2016
DOI: 10.1016/j.rser.2016.03.047
|View full text |Cite
|
Sign up to set email alerts
|

Smart home energy management systems: Concept, configurations, and scheduling strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
260
0
4

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 611 publications
(264 citation statements)
references
References 81 publications
0
260
0
4
Order By: Relevance
“…Threats in this type of scenario could incorporate an impersonation by an attacker to the client, a message modification attack, a replay attack, and much more. For instance, an attacker imitating the customer's cloud [23] that sends a message to HAN/ESI and requests it to turn on all of the home appliances for increasing the electricity bill or causes it to switch off the lights in a smart home, allowing the attacker to threaten the safety of those inside the house [24]. Also, message modification and a replay attack could have a significant impact on the smart home.…”
Section: Attack Against Home Monitoring and Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…Threats in this type of scenario could incorporate an impersonation by an attacker to the client, a message modification attack, a replay attack, and much more. For instance, an attacker imitating the customer's cloud [23] that sends a message to HAN/ESI and requests it to turn on all of the home appliances for increasing the electricity bill or causes it to switch off the lights in a smart home, allowing the attacker to threaten the safety of those inside the house [24]. Also, message modification and a replay attack could have a significant impact on the smart home.…”
Section: Attack Against Home Monitoring and Controlmentioning
confidence: 99%
“…The MCA approach employs Triangle Area Map generation (TAM) [24]. The approach extracts the correlated data between features in an observed data object, such as network traffic records.…”
Section: Mca Detection Analysismentioning
confidence: 99%
“…This point is discussed widely in the existing literature, and appliances are categorized in numerous manners [36,53,54]. Considering this work, appliances are categorized as Occupancy Independent (OI) and Occupancy Dependent (OD) appliances.…”
Section: Deviation Functionmentioning
confidence: 99%
“…These trends push even further, reaching the building and home level, and leading to the development of concepts such as Home Energy Management Systems (HEMS) [1]. In the smartgrid context, the flexibility features of renewables, storage technologies, demand response (DR) and interaction with the grid [2], can be exploited by different market agents to minimize operation costs.…”
Section: Introductionmentioning
confidence: 99%