2019
DOI: 10.1109/jiot.2019.2899492
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Cyber-Physical Security in Internet of Things Through Energy Auditing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 91 publications
(47 citation statements)
references
References 22 publications
0
47
0
Order By: Relevance
“…Both cyber and physical attacks are in high demand in smart agriculture. Li et al [121] proposed an auditing and analyticsbased IoT monitoring mechanism. The proposed mechanism uses disaggregation-aggregation architecture using the evaluation of the power usage of the system's sub-components.…”
Section: E Physical Countermeasuresmentioning
confidence: 99%
“…Both cyber and physical attacks are in high demand in smart agriculture. Li et al [121] proposed an auditing and analyticsbased IoT monitoring mechanism. The proposed mechanism uses disaggregation-aggregation architecture using the evaluation of the power usage of the system's sub-components.…”
Section: E Physical Countermeasuresmentioning
confidence: 99%
“…In the normal distribution power grids, the voltages and currents should be stable. If abnormal changes happen to ∆V n and ∆I np , an event can be detected based on certain thresholding methods [23], [24]. Here, instead of directly using the difference, we treat it as one dimension of the high-dimensional detection metrics matrix.…”
Section: B Feature Extractionmentioning
confidence: 99%
“…As data-driven methods do not require explicit physical models, they can cope with complex, complicated, and heterogeneous phenomena. There are many data-driven methods for the security issues, such as the geometrically designed residual filter [46], signal analytics based [152], generalized likelihood ratio [153], the cumulative sum (CUSUM) [154], leverage score [155], influential point selection [156], support vector machine (SVM) [121], Gaussian mixture model (GMM) [122], neural networks [123], machine learning [121], deep learning [157], and so on.…”
Section: Data-driven Cyber-attack Detection and Mitigationmentioning
confidence: 99%