{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:37:49Z","timestamp":1761763069525,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,12,24]],"date-time":"2019-12-24T00:00:00Z","timestamp":1577145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The automatic generation control mechanism in power generators comes into operation whenever an over-supply or under-supply of energy occurs in the power grid. It has been shown that the automatic generation control mechanism is highly vulnerable to load altering attacks. In this type of attack, the power consumption of multiple electric loads in power distribution systems is remotely altered by cyber attackers in such a way that the automatic generation control mechanism is disrupted and is hindered from performing its pivotal role. The existing literature on load altering attacks has studied implementation, detection, and location identification of these attacks. However, no prior work has ever studied design of an attack-thwarting system that can counter load altering attacks, once they are detected in the power grid. This paper addresses the above shortcoming by proposing an attack-thwarting system for countering load altering attacks. The proposed system is based on provoking real-time adjustment in power consumption of the flexible loads in response to the frequency disturbances caused by the load altering attacks. To make the adjustments in-proportion to the frequency disturbances, the proposed attack-thwarting system uses a transactive energy framework to establish a coordination between the flexible loads and the power grid operator.<\/jats:p>","DOI":"10.3390\/fi12010004","type":"journal-article","created":{"date-parts":[[2019,12,24]],"date-time":"2019-12-24T10:28:43Z","timestamp":1577183323000},"page":"4","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Transactive Energy to Thwart Load Altering Attacks on Power Distribution Systems"],"prefix":"10.3390","volume":"12","author":[{"given":"Samuel","family":"Yankson","sequence":"first","affiliation":[{"name":"EECE Department, University of Louisiana at Lafayette, Lafayette, LA 70504, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5117-5714","authenticated-orcid":false,"given":"Mahdi","family":"Ghamkhari","sequence":"additional","affiliation":[{"name":"EECE Department, University of Louisiana at Lafayette, Lafayette, LA 70504, USA"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Hassanzadeh, A., Modi, S., and Mulchandani, S. (2015, January 14\u201316). Towards effective security control assignment in the Industrial Internet of Things. Proceedings of the IEEE World Forum on Internet of Things, Milan, Italy.","DOI":"10.1109\/WF-IoT.2015.7389155"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"eaan3184","DOI":"10.1126\/science.aan3184","article-title":"Small vulnerable sets determine large network cascades in power grids","volume":"358","author":"Yang","year":"2017","journal-title":"Science"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TSTE.2017.2718518","article-title":"Impacts of wind power uncertainty on grid vulnerability to cascading overload failures","volume":"9","author":"Athari","year":"2017","journal-title":"IEEE Trans. Sustain. Energy"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.tej.2017.02.006","article-title":"How cyber-attacks in Ukraine show the vulnerability of the US power grid","volume":"30","author":"Sullivan","year":"2017","journal-title":"Electr. J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2862","DOI":"10.1109\/TSG.2016.2622686","article-title":"Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes","volume":"9","author":"Amini","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2036","DOI":"10.1109\/TSG.2017.2787690","article-title":"Hierarchical Location Identification of Destabilizing Faults and Attacks in Power Systems: A Frequency-Domain Approach","volume":"10","author":"Amini","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Amini, S., Pasqualetti, F., and Mohsenian-Rad, H. (2015, January 2\u20135). Detecting dynamic load altering attacks: A data-driven time-frequency analysis. Proceedings of the International Conference on Smart Grid Communications, Miami, FL, USA.","DOI":"10.1109\/SmartGridComm.2015.7436350"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Izbicki, M., Amini, S., Shelton, C.R., and Mohsenian-Rad, H. (2017, January 24\u201326). Identification of destabilizing attacks in power systems. Proceedings of the American Control Conference, Seattle, WA, USA.","DOI":"10.23919\/ACC.2017.7963476"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MCOM.2012.6257525","article-title":"Securing smart grid: cyber attacks, countermeasures, and challenges","volume":"50","author":"Li","year":"2012","journal-title":"IEEE Commun. Mag."