GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids
文献类型:期刊论文
作者 | Liang W(梁炜)1; Zheng M(郑萌)1; Xiao Y(肖杨)3; Xia XF(夏小芳)1,2,3; Lv XS(吕希胜)![]() ![]() ![]() ![]() ![]() |
刊名 | IEEE Transactions on Network Science and Engineering
![]() |
出版日期 | 2018 |
页码 | 1-12 |
关键词 | Electricity theft smart grid smart meters cyber attacks security |
ISSN号 | 2327-4697 |
产权排序 | 1 |
通讯作者 | Xiao Y(肖杨) ; Liang W(梁炜) |
中文摘要 | With many countries trying to establish their own smart grids, smart meters are massively deployed throughout the world. Although smart meters are manufactured with low tamper-resistant components, malicious users with just a moderate level of computer knowledge are able to launch cyber attacks. By manipulating electricity consumption readings to smaller values, malicious users can steal electricity from utility companies. To reduce the losses incurred by electricity theft, utility companies must provide preventative and detective methods to identify fraudulent behaviors. Our goal is to identify all malicious users in a neighborhood area network within the shortest detection time. To achieve this goal, we propose Group Testing based Heuristic Inspection (GTHI) algorithm, which can estimate the ratio of malicious users on-line, mainly by collecting the information that how many malicious users have been identified during the inspection process. Based upon the ratio of malicious users, the GTHI algorithm adaptively adjusts inspection strategies between an individual inspection strategy and a group testing strategy. This helps shorten the detection time. Furthermore, when applying the group testing strategy, the GTHI algorithm also determines the group size of users to be probed in line with the estimated malicious user ratio. Experiment results show that compared to existing methods, the GTHI algorithm has advantages of conducting fewer inspection steps or being more practical. |
收录类别 | EI |
语种 | 英语 |
源URL | [http://ir.sia.cn/handle/173321/22207] ![]() |
专题 | 沈阳自动化研究所_数字工厂研究室 |
作者单位 | 1.The University of alabama, tuscaloosa, Tuscaloosa, Alabama United States 2.Computer Science, The University of alabama, Tuscaloosa, Alabama United States 3.EE, Shenyang Institute of Automation, 66327 Shenyang, Liaoning China |
推荐引用方式 GB/T 7714 | Liang W,Zheng M,Xiao Y,et al. GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids[J]. IEEE Transactions on Network Science and Engineering,2018:1-12. |
APA | Liang W.,Zheng M.,Xiao Y.,Xia XF.,吕希胜.,...&刘昶.(2018).GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids.IEEE Transactions on Network Science and Engineering,1-12. |
MLA | Liang W,et al."GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids".IEEE Transactions on Network Science and Engineering (2018):1-12. |
入库方式: OAI收割
来源:沈阳自动化研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。