{"id":"https://openalex.org/W3154123166","doi":"https://doi.org/10.1145/3422337.3447826","title":"We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart Grids","display_name":"We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart Grids","publication_year":2021,"publication_date":"2021-04-10","ids":{"openalex":"https://openalex.org/W3154123166","doi":"https://doi.org/10.1145/3422337.3447826","mag":"3154123166"},"language":"en","primary_location":{"id":"doi:10.1145/3422337.3447826","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337.3447826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071145600","display_name":"Thusitha Dayaratne","orcid":"https://orcid.org/0000-0003-0624-1967"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Thusitha Dayaratne","raw_affiliation_strings":["Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086593836","display_name":"Carsten Rudolph","orcid":"https://orcid.org/0000-0001-9050-5675"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Carsten Rudolph","raw_affiliation_strings":["Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046772414","display_name":"Ariel Liebman","orcid":"https://orcid.org/0000-0002-5679-4140"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ariel Liebman","raw_affiliation_strings":["Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019440770","display_name":"Mahsa Salehi","orcid":"https://orcid.org/0000-0002-2991-1612"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mahsa Salehi","raw_affiliation_strings":["Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071145600"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":null,"apc_paid":null,"fwci":0.824,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71510362,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7446543574333191},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6938208937644958},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6857618689537048},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6727756857872009},{"id":"https://openalex.org/keywords/demand-response","display_name":"Demand response","score":0.6400246024131775},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4995119571685791},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48573189973831177},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.47226133942604065},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.4474475681781769},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4374930262565613},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.4247710406780243},{"id":"https://openalex.org/keywords/metering-mode","display_name":"Metering mode","score":0.4187565743923187},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3492695689201355},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17434874176979065},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13391008973121643},{"id":"https://openalex.org/keywords/electricity","display_name":"Electricity","score":0.10060873627662659}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7446543574333191},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6938208937644958},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6857618689537048},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6727756857872009},{"id":"https://openalex.org/C2779438525","wikidata":"https://www.wikidata.org/wiki/Q5255048","display_name":"Demand response","level":3,"score":0.6400246024131775},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4995119571685791},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48573189973831177},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.47226133942604065},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.4474475681781769},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4374930262565613},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.4247710406780243},{"id":"https://openalex.org/C30905978","wikidata":"https://www.wikidata.org/wiki/Q815598","display_name":"Metering mode","level":2,"score":0.4187565743923187},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3492695689201355},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17434874176979065},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13391008973121643},{"id":"https://openalex.org/C206658404","wikidata":"https://www.wikidata.org/wiki/Q12725","display_name":"Electricity","level":2,"score":0.10060873627662659},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3422337.3447826","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337.3447826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1848663210","https://openalex.org/W1990734178","https://openalex.org/W2005028112","https://openalex.org/W2040085288","https://openalex.org/W2100445566","https://openalex.org/W2108906138","https://openalex.org/W2109156380","https://openalex.org/W2116532272","https://openalex.org/W2130197044","https://openalex.org/W2141692617","https://openalex.org/W2167374930","https://openalex.org/W2204603081","https://openalex.org/W2295733304","https://openalex.org/W2324437139","https://openalex.org/W2342556648","https://openalex.org/W2342782995","https://openalex.org/W2501430986","https://openalex.org/W2545258053","https://openalex.org/W2575501069","https://openalex.org/W2692776268","https://openalex.org/W2914982603","https://openalex.org/W2969101239","https://openalex.org/W2990468123","https://openalex.org/W3021506965","https://openalex.org/W3105464038","https://openalex.org/W3144436208"],"related_works":["https://openalex.org/W2384104878","https://openalex.org/W2360352189","https://openalex.org/W2054457760","https://openalex.org/W2351145417","https://openalex.org/W4366493519","https://openalex.org/W4210559106","https://openalex.org/W4285210433","https://openalex.org/W4308935387","https://openalex.org/W2588025734","https://openalex.org/W2028140520"],"abstract_inverted_index":{"Advanced":[0],"metering":[1],"infrastructure,":[2],"along":[3],"with":[4],"home":[5,39,41],"automation":[6],"processes,":[7],"is":[8],"enabling":[9],"more":[10],"efficient":[11],"and":[12,20],"effective":[13],"demand-side":[14],"management":[15,43],"opportunities":[16],"for":[17,32,106],"both":[18],"consumers":[19],"utility":[21],"companies.":[22],"However,":[23],"tight":[24],"cyber-physical":[25],"integration":[26],"also":[27],"enables":[28],"novel":[29,71],"attack":[30,87],"vectors":[31],"false":[33],"data":[34],"injection":[35],"attacks":[36],"(FDIA)":[37],"as":[38,108,110,128],"automation/":[40],"energy":[42],"systems":[44,57],"reside":[45],"outside":[46],"the":[47,77,86,102],"utilities'":[48],"control":[49,113],"perimeter.":[50],"Authentic":[51],"users":[52],"themselves":[53],"can":[54],"manipulate":[55],"these":[56],"without":[58],"causing":[59],"significant":[60,98],"security":[61,125,131,133],"breaches":[62],"compared":[63],"to":[64,93,121,155],"traditional":[65,122],"FDIAs.":[66],"This":[67],"work":[68],"depicts":[69],"a":[70,90,115,148],"FDIA":[72],"that":[73,95],"exploits":[74],"one":[75],"of":[76,118,143,150,159],"commonly":[78],"utilised":[79],"distributed":[80],"device":[81],"scheduling":[82],"architectures.":[83],"We":[84],"evaluate":[85],"impact":[88,152],"using":[89],"realistic":[91],"dataset":[92],"demonstrate":[94],"adversaries":[96],"gain":[97],"benefits,":[99],"independently":[100],"from":[101],"actual":[103],"algorithm":[104],"used":[105],"optimisation,":[107],"long":[109],"they":[111],"have":[112],"over":[114],"sufficient":[116],"amount":[117],"demand.":[119],"Compared":[120],"FDIAs,":[123],"reliable":[124],"mechanisms":[126],"such":[127],"proper":[129],"authentication,":[130],"protocols,":[132],"controls":[134],"or,":[135],"sealed/controlled":[136],"devices":[137],"cannot":[138],"prevent":[139],"this":[140,157],"new":[141],"type":[142,158],"FDIA.":[144],"Thus,":[145],"we":[146],"propose":[147],"set":[149],"possible":[151],"alleviation":[153],"solutions":[154],"thwart":[156],"attack.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
