2020
DOI: 10.1109/tifs.2020.2965276
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(18 citation statements)
references
References 26 publications
0
17
0
1
Order By: Relevance
“…The proposed attack detection approach implemented a spike in neural network for dynamic detection of attacks but it has major limitation of learning the data, which affects the accuracy of the approach. Authors in [17] proposed an approach to detect hidden electricity theft by exploiting multiple pricing schemes in smart grids. The purpose and possibilities of hidden electricity theft were addressed, and an optimization problem was proposed to increase the detection of these types of attacks, and two algorithms were designed to overcome these attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed attack detection approach implemented a spike in neural network for dynamic detection of attacks but it has major limitation of learning the data, which affects the accuracy of the approach. Authors in [17] proposed an approach to detect hidden electricity theft by exploiting multiple pricing schemes in smart grids. The purpose and possibilities of hidden electricity theft were addressed, and an optimization problem was proposed to increase the detection of these types of attacks, and two algorithms were designed to overcome these attacks.…”
Section: Related Workmentioning
confidence: 99%
“…PowerNet [142] Modelica NS2 Marching-on-intime Generator control VPNET [143] VTB OPNET Marching-on-intime Wide area monitoring, protection and control GECO [144] PSLF NS2 Global event-driven Wide area monitoring, protection and control INSPIRE [145] DIgSILENT OPNET Marching-on-intime Wide area monitoring, protection and control SGsim [146] OpenDSS OMNeT++ Global [167] . 文献 [168] 研究了短信服务网络钓鱼攻击对电力需求响应程序的威胁, 可能导致大规模 连锁停电.…”
Section: 协同仿真mentioning
confidence: 99%
“…The undeniable perks of IoT are amalgamated with serious security pitfalls, mainly due to constrained devices, manufacturers primary priority is not security and lack of legislation [5]. Poorly designed IoT devices allow attackers to carry out their nefarious actions; attacks on medical implantable devices [6], smart cars [7], smart toys [8], unauthorized access of voice recordings [11], smart meters attacks [10] etc. The insecurity of these connected devices not only a potential threat for IoT but also for the whole internet.…”
Section: Introductionmentioning
confidence: 99%