2017
DOI: 10.1155/2017/8782131
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in Smart Metering Infrastructure with the Use of Time Series Analysis

Abstract: The article presents solutions to anomaly detection in network traffic for critical smart metering infrastructure, realized with the use of radio sensory network. The structure of the examined smart meter network and the key security aspects which have influence on the correct performance of an advanced metering infrastructure (possibility of passive and active cyberattacks) are described. An effective and quick anomaly detection method is proposed. At its initial stage, Cook's distance was used for detection … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 41 publications
(50 reference statements)
0
10
0
Order By: Relevance
“…How to use data analytics method to model the outages and reliability indices from weather data was discussed in [132]. Apart from the data analytics method for outage management, more works on smart meter data-based outage managements have been adopted to the corresponding communication architectures [175] [176].…”
Section: B Outage Managementmentioning
confidence: 99%
“…How to use data analytics method to model the outages and reliability indices from weather data was discussed in [132]. Apart from the data analytics method for outage management, more works on smart meter data-based outage managements have been adopted to the corresponding communication architectures [175] [176].…”
Section: B Outage Managementmentioning
confidence: 99%
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18])…”
Section: Sms Resultsmentioning
confidence: 99%
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18]) C10. SG failures fault status detection [41], [46], [61], [62], [126], [127], [142], [176], fault type classification [197], power distribution reliability [149], [195] As it can be seen, there is large variability in the aspects covered by the research.…”
Section: B Rq2mentioning
confidence: 99%
See 1 more Smart Citation
“…Interference in the communication channel is one of the main challenges [45]. Personal area networks are most probably installed in suburban area, HAN is used for a home automation application, it should have enhanced network security to make sure that essential and correct real time information is communicate to the smart meter [46]. HAN/LAN/FAN is directly connected to Smart meters, sensors, PMUs, due to same frequency band of different technologies interference occur between networks and causes unreal and unreliable transmission of signals from smart meters, to eliminate this problem, research on developing algorithms to decrease interference is one of the challenges [47].…”
Section: Interferencementioning
confidence: 99%