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Pasqualetti, F., D\u00f6rfler, F., and Bullo, F. (2012, January 10\u201313). Cyber-physical security via geometric control: Distributed monitoring and malicious attacks. Proceedings of the IEEE Conference on Decision and Control, Maui, HI, USA.","DOI":"10.1109\/CDC.2012.6426257"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/TSG.2012.2224391","article-title":"Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study","volume":"4","author":"Esmalifalak","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Xie, L., Mo, Y., and Sinopoli, B. (2010, January 4\u20136). False data injection attacks in electricity markets. Proceedings of the IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA.","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kosut, O., Jia, L., Thomas, R.J., and Tong, L. (2010, January 4\u20136). Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. Proceedings of the IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA.","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Pandey, R.K., and Misra, M. (2016, January 19\u201321). Cyber security threats\u2014Smart grid infrastructure. Proceedings of the National Power Systems Conference, Bhubaneswar, India.","DOI":"10.1109\/NPSC.2016.7858950"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/TSG.2012.2229397","article-title":"Exploring malicious meter inspection in neighborhood area smart grids","volume":"4","author":"Xiao","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_17","unstructured":"Oman, P., Schweitzer, E.O., and Frincke, D. (2000, January 23\u201326). Concerns About Intrusions Into Remotely Accessible Substation Controllers And SCADA Systems. Proceedings of the 27th Annual Conference for Protective Relay Engineers, Spokane, WA, USA."},{"key":"ref_18","unstructured":"Mission Support Center (2016). Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector, Idaho National Laboratory."},{"key":"ref_19","first-page":"1176","article-title":"Preventing Time-Delay Switch Attack on Load Frequency Control in Distributed Power Systems","volume":"7","author":"Sargolzaei","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/TSG.2016.2547742","article-title":"Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids","volume":"9","author":"Lin","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/LCOMM.2014.2371035","article-title":"Power Consumption Profiling Using Energy Time-Frequency Distributions in Smart Grids","volume":"19","author":"Marnerides","year":"2015","journal-title":"IEEE Commun. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1109\/TSG.2011.2160297","article-title":"Distributed Internet-Based Load Altering Attacks Against Smart Power Grids","volume":"2","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_23","unstructured":"Eto, J.H., Undrill, J., Roberts, C., Mackin, P., and Ellis, J. (2018). Frequency Control Requirements for Reliable Interconnection Frequency Response, FERC."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Kerdphol, T., Rahman, F.S., Watanabe, M., Mitani, Y., Turschner, D., and Beck, H. (2019, January 19\u201323). Extended Virtual Inertia Control Design for Power System Frequency Regulation. Proceedings of the IEEE PES GTD Grand International Conference and Exposition Asia, Bangkok, Thailand.","DOI":"10.1109\/GTDAsia.2019.8715859"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/6.887597","article-title":"On the trail of intrusions into information systems","volume":"37","author":"Kent","year":"2000","journal-title":"IEEE Spectr."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1109\/JPROC.2017.2687865","article-title":"Cybersecurity in Distributed Power Systems","volume":"105","author":"Li","year":"2017","journal-title":"Proc. IEEE"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ghamkhari, M. (2019, January 3\u20136). Transactive Energy Pricing in Power Distribution Systems. Proceedings of the IEEE Green Technologies Conference, Lafayette, LA, USA.","DOI":"10.1109\/GreenTech.2019.8767149"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Nimkar, P.R., Arora, T.G., Bangde, P.S., and Narnaware, P.J. (2018, January 12\u201313). Over-Flux Protection of The Transformer. Proceedings of the International Conference on Smart Electric Drives and Power System, Maharashtra, India.","DOI":"10.1109\/ICSEDPS.2018.8536055"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.ijepes.2017.12.015","article-title":"Decentralized model predictive control of voltage