Author:
Ravinder M.,Kulkarni Vikram
Abstract
The intrusion detection in network traffic for crucial smart metering applications based on radio sensor networks is becoming very important in the Smart Grid area. The network’s structure for smart meters under investigation should consider important security factors. The potential of both passive and active cyber-attacks affecting the functioning of advanced metering infrastructure is studied and a novel method is proposed in this article. The proposed method for anomaly identification is efficient and rapid. In the beginning, Cook’s distance was employed to recognize and eliminate outlier observations. After observations are made three statistical models Brown’s, Holt’s, and winter’s models were used for exponential smoothing and were estimated using the provided data. Bollinger Bands with the appropriate parameters were employed to estimate potential changes in the forecasts produced by the models that were put into operation. The estimated traffic model’s statistical relationships with its actual variations were then investigated to spot any unusual behaviour that would point to a cyber-attack effort. Additionally, a method for updating common models in the event of substantial fluctuations in real network traffic was suggested. The findings confirmed the effectiveness of the proposed method and the precision of the selection of the appropriate statistical model for the under-study time series. The outcomes validated the effectiveness of the proposed approach and the precision in choosing a suitable statistical model for the time series under investigation.
Subject
Economics and Econometrics,Energy Engineering and Power Technology,Fuel Technology,Renewable Energy, Sustainability and the Environment
Reference26 articles.
1. Anomaly detection in smart metering infrastructure with the use of time series analysis;Andrysiak;J. Sensors,2017
2. Wireless AMI application and security for controlled home area networks;Aravinthan,2011
3. Computing electricity consumption profiles from household smart meter data;Ardakanian;CEUR Workshop Proc.,2014
4. On the practicality of detecting anomalies with encrypted traffic in AMI;Berthier,2015
5. Collecting smart meter data via public transportation buses;Bilgin;IET Intell. Transp. Syst.,2016
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献