 2009 IEEE Bucharest PowerTech; 2009 Jun 28–Jul 2; Bucharest, Romania. p. 1–8. doi:10.1109/ptc.2009.5282237. [Google Scholar] [CrossRef]

8. Xie L, Mo Y, Sinopoli B. False data injection attacks in electricity markets. In: The First IEEE International Conference on Smart Grid Communications; 2010 Oct 4–6; Gaithersburg, MD, USA. p. 226–31. [Google Scholar]

9. Xie L, Mo Y, Sinopoli B. Integrity data attacks in power market operations. IEEE Trans Smart Grid. 2011;2(4):659–66. doi:10.1109/tsg.2011.2161892. [Google Scholar] [CrossRef]

10. Zhang Z, Yang Z, Yau DKY, Tian Y, Ma J. Data security of machine learning applied in low-carbon smart grid: a formal model for the physics-constrained robustness. Appl Energy. 2023;347(1):121405. doi:10.1016/j.apenergy.2023.121405. [Google Scholar] [CrossRef]

11. Jia L, Thomas RJ, Tong L. Malicious data attack on real-time electricity market. In: IEEE International Conference on Acoustics, Speech and Signal Processing; 2011 May 22–27; Prague, Czech Republic. p. 5952–5. [Google Scholar]

12. Yuan Y, Li Z, Ren K. Modeling load redistribution attacks in power systems. IEEE Trans Smart Grid. 2011;2(2):382–90. doi:10.1109/tsg.2011.2123925. [Google Scholar] [CrossRef]

13. Choi D-H, Xie L. Ramp-induced data attacks on look-ahead dispatch in real-time power markets. IEEE Trans Smart Grid. 2013;4(3):1235–43. doi:10.1109/tsg.2012.2228508. [Google Scholar] [CrossRef]

14. Xiang Y, Wang L, Liu N. A framework for modeling load redistribution attacks coordinating with switching attacks. In: IEEE Power & Energy Society General Meeting; 2017 Jul 16–20; Chicago, IL, USA. p. 1–5. [Google Scholar]

15. Zhang ZJ, Bloch M, Saeedifard M. Load redistribution attacks in multi-terminal DC grids. In: IEEE Energy Conversion Congress and Exposition; 2022 Oct 9–13; Detroit, MI, USA. p. 1–7. doi:10.1109/ecce50734.2022.9948106. [Google Scholar] [CrossRef]

16. Liu X, Li Z. Local load redistribution attacks in power systems with incomplete network information. IEEE Trans Smart Grid. 2014;5(4):1665–76. doi:10.1109/tsg.2013.2291661. [Google Scholar] [CrossRef]

17. Zhu H, Liu C, Zhou M, Tang Y, Du W. Load redistribution attack in optimal power flow with phase shifting transformers. In: 2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems; 2023 May 8–11; Wuhan, China. p. 1–6. [Google Scholar]

18. Zheng DL, Zhou L, Song ZH. Kernel generalization of multi-rate probabilistic principal component analysis for fault detection in nonlinear process. IEEE/CAA J Automatica Sinica. 2021;8(8):1465–76. doi:10.1109/jas.2021.1004090. [Google Scholar] [CrossRef]

19. Esmalifalak M, Nguyen NT, Zheng R, Han Z. Detecting stealthy false data injection using machine learning in smart grid. In: 2013 IEEE Global Communications Conference; 2013 Dec 9–13; Atlanta, GA, USA. p. 808–13. [Google Scholar]

20. Esmalifalak M, Liu L, Nguyen N, Zheng R, Han Z. Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J. 2017;11(3):1644–52. doi:10.1109/jsyst.2014.2341597. [Google Scholar] [CrossRef]

21. Pinceti A, Sankar L, Kosut O. Load redistribution attack detection using machine learning: a data-driven approach. In: 2018 IEEE Power & Energy Society General Meeting; 2018 Aug 5–9; Portland, OR, USA. p. 1–5. [Google Scholar]

22. Khaleghi A, Ghazizadeh MS, Aghamohammadi MR. A deep learning-based attack detection mechanism against potential cascading failure induced by load redistribution attacks. IEEE Trans Smart Grid. 2023;14(6):4772–83. doi:10.1109/tsg.2023.3256480. [Google Scholar] [CrossRef]

23. Peng S, Zhang Z, Deng R, Cheng P. Localizing false data injection attacks in smart grid: a spectrum-based neural network approach. IEEE Trans Smart Grid. 2023;14(6):4827–38. doi:10.1109/tsg.2023.3261970. [Google Scholar] [CrossRef]

24. Liu X, Song Y, Li Z. Dummy data attacks in power systems. IEEE Trans Smart Grid. 2020;11(2):1792–5. doi:10.1109/tsg.2019.2929702. [Google Scholar] [CrossRef]

25. Zhang Z, Qin Y, Wang J, Li H, Deng R. Detecting the one-shot dummy attack on the power industrial control processes with an unsupervised data-driven approach. IEEE/CAA J Automatica Sinica. 2023;10(2):550–3. doi:10.1109/jas.2023.123243. [Google Scholar] [CrossRef]

26. Li F. Continuous locational marginal pricing (CLMP). IEEE Trans Power Syst. 2007;22(4):1638–46. doi:10.1109/tpwrs.2007.907521. [Google Scholar] [CrossRef]

27. Li F, Wei Y, Adhikari S. Improving an unjustified common practice in Ex Post LMP calculation: an expanded version. In: 2010 IEEE PES General Meeting; 2010 Jul 25–29; Minneapolis, MN, USA. p. 1–4. [Google Scholar]

28. Zhang Z, Liu M, Sun M, Deng R, Cheng P, Niyato D. Vulnerability of machine learning approaches applied in IoT-based smart grid: a review. IEEE Internet Things J. 2024;11(11):18951–187. doi:10.1109/jiot.2024.3349381. [Google Scholar] [CrossRef]

29. Li F, Bo R. Congestion and price prediction under load variation. IEEE Trans Power Syst. 2009;24(2):911–22. doi:10.1109/tpwrs.2009.2016599. [Google Scholar] [CrossRef]


Cite This Article

APA Style
Yu, Y., Dizha, M., Zhang, B., Wen, R., Luo, F. et al. (2025). DH-LDA: A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid. Computers, Materials & Continua, 85(2), 3861–3877. https://doi.org/10.32604/cmc.2025.066097
Vancouver Style
Yu Y, Dizha M, Zhang B, Wen R, Luo F, Guo X, et al. DH-LDA: A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid. Comput Mater Contin. 2025;85(2):3861–3877. https://doi.org/10.32604/cmc.2025.066097
IEEE Style
Y. Yu et al., “DH-LDA: A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid,” Comput. Mater. Contin., vol. 85, no. 2, pp. 3861–3877, 2025. https://doi.org/10.32604/cmc.2025.066097


cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 945

    View

  • 498

    Download

  • 0

    Like

Share Link