Please use this identifier to cite or link to this item: https://doi.org/10.1145/2179298.2179382
DC FieldValue
dc.titleData integrity validation framework for distribution system operations
dc.contributor.authorGuo, Y.
dc.contributor.authorTen, C.-W.
dc.contributor.authorJirutitijaroen, P.
dc.date.accessioned2014-06-19T03:04:31Z
dc.date.available2014-06-19T03:04:31Z
dc.date.issued2011
dc.identifier.citationGuo, Y.,Ten, C.-W.,Jirutitijaroen, P. (2011). Data integrity validation framework for distribution system operations. ACM International Conference Proceeding Series. ScholarBank@NUS Repository. <a href="https://doi.org/10.1145/2179298.2179382" target="_blank">https://doi.org/10.1145/2179298.2179382</a>
dc.identifier.isbn9781450309455
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/69775
dc.description.abstractA recent large-scale deployment of IP-based metering infrastructure in a secondary distribution system provides additional points to collect energy consumption data from each household. These measurements for each household can replace the estimated load profiles for each distribution transformer. While encryption ensures the confidentiality of customers' data transmission between senders and receiver, it does not protect the integrity of system-wide data collection from the "smart" meters. This can be vulnerable to cyber-threats that require a countermeasure to protect the availability and integrity of measurements. Potential cyber-threats can be denial of service (DoS) or electronic tampering by manipulating the electronic metering values. A data validation framework to cross-reference real-time metering measurements between primary and secondary networks is proposed, which introduces credibility scores that are associated with electronic metering devices. By evaluating the measurement values from different sources and historical data, this framework demonstrates that the discrepancies between those redundant meters with designated trustworthy level can be determined. A simulation study to identify credible cyber-tampering events can be inferred using proposed validation algorithms. Copyright © 2011 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/2179298.2179382
dc.sourceScopus
dc.subjectAnomaly clustering
dc.subjectinformation integrity and validation
dc.subjectpower communication interdependencies
dc.typeConference Paper
dc.contributor.departmentELECTRICAL & COMPUTER ENGINEERING
dc.description.doi10.1145/2179298.2179382
dc.description.sourcetitleACM International Conference Proceeding Series
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Page view(s)

111
checked on Nov 23, 2020

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.