메뉴 건너뛰기




Volumn 4, Issue 1, 2017, Pages 147-161

Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid

Author keywords

Data integrity attacks; Gaussian mixture model; Internet of Things (IoT); smart grid; Threat detection

Indexed keywords

ADVANCED METERING INFRASTRUCTURES; CHEMICAL DETECTION; CYBER PHYSICAL SYSTEM; ELECTRIC POWER SYSTEM CONTROL; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; GAUSSIAN DISTRIBUTION; INTERNET OF THINGS; NETWORK SECURITY;

EID: 85015246554     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2016.2631520     Document Type: Article
Times cited : (53)

References (48)
  • 2
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical systemsecurity for the electric power grid
    • Jan.
    • S. Sridhar, A. Hahn, M. Govindarasu, "Cyber-physical systemsecurity for the electric power grid, " Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 3
    • 85028151153 scopus 로고    scopus 로고
    • Data-streambasedintrusion detection system for advanced metering infrastructure insmart grid: A feasibility study
    • Mar.
    • M. A. Faisal, Z. Aung, J. R. Williams, A. Sanchez, "Data-streambasedintrusion detection system for advanced metering infrastructure insmart grid: A feasibility study, " IEEE Syst. J., vol. 9, no. 1, pp. 31-44, Mar. 2015.
    • (2015) IEEE Syst. J. , vol.9 , Issue.1 , pp. 31-44
    • Faisal, M.A.1    Aung, Z.2    Williams, J.R.3    Sanchez, A.4
  • 4
    • 84961720902 scopus 로고    scopus 로고
    • Towards multistep electricity prices insmart grid electricity markets
    • Jan.
    • J. Lin, W. Yu, X. Yang, "Towards multistep electricity prices insmart grid electricity markets, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 286-302, Jan. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.1 , pp. 286-302
    • Lin, J.1    Yu, W.2    Yang, X.3
  • 5
    • 84861506150 scopus 로고    scopus 로고
    • On false data injectionattacks against distributed energy routing in smart grid
    • Beijing, China
    • J. Lin, W. Yu, X. Yang, G. Xu, W. Zhao, "On false data injectionattacks against distributed energy routing in smart grid, " in Proc. IEEE/ACM Int. Conf. Cyber-Phys. Syst. (ICCPS), Beijing, China, 2012, pp. 183-192.
    • (2012) Proc. IEEE/ACM Int. Conf. Cyber-Phys. Syst. (ICCPS) , pp. 183-192
    • Lin, J.1    Yu, W.2    Yang, X.3    Xu, G.4    Zhao, W.5
  • 6
    • 84953726317 scopus 로고    scopus 로고
    • On false data injection attacksagainst the dynamic microgrid partition in the smart grid
    • London, U. K.
    • X. Zhang, X. Yang, J. Lin, W. Yu, "On false data injection attacksagainst the dynamic microgrid partition in the smart grid, " in Proc. IEEE Int. Conf. Commun. (ICC), London, U. K., 2015, pp. 7222-7227.
    • (2015) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 7222-7227
    • Zhang, X.1    Yang, X.2    Lin, J.3    Yu, W.4
  • 8
    • 82155185205 scopus 로고    scopus 로고
    • Distributed Internetbasedload altering attacks against smart power grids
    • Dec.
    • A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internetbasedload altering attacks against smart power grids, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 667-674
    • Mohsenian-Rad, A.-H.1    Leon-Garcia, A.2
  • 9
    • 84903274319 scopus 로고    scopus 로고
    • Local load redistribution attacks in power systemswith incomplete network information
    • Jul.
