http://iet.metastore.ingenta.com
1887

access icon openaccess Entropy-based electricity theft detection in AMI network

  • HTML
    109.4150390625Kb
  • PDF
    1.8797388076782227MB
  • XML
    87.4462890625Kb
Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/3/2/IET-CPS.2017.0063.html;jsessionid=wu819clau0mp.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2017.0063&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Jiang, R., Lu, R., Lai, C., et al: ‘Robust group key management with revocation and collusion resistance for scada in smart grid’. Proc. IEEE Global Communications Conf. (GLOBECOM), December 2013, pp. 802807.
    2. 2)
      • 2. ‘India blackouts leave 700 million without power’. Available at https://www.theguardian.com/world/2012/jul/31/india-blackout-electricity-power-cuts.
    3. 3)
      • 3. ‘Second day of India's electricity outage hits 620 million’. Available at http://usatoday30.usatoday.com/news/world/story/2012-07-31/india-power-outage/56600520/1.
    4. 4)
      • 4. Lu, R., Liang, X., Li, X., et al: ‘Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (9), pp. 16211631.
    5. 5)
      • 5. ‘The NETL Modern Grid Strategy Powering our 21st-Century Economy: Advanced Metering Infrastructure’, February 2008. Available at https://www.smartgrid.gov/files/NISTSGInteropReportPostcommentperiodversion200808.pdf.
    6. 6)
      • 6. Wright, J.: ‘Smart meters have security holes’, 2010.
    7. 7)
      • 7. Ward, M.: ‘Smart meters can be hacked to cut power bills’, October 2014. Available at http://www.bbc.com/news/technology-29643276.
    8. 8)
      • 8. McDaniel, P., McLaughlin, S.: ‘Security and privacy challenges in the smart grid’, IEEE Secur. Privacy, 2009, 7, (3), pp. 7577.
    9. 9)
      • 9. Katakey, R.: ‘India fights to keep the lights on’, June 2014. Available at http://www.bloomberg.com/news/articles/2014-06-05/india-fights-electricity-theft-as-modi-pledges-energy-upgrade.
    10. 10)
      • 10. ‘Reducing technical and non-technical losses in the power sector. Washington, DC: World bank group’. Available at http://documents.worldbank.org/curated/en/829751468326689826/Reducing-technical-and-non-technical-losses-in-the-power-sector.
    11. 11)
      • 11. Lo, C.-H., Ansari, N.: ‘Consumer: a novel hybrid intrusion detection system for distribution networks in smart grid’, IEEE Trans. Emerg. Top. Comput., 2013, 1, (1), pp. 3344.
    12. 12)
      • 12. McLaughlin, S., Holbert, B., Fawaz, A., et al: ‘A multi-sensor energy theft detection framework for advanced metering infrastructures’, IEEE J. Sel. Areas Commun., 2013, 31, (7), pp. 13191330.
    13. 13)
      • 13. Xiao, Z., Xiao, Y., Du, D.H.c.: ‘Non-repudiation in neighborhood area networks for smart grid’, IEEE Commun. Mag., 2013, 51, (1), pp. 1826.
    14. 14)
      • 14. Khoo, B., Cheng, Y.: ‘Using RFID for anti-theft in a Chinese electrical supply company: a cost-benefit analysis’. Wireless Telecommunications Symp. (WTS), April 2011, pp. 16.
    15. 15)
      • 15. Amin, S., Schwartz, G.A., Tembine, H.: ‘Incentives and security in electricity distribution networks’. Int. Conf. on Decision and Game Theory for Security, GameSec, 2012, pp. 264280.
    16. 16)
      • 16. Crdenas, A.A., Amin, S., Schwartz, G., et al: ‘A game theory model for electricity theft detection and privacy-aware control in AMI systems’. 50th Annual Allerton Conf. on Communication, Control, and Computing (Allerton), 2012, October 2012, pp. 18301837.
    17. 17)
      • 17. Angelos, E.W.S., Saavedra, O.R., Corts, O.A.C., et al: ‘Detection and identification of abnormalities in customer consumptions in power distribution systems’, IEEE Trans. Power Deliv., 2011, 26, (4), pp. 24362442.
    18. 18)
      • 18. Salinas, S., Li, M., Li, P.: ‘Privacy-preserving energy theft detection in smart grids: a p2p computing approach’, IEEE J. Sel. Areas Commun., 2013, 31, (9), pp. 257267.
    19. 19)
      • 19. Depuru, S.S.S.R., Wang, L., Devabhaktuni, V., et al: ‘A hybrid neural network model and encoding technique for enhanced classification of energy consumption data’. IEEE Power and Energy Society General Meeting, July 2011, pp. 18.
    20. 20)
      • 20. Depuru, S.S.S.R., Wang, L., Devabhaktuni, V.: ‘Support vector machine based data classification for detection of electricity theft’. Power Systems Conf. and Exposition (PSCE), 2011, March 2011, pp. 18.
    21. 21)
      • 21. Jokar, P., Arianpoo, N., Leung, V.C.M.: ‘Electricity theft detection in AMI using customers consumption patterns’, IEEE Trans. Smart Grid, 2016, 7, (1), pp. 216226.
    22. 22)
      • 22. Jiang, R., Lu, R., Wang, Y., et al: ‘Energy theft detection issues for advanced metering infrastructure in smart grid’, Tsinghua Sci. Technol., 2014, 19, (2), pp. 105120.
    23. 23)
      • 23. Mashima, D., Cárdenas, A.A.: ‘Evaluating electricity theft detectors in smart grid networks’ (Springer Berlin Heidelberg, Berlin, 2012), pp. 210229.
    24. 24)
      • 24. Cover, T.M., Thomas, J.A.: ‘Elements of information theory’ (Wiley-Interscience, 2006).
    25. 25)
      • 25. ‘Irish Social Science Data Archive’. Available at http://www.ucd.ie/issda/data/commissionforenergyregulationcer/.
    26. 26)
      • 26. Chaojun, G., Jirutitijaroen, P., Motani, M.: ‘Detecting false data injection attacks in ac state estimation’, IEEE Trans. Smart Grid, 2015, 6, (5), pp. 24762483.
    27. 27)
      • 27. Krishna, V.B., Weaver, G.A., Sanders, W.H., et al: ‘Pca-based method for detecting integrity attacks on advanced metering infrastructure’. Proc. of the 12th Int. Conf. on Quantitative Evaluation of Systems, New York, NY, USA, 2015, pp. 7085.
    28. 28)
      • 28. Fawcett, T.: ‘Roc graphs: notes and practical considerations for researchers’. Technical Report, 2004.
    29. 29)
      • 29. Zweig, M.H., Campbell, G.: ‘Receiver-operating characteristic (roc) plots: a fundamental evaluation tool in clinical medicine’, Clin. Chem., 1993, 39, (4), pp. 561577.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0063
Loading

Related content

content/journals/10.1049/iet-cps.2017.0063
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address