2016
DOI: 10.1109/tsg.2015.2425222
|View full text |Cite
|
Sign up to set email alerts
|

Electricity Theft Detection in AMI Using Customers’ Consumption Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
362
0
5

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 557 publications
(367 citation statements)
references
References 23 publications
0
362
0
5
Order By: Relevance
“…The following studies [1,6,20,24] present an overview about sources of NTLs. Also, with the emergence of the SG concept 190 and the emerging global roll-out of meters with advanced communications capabilities, SMs studies are identifying an interest with lines of research on to new potential points of attack/vulnerability [19,25,26]. Cyber and data attacks are identified need to be taken into account in solutions for the detection and mitigation of NTLs.…”
Section: Non-technical Lossesmentioning
confidence: 99%
See 2 more Smart Citations
“…The following studies [1,6,20,24] present an overview about sources of NTLs. Also, with the emergence of the SG concept 190 and the emerging global roll-out of meters with advanced communications capabilities, SMs studies are identifying an interest with lines of research on to new potential points of attack/vulnerability [19,25,26]. Cyber and data attacks are identified need to be taken into account in solutions for the detection and mitigation of NTLs.…”
Section: Non-technical Lossesmentioning
confidence: 99%
“…Cyber and data attacks are identified need to be taken into account in solutions for the detection and mitigation of NTLs. A focus on possible attack vectors on metering equipment with advanced communication capabilities [19,[25][26][27]] is a line of recent research that have to be carried out in order to face the menace of NTLs in the context of SGs. Sources of NTLs and attack/vulnerability points are pictured in Figure 1.…”
Section: Non-technical Lossesmentioning
confidence: 99%
See 1 more Smart Citation
“…A cyber security issue for smart meters is energy theft, e.g., an attacker modifies the values of energy consumption readings. Several detection systems have been developed against energy theft [51][52][53][54]. Through monitoring load profiles, detection systems are able to recognize anomalies, such as the drastic change of power usage at a specific time instant and unusual power usage patterns.…”
Section: Detection Systems Of Ami Networkmentioning
confidence: 99%
“…An important part of the tariff design process is the identification of meaningful customer classes that exhibit different consumption patterns, enabling the development of diversifiable products. Moreover, electrical customer classification can also play a crucial role in load forecasting [1][2] and modeling [3], electricity market development [4], energy system planning and operation [5] and theft detection [6]. Naturally, information on customer type (e.g.…”
mentioning
confidence: 99%