    • X. Liu and Z. Li, "Local load redistribution attacks in power systemswith incomplete network information, " IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 1665-1676, Jul. 2014.
    • (2014) IEEE Trans. Smart Grid , vol.5 , Issue.4 , pp. 1665-1676
    • Liu, X.1    Li, Z.2
  • 10
    • 84863349007 scopus 로고    scopus 로고
    • Manipulating the electricity power market via jammingthe price signaling in smart grid
    • Houston, TX, USA
    • H. Li and Z. Han, "Manipulating the electricity power market via jammingthe price signaling in smart grid, " in Proc. GLOBECOM Workshops(GC Workshops), Houston, TX, USA, 2011, pp. 1168-1172.
    • (2011) Proc. GLOBECOM Workshops(GC Workshops) , pp. 1168-1172
    • Li, H.1    Han, Z.2
  • 11
    • 84904440641 scopus 로고    scopus 로고
    • Greenbench: A benchmark for observing powergrid vulnerability under data-centric threats
    • Toronto, ON, Canada
    • M. Wei and W. Wang, "Greenbench: A benchmark for observing powergrid vulnerability under data-centric threats, " in Proc. IEEE INFOCOM, Toronto, ON, Canada, 2014, pp. 2625-2633.
    • (2014) Proc. IEEE INFOCOM , pp. 2625-2633
    • Wei, M.1    Wang, W.2
  • 13
    • 84960349614 scopus 로고    scopus 로고
    • Electricity theft detection inAMI using customers' consumption patterns
    • Jan.
    • P. Jokar, N. Arianpoo, V. C. M. Leung, "Electricity theft detection inAMI using customers' consumption patterns, " IEEE Trans. Smart Grid, vol. 7, no. 1, pp. 216-226, Jan. 2016.
    • (2016) IEEE Trans. Smart Grid , vol.7 , Issue.1 , pp. 216-226
    • Jokar, P.1    Arianpoo, N.2    Leung, V.C.M.3
  • 14
    • 84891362282 scopus 로고    scopus 로고
    • Intrusion detection inadvanced metering infrastructure based on consumption pattern
    • Budapest, Hungary
    • P. Jokar, N. Arianpoo, V. C. M. Leung, "Intrusion detection inadvanced metering infrastructure based on consumption pattern, " inProc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungary, 2013, pp. 4472-4476.
    • (2013) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 4472-4476
    • Jokar, P.1    Arianpoo, N.2    Leung, V.C.M.3
  • 15
    • 77950188492 scopus 로고    scopus 로고
    • Nontechnical loss detection for metered customers in power utilityusing support vector machines
    • Apr.
    • J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, M. Mohamad, "Nontechnical loss detection for metered customers in power utilityusing support vector machines, " IEEE Trans. Power Del., vol. 25, no. 2, pp. 1162-1171, Apr. 2010.
    • (2010) IEEE Trans. Power Del. , vol.25 , Issue.2 , pp. 1162-1171
    • Nagi, J.1    Yap, K.S.2    Tiong, S.K.3    Ahmed, S.K.4    Mohamad, M.5
  • 16
    • 84904431080 scopus 로고    scopus 로고
    • An efficient approach foroutlier detection with imperfect data labels
    • Jul.
    • B. Liu, Y. Xiao, P. S. Yu, Z. Hao, L. Cao, "An efficient approach foroutlier detection with imperfect data labels, " IEEE Trans. Knowl. DataEng., vol. 26, no. 7, pp. 1602-1616, Jul. 2014.
    • (2014) IEEE Trans. Knowl. DataEng. , vol.26 , Issue.7 , pp. 1602-1616
    • Liu, B.1    Xiao, Y.2    Yu, P.S.3    Hao, Z.4    Cao, L.5
  • 18
    • 79953193105 scopus 로고    scopus 로고
    • ImprovingSVM-based nontechnical loss detection in power utility using thefuzzy inference system
    • Apr.
    • J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, F. Nagi, "ImprovingSVM-based nontechnical loss detection in power utility using thefuzzy inference system, " IEEE Trans. Power Del., vol. 26, no. 2, pp. 1284-1285, Apr. 2011.
    • (2011) IEEE Trans. Power Del. , vol.26 , Issue.2 , pp. 1284-1285
    • Nagi, J.1    Yap, K.S.2    Tiong, S.K.3    Ahmed, S.K.4    Nagi, F.5
  • 19
    • 49249135950 scopus 로고    scopus 로고
    • Power utility nontechnical lossanalysis with extreme learning machine method
    • Aug.
    • A. H. Nizar, Z. Y. Dong, Y. Wang, "Power utility nontechnical lossanalysis with extreme learning machine method, " IEEE Trans. PowerSyst., vol. 23, no. 3, pp. 946-955, Aug. 2008.
    • (2008) IEEE Trans. PowerSyst. , vol.23 , Issue.3 , pp. 946-955
    • Nizar, A.H.1    Dong, Z.Y.2    Wang, Y.3
  • 20
    • 84855838632 scopus 로고    scopus 로고
    • On the use of pattern matching for rapid anomalydetection in smart grid infrastructures
    • Brussels, Belgium
    • Z. A. Baig, et al., "On the use of pattern matching for rapid anomalydetection in smart grid infrastructures, " in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Brussels, Belgium, 2011, pp. 214-219.
    • (2011) Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm) , pp. 214-219
    • Baig, Z.A.1
  • 21
    • 84924020940 scopus 로고    scopus 로고
    • Modeling theaffective content of music with a Gaussian mixture model
    • Jan./Mar.
    • J.-C. Wang, Y.-H. Yang, H.-M. Wang, S.-K. Jeng, "Modeling theaffective content of music with a Gaussian mixture model, " IEEE Trans. Affective Comput., vol. 6, no. 1, pp. 56-68, Jan./Mar. 2015.
    • (2015) IEEE Trans. Affective Comput. , vol.6 , Issue.1 , pp. 56-68
    • Wang, J.-C.1    Yang, Y.-H.2    Wang, H.-M.3    Jeng, S.-K.4
  • 22
    • 85015247377 scopus 로고    scopus 로고
    • A methodology for cyber crime identificationusing email corpus based on Gaussian mixture model
    • V. Sreenivasulu and R. S. Prasad, "A methodology for cyber crime identificationusing email corpus based on Gaussian mixture model, " Int. J. Comput. Appl., vol. 117, no. 13, pp. 29-32, 2015.
    • (2015) Int. J. Comput. Appl. , vol.117 , Issue.13 , pp. 29-32
    • Sreenivasulu, V.1    Prasad, R.S.2
  • 23
    • 84959249145 scopus 로고    scopus 로고
    • An improved Gaussian mixturemodel for damage propagation monitoring of an aircraft wing spar underchanging structural boundary conditions
    • L. Qiu, S. Yuan, H. Mei, F. Fang, "An improved Gaussian mixturemodel for damage propagation monitoring of an aircraft wing spar underchanging structural boundary conditions, " Sensors, vol. 16, no. 3, p. 291, 2016.
    • (2016) Sensors , vol.16 , Issue.3 , pp. 291
    • Qiu, L.1    Yuan, S.2    Mei, H.3    Fang, F.4
  • 24
    • 84958107039 scopus 로고    scopus 로고
    • A novel probabilistic optimal powerflow model with uncertain wind power generation described by customizedGaussian mixture model
    • Jan.
    • D. Ke, C. Y. Chung, Y. Sun, "A novel probabilistic optimal powerflow model with uncertain wind power generation described by customizedGaussian mixture model, " IEEE Trans. Sustain. Energy, vol. 7, no. 1, pp. 200-212, Jan. 2016.
    • (2016) IEEE Trans. Sustain. Energy , vol.7 , Issue.1 , pp. 200-212
    • Ke, D.1    Chung, C.Y.2    Sun, Y.3
  • 25
    • 84934324315 scopus 로고    scopus 로고
    • Missing-data classification withthe extended full-dimensional Gaussian mixture model: Applications toEMG-based motion recognition
    • Aug.
    • