4.7 Article

Intrusion Detection for Cybersecurity of Smart Meters

期刊

IEEE TRANSACTIONS ON SMART GRID
卷 12, 期 1, 页码 612-622

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSG.2020.3010230

关键词

Smart meters; Cyberattack; Intrusion detection; Support vector machines; Meters; Detection algorithms; Random access memory; Advanced metering infrastructure (AMI); smart meters; cyber-physical system security; intrusion detection

资金

  1. Department of Energy [DE-OE0000780]
  2. National Science Foundation [ECCS-1824577, TSG-01577-2019]

向作者/读者索取更多资源

This paper presents a two-stage cyber intrusion protection system using Support Vector Machine and Temporal Failure Propagation Graph techniques to identify and prevent potential cyber attacks on smart meters. A proposed pattern recognition algorithm is used to calculate the similarity between detected abnormal events and pre-defined cyber attacks, with higher similarity values indicating a higher likelihood of a smart meter being under attack.
The integration of Information and Communications Technology (ICT) enables real-time communication for smart meters to participate in power system operations. However, Advanced Metering Infrastructures (AMI) are vulnerable to cyber attacks. Both utilities and power consumers may become victims of cyber intrusions. In this paper, a two-stage cyber intrusion protection system is proposed. At the first stage of intrusion detection, a Support Vector Machine (SVM) is used as a detection algorithm to discover suspicious behaviors inside a smart meter. At the second stage, the Temporal Failure Propagation Graph (TFPG) technique is used to generate attack routes for identifying attack events. Finally, the proposed pattern recognition algorithm is used to calculate the similarity between a detected abnormal event and pre-defined cyber attacks. A higher similarity value implies a higher chance that a smart meter is under attack. An AMI security test platform has been developed to: (1) Collect training/testing data for SVM, (2) Simulate and analyze cyber attack events, and (3) Validate the proposed cyber attack protection system. The test platform consists of Network-Simulator 3 (NS-3) software to simulate an AMI network environment and single board computers (SBCs) to emulate the IEEE 802.15.4 communication between a grid router and a smart meter.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据