Skip to main content

Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10242))

Abstract

In this paper, we consider the Continuous Double Auction (CDA) scheme as a comprehensive power resource allocation approach on micro-grids. Users of CDA schemes are typically self-interested and so work to maximize self-profit. Meanwhile, security in CDAs has received limited attention, with little to no theoretical or experimental evidence demonstrating how an adversary cheats to gain excess energy or derive economic benefits. We identify two forms of cheating realised by changing the trading agent (TA) strategy of some of the agents in a homogeneous CDA scheme. In one case an adversary gains control and degrades other trading agents’ strategies to gain more surplus. While in the other, K colluding trading agents employ an automated coordinated approach to changing their TA strategies to maximize surplus power gains. We propose an exception handling mechanism that makes use of allocative efficiency and message overheads to detect and mitigate cheating forms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Networks made up of many embedded devices with limited power, memory, and processing resources.

  2. 2.

    How the exchange takes place; formalising rules of engagement of traders and the final allocation of commodities.

  3. 3.

    Strategy developed by Tesauro and Bredin [6] as a modification of the Gjerstad-Dickhaut (GD) strategy that uses dynamic programming to price orders.

  4. 4.

    This means 2 buyers and 2 sellers following the first strategy compete against 4 buyers and 4 sellers following the second strategy.

References

  1. Haque, A., Alhashmi, S.M., Parthiban, R.: A survey of economic models in grid computing. Future Gener. Comput. Syst. 27(8), 1056–1069 (2011)

    Article  Google Scholar 

  2. Marufu, A.M.C., Kayem, A.V.D.M., Wolthusen, S.D.: A distributed continuous double auction framework for resource constrained microgrids. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds.) CRITIS 2015. LNCS, vol. 9578, pp. 183–196. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33331-1_15

    Google Scholar 

  3. Marufu, A.M.C., Kayem, A.V.D.M., Wothulsen, S.D.: Fault-tolerant distributed continuous double auctioning on computationally constrained microgrids. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, pp. 448–456. SCITEPRESS (2016)

    Google Scholar 

  4. Stańczak, J., Radziszewska, W., Nahorski, Z.: Dynamic pricing and balancing mechanism for a microgrid electricity market. In: Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P., Zadrozny, S. (eds.) Intelligent Systems’2014. AISC, vol. 323, pp. 793–806. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-11310-4_69

    Google Scholar 

  5. De Luca, M., Cliff, D.: Human-agent auction interactions: adaptive-aggressive agents dominate. In: IJCAI Proceedings-International Joint Conference on Artificial Intelligence, vol. 22, p. 178. Citeseer (2011)

    Google Scholar 

  6. Tesauro, G., Bredin, J.L.: Strategic sequential bidding in auctions using dynamic programming. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 2, pp. 591–598. ACM (2002)

    Google Scholar 

  7. Vytelingum, P.: The structure and behaviour of the Continuous Double Auction. Ph.D. thesis, University of Southampton (2006)

    Google Scholar 

  8. Vytelingum, P., Cliff, D., Jennings, N.R.: Strategic bidding in continuous double auctions. Artif. Intell. 172(14), 1700–1729 (2008)

    Article  MATH  Google Scholar 

  9. Vach, D., Maršńl, A.M.A.: Comparison of double auction bidding strategies for automated trading agents (2015)

    Google Scholar 

  10. Yokoo, M., Sakurai, Y., Matsubara, S.: The effect of false-name bids in combinatorial auctions: new fraud in Internet auctions. Games Econ. Behav. 46(1), 174–188 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  11. Porter, R., Shoham, Y.: On cheating in sealed-bid auctions. Decis. Support Syst. 39(1), 41–54 (2005)

    Article  Google Scholar 

  12. Chakraborty, I., Kosmopoulou, G.: Auctions with shill bidding. Econ. Theor. 24(2), 271–287 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  13. Trevathan, J., Read, W.: Detecting shill bidding in online English auctions. In: Handbook of Research on Social and Organizational Liabilities in Information Security, p. 446. Information Science Reference, Hershey (2008)

    Google Scholar 

  14. Wang, C., Leung, H.: Anonymity and security in continuous double auctions for internet retails market. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 10 pp. IEEE (2004)

    Google Scholar 

  15. Trevathan, J., Ghodosi, H., Read, W.: An anonymous and secure continuous double auction scheme. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS 2006, vol. 6, p. 125b. IEEE (2006)

    Google Scholar 

  16. Ma, H., Leung, H.-F.: An adaptive attitude bidding strategy for agents in continuous double auctions. Electron. Commer. Res. Appl. 6(4), 383–398 (2008)

    Article  Google Scholar 

  17. Chaudhuri, P., Edward, T.: An algorithm for k-mutual exclusion in decentralized systems. Comput. Commun. 31(14), 3223–3235 (2008)

    Article  Google Scholar 

  18. Parsons, S., Klein, M.: Towards robust multi-agent systems: handling communication exceptions in double auctions. In: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, vol. 3, pp. 1482–1483. IEEE Computer Society (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anesu M. C. Marufu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Marufu, A.M.C., Kayem, A.V.D.M., Wolthusen, S.D. (2017). Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science(), vol 10242. Springer, Cham. https://doi.org/10.1007/978-3-319-71368-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71368-7_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71367-0

  • Online ISBN: 978-3-319-71368-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics