6,668 research outputs found

    On the Efficiency-vs-Security Tradeoff in the Smart Grid

    Full text link
    The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage the delay tolerance of energy demands in order to balance the energy load over time, and hence, reduce the total operational cost. This opportunity, however, comes with security threats, as the grid becomes more vulnerable to cyber-attacks. In this paper, we study the impact of such malicious cyber-attacks on the energy efficiency of the grid in a simplified setup. More precisely, we consider a simple model where the energy demands of the smart grid consumers are intercepted and altered by an active attacker before they arrive at the operator, who is equipped with limited intrusion detection capabilities. We formulate the resulting optimization problems faced by the operator and the attacker and propose several scheduling and attack strategies for both parties. Interestingly, our results show that, as opposed to facilitating cost reduction in the smart grid, increasing the delay tolerance of the energy demands potentially allows the attacker to force increased costs on the system. This highlights the need for carefully constructed and robust intrusion detection mechanisms at the operator.Comment: A shorter version appears in IEEE CDC 201

    The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications

    Full text link
    The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage the delay tolerance of energy demands in order to balance the energy load over time, and hence, reduce the total operational cost. This opportunity, however, comes with security threats, as the grid becomes more vulnerable to cyber-attacks. In this paper, we study the impact of such malicious cyber-attacks on the energy efficiency of the grid in a simplified setup. More precisely, we consider a simple model where the energy demands of the smart grid consumers are intercepted and altered by an active attacker before they arrive at the operator, who is equipped with limited intrusion detection capabilities. We formulate the resulting optimization problems faced by the operator and the attacker and propose several scheduling and attack strategies for both parties. Interestingly, our results show that, as opposed to facilitating cost reduction in the smart grid, increasing the delay tolerance of the energy demands potentially allows the attacker to force increased costs on the system. This highlights the need for carefully constructed and robust intrusion detection mechanisms at the operator.Comment: Technical report - this work was accepted to IEEE Transactions on Control of Network Systems, 2016. arXiv admin note: substantial text overlap with arXiv:1209.176

    An effective mass theorem for the bidimensional electron gas in a strong magnetic field

    Full text link
    We study the limiting behavior of a singularly perturbed Schr\"odinger-Poisson system describing a 3-dimensional electron gas strongly confined in the vicinity of a plane (x,y)(x,y) and subject to a strong uniform magnetic field in the plane of the gas. The coupled effects of the confinement and of the magnetic field induce fast oscillations in time that need to be averaged out. We obtain at the limit a system of 2-dimensional Schr\"odinger equations in the plane (x,y)(x,y), coupled through an effective selfconsistent electrical potential. In the direction perpendicular to the magnetic field, the electron mass is modified by the field, as the result of an averaging of the cyclotron motion. The main tools of the analysis are the adaptation of the second order long-time averaging theory of ODEs to our PDEs context, and the use of a Sobolev scale adapted to the confinement operator

    Pipe insert flow meter

    Get PDF
    CER64MSA-DBS32.October 1965.Includes bibliographical references

    Inclusive B-Meson Production at the LHC in the GM-VFN Scheme

    Full text link
    We calculate the next-to-leading-order cross section for the inclusive production of B mesons in pp collisions in the general-mass variable-flavor-number scheme, an approach which takes into account the finite mass of the b quarks. We use realistic evolved non-perturbative fragmentation functions obtained from fits to e+e- data and compare results for the transverse-momentum and rapidity distributions at a center-of-mass energy of 7 TeV with recent data from the CMS Collaboration. We find good agreement, in particular at large values of pT.Comment: Minor changes to the text, accepted for publication in Phys. Rev.
    corecore