2020
DOI: 10.1002/2050-7038.12411
|View full text |Cite
|
Sign up to set email alerts
|

Smart home energy management system under false data injection attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…False Data Injection (FDI) is the most frequent type of attack. Sethi, Mukherjee, Singh, Misra, and Mohanty (2020) proved that these attacks affect electricity bills and load consumption drastically, proposing afterwards a resilient scheduling algorithm to overcome these effects. Furthermore, Dayaratne, Rudolph, Liebman, Salehi, and He (2019) showed that small fluctuations in energy demand from FDI attacks significantly increased the unit price and provided financial benefits to the attacker.…”
Section: Securitymentioning
confidence: 99%
“…False Data Injection (FDI) is the most frequent type of attack. Sethi, Mukherjee, Singh, Misra, and Mohanty (2020) proved that these attacks affect electricity bills and load consumption drastically, proposing afterwards a resilient scheduling algorithm to overcome these effects. Furthermore, Dayaratne, Rudolph, Liebman, Salehi, and He (2019) showed that small fluctuations in energy demand from FDI attacks significantly increased the unit price and provided financial benefits to the attacker.…”
Section: Securitymentioning
confidence: 99%
“…34,35 In the realm of intelligent algorithms, a neural network is good at solving prediction problems that have an indescribable nonlinear relationship between the input and output. 36,37 Currently, many studies use neural network technology to perform prediction. Some studies have been based on forward neural networks (FNNs), but they cannot completely solve the problem because FNNs cannot deal with the correlation information between sequences.…”
Section: Algorithm Selectionmentioning
confidence: 99%
“…The authors concluded that the vulnerability of SHEMSs to pricing attacks will impede its adoption in smart homes. In similar line, Sethi et al Sethi et al (2020) proposed the injection of corrupted pricing data to disrupt scheduling and pricing operations. During this particular attack, the attacker, in perspective of a customer, plans to decrease the price of the electricity bill from being originally at $2.11 to $1.79 and the grid power import from 78.15kW to 76.99kW.…”
Section: Smart Energy Management Systemmentioning
confidence: 99%