source converters for AC frequency containment","volume":"98","author":"Papangelis","year":"2018","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1093\/oxrep\/grx041","article-title":"Electricity market design","volume":"33","author":"Cramton","year":"2017","journal-title":"Oxf. Rev. Econ. Policy"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1109\/59.736283","article-title":"Automatic generation control in a deregulated power system","volume":"13","author":"Bakken","year":"1998","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/TSG.2013.2264970","article-title":"Dynamic demand response controller based on real-time retail price for residential buildings","volume":"5","author":"Yoon","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/S1040-6190(03)00014-9","article-title":"Integrated Electricity Markets in New York: Day-ahead and Real-time Markets for Energy, Ancillary Services, and Transmission","volume":"16","author":"Kranz","year":"2002","journal-title":"Electr. J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1049\/iet-gtd.2009.0046","article-title":"Design and operation of the locational marginal prices-based electricity markets","volume":"4","author":"Litvinov","year":"2010","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1016\/j.ijforecast.2015.11.011","article-title":"Probabilistic electric load forecasting: A tutorial review","volume":"32","author":"Hong","year":"2016","journal-title":"Int. J. Forecast."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1016\/S0196-8904(99)00040-0","article-title":"Robust automatic generation control","volume":"40","author":"Azzam","year":"1999","journal-title":"Energy Convers. Manag."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/j.aej.2014.06.006","article-title":"Robust automatic generation control","volume":"53","author":"Mohanty","year":"2014","journal-title":"Alex. Eng. J."},{"key":"ref_38","unstructured":"Friedland, B. (2005). Control System Design: An Introduction to State-Space Methods, Dover Publications."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Guo, W., Tang, Y., Dai, Y., and Guo, Y. (2016, January 16\u201317). The Analysis of the Primary Frequency Regulation in Electric Power System. Proceedings of the International Forum on Energy, Environment and Sustainable Development, Shenzhen, China.","DOI":"10.2991\/ifeesd-16.2016.201"},{"key":"ref_40","unstructured":"Australian Energy Market Operator (2019, April 01). Frequency Control. Available online: https:\/\/www.aemo.com.au\/-\/media\/Files\/Electricity\/NEM\/Security_and_Reliability\/Reports\/2016\/AEMO-Fact-Sheet_Frequency-Control---Final.pdf."},{"key":"ref_41","unstructured":"Williams, S., Short, M., and Crosbie, T. (2017, January 28\u201330). Evaluating the role of building thermal inertia for the provision of decentralised demand side primary electrical frequency regulation services. Proceedings of the Sustainable Thermal Energy Management International Conference (SusTEM2017), Alkmaar, The Netherlands."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MVT.2017.2669348","article-title":"Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity","volume":"12","author":"Ni","year":"2017","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Goel, S., Hong, Y., Papakonstantinou, V., and Kloza, D. (2015). Smart Grid Security, Springer.","DOI":"10.1007\/978-1-4471-6663-4"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Ullrich, J., and Weippl, E.R. (2017, January 4\u20138). Grid shock: coordinated load-changing attacks on power grids. Proceedings of the Annual Computer Security Applications Conference, Orlando, FL, USA.","DOI":"10.1145\/3134600.3134639"},{"key":"ref_45","unstructured":"Cooper, C. (2019, April 01). WannaCry: Lessons Learned 1 Year Later. Available online: https:\/\/www.symantec.com\/blogs\/feature-stories\/wannacry-lessons-learned-1-year-later."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Ghamkhari, M. (2019, January 25\u201328). Transactive Energy versus Demand Response in Cutting Wholesale Electricity Prices. Proceedings of the IEEE International Conference on Smart Grid and Smart Cities, Berkeley, CA, USA.","DOI":"10.1109\/ICSGSC.2019.00006"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/1\/4\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:45:10Z","timestamp":1760190310000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/1\/4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,24]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1]]}},"alternative-id":["fi12010004"],"URL":"https:\/\/doi.org\/10.3390\/fi12010004","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2019,12,24]]}}}