IEEE Systems, Man and Cybernetics Magazine - April 2022 - 23

information collected from hardware
installed in the electrical
power system and household.
The typical objective of an HEMS
is to minimize the customer's
costs. Bidirectional communication
among the HEMS, smar t
meters, utility, and power grid
enables the HEMS to meet
its
objectives by, for example, implementing
a peak-shaving strategy
while considering the electricity
price signal.
An IoT network, along with an
The continuous
integration of RESs
into the power system
has made it important
to enable effective
DSM to match the
power supply with
the load.
advanced metering infrastructure
(AMI), supports the bidirectional communication
and enables robust data management systems, strong
network connectivity, and smart metering systems.
The deployment of an AMI makes it possible for smart
meters to measure and collect useful information, such
as the energy consumption, available (generated) energy,
or energy price in the next hour, in a precise and
t imely manner. Moreover, th is informat ion is
exchanged between the HEMS and utility simultaneously
in real time. As a result, customers can take
par t
in DSM st rategies and manage the energy
demand effectively.
Figure 2 illustrates the operations of a typical HEMS.
Four components-the data aggregator (DA), software
and network management (SNM), appliance management
system (AMS), and HA-interface with each other
to form the HEMS. The DA receives energy pricing and
production information and sends this to the SNM and
HA. The AMS component collects data about appliances,
such as energy consumption, operation time interval,
data received from user interfaces, and so on, and
exchanges them with the HA and SNM. Thereafter, the
HA executes the scheduling task and sends the results (a
new schedule and so on) to the SNM, which operates as
the primary control and management component, managing
the accumulated data of the DA, HA, and AMS
components and processing the flow of instructions in
the network.
HEMSs and their characteristics have been extensively
investigated in the last decade, and a comprehensive
description of HEMS architectures, DSM
approaches, smart grid technologies, communication
protocols, and various decision-making algorithms
can be found in [2]. This article focuses on the operational
aspects of HEMSs and assesses their resilience
against a specific type of cyberattack. Such an attack
is defined by fake price signals that are used as
inputs to the HEMSs to alter their load schedule. To
the best of the authors' knowledge, this important
aspect has not yet been studied in the literature.
Before we discuss the details of the proposed study,
we briefly introduce the main
ideas behind DR and the scheduling
algorithms.
Demand Response
The goal of an HEMS is to enable
and support DSM to meet specific
objectives, such as the minimization
of customers' electricity bills,
utility costs, or system costs. DSM
is typically achieved by offering
financial incentives to customers,
inducing behavioral changes
through education, using higherefficiency
loads, increasing diversity
factors, using distributed energy resources, or other
measures [3]. The continuous integration of RESs into the
power system has made it important to enable effective
DSM to match the power supply with the load.
DR methods, which offer financial incentives to customers,
are popular and highly researched techniques to
achieve DSM since they incentivize RES integration along
with DSM. DR is defined as [4]:
a tariff or program established to motivate changes in
electric usage by end-users from their normal consumption
patterns in response to changes in the price
of electricity over time, or to give incentive payments
designed to induce lower electricity use at times of
high wholesale market prices or when system reliability
is jeopardized.
HEMSs nearly always employ DR methods to achieve
their goals.
Pricing Information
Energy Transaction
Data
Aggregation
Software and
Network
Management
Heuristic
Algorithms
Appliances
Fixed Power
Flexible Power
Appliance
Management
System
User Interfaces
Figure 2. The typical operations of an HEMS.
April 2022 IEEE SYSTEMS, MAN, & CYBERNETICS MAGAZINE 23

IEEE Systems, Man and Cybernetics Magazine - April 2022

Table of Contents for the Digital Edition of IEEE Systems, Man and Cybernetics Magazine - April 2022

Contents
IEEE Systems, Man and Cybernetics Magazine - April 2022 - Cover1
IEEE Systems, Man and Cybernetics Magazine - April 2022 - Cover2
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 1
IEEE Systems, Man and Cybernetics Magazine - April 2022 - Contents
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 3
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 4
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 5
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 6
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 7
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 8
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 9
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 10
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 11
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 12
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 13
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 14
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 15
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 16
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 17
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 18
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 19
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 20
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 21
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 22
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 23
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 24
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 25
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 26
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 27
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 28
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 29
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 30
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 31
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 32
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 33
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 34
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 35
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 36
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 37
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 38
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 39
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 40
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 41
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 42
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 43
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 44
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 45
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 46
IEEE Systems, Man and Cybernetics Magazine - April 2022 - 47
IEEE Systems, Man and Cybernetics Magazine - April 2022 - Cover3
IEEE Systems, Man and Cybernetics Magazine - April 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202310
https://www.nxtbook.com/nxtbooks/ieee/smc_202307
https://www.nxtbook.com/nxtbooks/ieee/smc_202304
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com