2014
DOI: 10.1109/tsg.2013.2291004
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(16 citation statements)
references
References 12 publications
0
16
0
Order By: Relevance
“…The framework proposed by Cardenas et al [5] is the closest to the methodology proposed in this paper. Cardenas and colleagues have developed a cost-model-based framework that assists electric utilities in provisioning intrusion detection systems.…”
Section: Related Workmentioning
confidence: 94%
See 1 more Smart Citation
“…The framework proposed by Cardenas et al [5] is the closest to the methodology proposed in this paper. Cardenas and colleagues have developed a cost-model-based framework that assists electric utilities in provisioning intrusion detection systems.…”
Section: Related Workmentioning
confidence: 94%
“…Equation (4) ensures that the bandwidth required to route flows on link (j, l) does not exceed the link capacity and constraints. Equation (5) ensures that the capacity of the detection device v is not exceeded. Equation (6) ensures that the routing path of flow i has at least one detection device of type v. In the case of insufficient resources, this constraint also enforces o i = 1 and, as a result, it activates the penalty costs c P i in the objective function.…”
Section: Distributed Intrusion Detection Design Problemmentioning
confidence: 99%
“…Hence, it was infeasible to directly study implications of topological aspects over the proposed detection mechanism. Given an AMI system (see Fig 5), any proposed intrusion detection module can be implemented in a decentralized or centralized manner in an AMI network as reported in [3], and micro-grid size affects the sensitivity of the attack detection. In a decentralized implementation, a detection module is usually deployed in either FAN (field area network if present) or NAN (neighborhood area network) gateway, that guards different smaller micro-grid subnets within the whole AMI network separately, while a centralized module is deployed in the Utility WAN gateway having a global view of a larger size of meters.…”
Section: Deployment Issues Of Proposed Detectormentioning
confidence: 99%
“…Effectively, SCADA is an example of an early M2M protocol [42][43][44][45][46][47][48][49][50]. SCADA is a well-known control system architecture for industrial process management.…”
Section: Scada Is An Example Of M2mmentioning
confidence: 99%