Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid | |
Xia XF(夏小芳)![]() ![]() ![]() | |
Department | 工业控制网络与系统研究室 |
Source Publication | COMPUTER JOURNAL
![]() |
ISSN | 0010-4620 |
2017 | |
Volume | 60Issue:12Pages:1852-1870 |
Indexed By | SCI ; EI |
EI Accession number | 20181404971204 |
WOS ID | WOS:000425258700010 |
Contribution Rank | 1 |
Funding Organization | National Natural Science Foundation of China (NSFC) ; National Science Foundation (NSF) (USA) ; NSFC ; Youth Innovation Promotion Association, CAS |
Keyword | Smart Grid Smart Meter Malicious Meter Electricity Theft Security Cyber-physical System |
Abstract | As the smart meters are vulnerable to physical attacks as well as cyber attacks, electricity theft in smart grids is much easier to commit and more difficult to detect than that in traditional power grids. In this paper, to facilitate the inspection of the malicious meters, a full and complete binary inspection tree whose leaves stand for smart meters is employed as a logical structure. We can logically configure an inspector (a meter for detection) at any node on the tree. By calculating the difference between the inspector's reading and the summation of the readings reported from the smart meters on the subtree of one node, as well as the difference between the total amount of stolen electricity on the subtrees of an internal node and its left child, we propose a difference-comparison-based inspection algorithm which allows the inspector to skip a large number of nodes on the tree and hence accelerates the detection speed of the malicious meters remarkably. Furthermore, for quickly identifying a complete set of malicious meters, we propose an adaptive reporting mechanism which adopts much shorter reporting periods during the inspection process. Analysis with proofs about the performance bounds of the proposed algorithm in terms of the number of inspection steps is provided. Simulations not only validate the theoretical analysis, but also show the superiority of the proposed algorithm over the existing works in terms of inspection steps, regardless of the ratio and the permutation of malicious meters. |
Language | 英语 |
WOS Subject | Computer Science, Hardware & Architecture ; Computer Science, Information Systems ; Computer Science, Software Engineering ; Computer Science, Theory & Methods |
WOS Keyword | NONTECHNICAL LOSS FRAUD ; WIRELESS SENSOR NETWORKS ; ENERGY THEFT ; INFRASTRUCTURE ; ARCHITECTURE ; REGRESSION ; ALGORITHM ; SECURITY ; DETECTOR ; SYSTEMS |
WOS Research Area | Computer Science |
Funding Project | National Natural Science Foundation of China (NSFC)[61374200] ; National Science Foundation (NSF) (USA)[CNS-1059265] ; NSFC[61673371] ; NSFC[71661147005] ; Youth Innovation Promotion Association, CAS[2015157] |
Citation statistics | |
Document Type | 期刊论文 |
Identifier | http://ir.sia.cn/handle/173321/21599 |
Collection | 工业控制网络与系统研究室 |
Corresponding Author | Liang W(梁炜) |
Affiliation | 1.Key Lab of Networked Control Systems, Chinese Academy of Sciences, 110016 Shenyang, China 2.Shenyang Institute of Automation, Chinese Academy of Sciences, 110016 Shenyang, China 3.University of Chinese Academy of Sciences, 100039 Beijing, China 4.Department of Computer Science, The University of Alabama, Tuscaloosa, AL 35487-0290, USA |
Recommended Citation GB/T 7714 | Xia XF,Liang W,Xiao Y,et al. Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid[J]. COMPUTER JOURNAL,2017,60(12):1852-1870. |
APA | Xia XF,Liang W,Xiao Y,&Zheng M.(2017).Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid.COMPUTER JOURNAL,60(12),1852-1870. |
MLA | Xia XF,et al."Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid".COMPUTER JOURNAL 60.12(2017):1852-1870. |
Files in This Item: | ||||||
File Name/Size | DocType | Version | Access | License | ||
Difference-Compariso(1769KB) | 期刊论文 | 作者接受稿 | 开放获取 | ODC PDDL | View Application Full Text |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment