Detailed Information

Cited 11 time in webofscience Cited 15 time in scopus
Metadata Downloads

Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid

Full metadata record
DC Field Value Language
dc.contributor.authorPan, Tianyi-
dc.contributor.authorMishra, Subhankar-
dc.contributor.authorNguyen, Lan N.-
dc.contributor.authorLee, Gunhee-
dc.contributor.authorKang, Jungmin-
dc.contributor.authorSeo, Jungtaek-
dc.contributor.authorThai, My T.-
dc.date.available2021-03-02T07:40:57Z-
dc.date.created2021-03-02-
dc.date.issued2017-08-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/80214-
dc.description.abstractSocial networks (SNs) have been gradually applied by utility companies as an addition to smart grid and are proved to be helpful in smoothing load curves and reducing energy usage. However, SNs also bring in new threats to smart grid: misinformation in SNs may cause smart grid users to alter their demand, resulting in transmission line overloading and in turn leading to catastrophic impact to the grid. In this paper, we discuss the interdependence in the SN coupled smart grid and focus on its vulnerability. That is, how much can the smart grid be damaged when misinformation related to it diffuses in SNs? To analytically study the problem, we propose the misinformation attack problem in social-smart grid that identifies the top critical nodes in the SN, such that the smart grid can be greatly damaged when misinformation propagates from those nodes. This problem is challenging as we have to incorporate the complexity of the two networks concurrently. Nevertheless, we propose a technique that can explicitly take into account information diffusion in SN, power flow balance, and cascading failure in smart grid integratedly when evaluating node criticality, based on which we propose various strategies in selecting the most critical nodes. Also, we introduce controlled load shedding as a protection strategy to reduce the impact of cascading failure. The effectiveness of our algorithms is demonstrated by experiments on the IEEE bus test cases as well as the Pegase data set.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.relation.isPartOfIEEE ACCESS-
dc.titleThreat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000411322200006-
dc.identifier.doi10.1109/ACCESS.2017.2738565-
dc.identifier.bibliographicCitationIEEE ACCESS, v.5, pp.16774 - 16783-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85028735582-
dc.citation.endPage16783-
dc.citation.startPage16774-
dc.citation.titleIEEE ACCESS-
dc.citation.volume5-
dc.contributor.affiliatedAuthorSeo, Jungtaek-
dc.type.docTypeArticle-
dc.subject.keywordAuthorSocial network-
dc.subject.keywordAuthorsmart grid-
dc.subject.keywordAuthorcascading failure-
dc.subject.keywordAuthorinterdependent networks-
dc.subject.keywordAuthorpower grid-
dc.subject.keywordPlusPOWER-
dc.subject.keywordPlusSYSTEMS-
dc.subject.keywordPlusTOOLS-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE