2017
DOI: 10.1093/comjnl/bxx070
|View full text |Cite
|
Sign up to set email alerts
|

Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid

Abstract: As the smart meters are vulnerable to physical attacks as well as cyber attacks, electricity theft in smart grids is much easier to commit and more difficult to detect than that in traditional power grids. In this paper, to facilitate the inspection of the malicious meters, a full and complete binary inspection tree whose leaves stand for smart meters is employed as a logical structure. We can logically configure an inspector (a meter for detection) at any node on the tree. By calculating the difference betwee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 56 publications
0
5
0
Order By: Relevance
“…In Fig. 10, we compare the SAI algorithm with the ATI algorithm [16] as well as the DCI algorithm [17] in static cases. 5 We assume that there are a total number of 250 users Fig.…”
Section: Experiments Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…In Fig. 10, we compare the SAI algorithm with the ATI algorithm [16] as well as the DCI algorithm [17] in static cases. 5 We assume that there are a total number of 250 users Fig.…”
Section: Experiments Resultsmentioning
confidence: 99%
“…However, the BCGI algorithm can only deal with the case where there is one malicious user. In papers [15]- [17], an "inspector box" is installed at the distribution room in each neighborhood area network (NAN). Malicious users are identified by comparing the inspectors' own readings with the users' reported readings.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations