2014
DOI: 10.1109/tst.2014.6787363
|View full text |Cite
|
Sign up to set email alerts
|

Energy-theft detection issues for advanced metering infrastructure in smart grid

Abstract: With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as complex network structure, resource-constrained smart meter, and privacy-sensitive data, it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than $25 billio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
144
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 289 publications
(146 citation statements)
references
References 55 publications
0
144
0
2
Order By: Relevance
“…We postulate that privacy leaks can be maliciously exploited for energy theft or discourage use of the network by internal users. By inference about household appliance usage patterns as a subgoal towards the goal of undetected energy data modification (energy theft), we extend the attack tree for energy theft proposed by Jiang et al [24].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We postulate that privacy leaks can be maliciously exploited for energy theft or discourage use of the network by internal users. By inference about household appliance usage patterns as a subgoal towards the goal of undetected energy data modification (energy theft), we extend the attack tree for energy theft proposed by Jiang et al [24].…”
Section: Related Workmentioning
confidence: 99%
“…Dependability encompasses reliability, safety and maintainability [27] and security goals include availability, integrity, confidentiality and privacy [24] [28] [29].…”
Section: A Security Requirementsmentioning
confidence: 99%
“…In particular, the widespread deployment of smart meters, renewable generation, smart load controls, energy storage, and plug-in hybrid vehicles will require fundamental changes in the operational concepts and principal components of the grid, in order to achieve real-time operation and control. Fraud detection and particularly detection of energy theft is one of most important concerns in the smart grid [18,22]. Data analytic methods can play an important role in identifying abnormal consumption trends and possible malicious activities in such systems.…”
Section: Related Workmentioning
confidence: 99%
“…Daisuke et al [22] used ARMA and LOF methods in an adversarial environment to detect attacks in data collected using advanced meter infrastructure (AMI). Rong et al [18] compared classification-based, state-based, and game theory-based methods in energy-theft detection schemas.…”
Section: Related Workmentioning
confidence: 99%
“…This technique use the data collected from various sources to confirm an on-going theft attempt. It is capable of detecting different types of energy theft precisely by using sensors [43,44].…”
Section: ) Theft Detection Techniques In Smart Metersmentioning
confidence: 99%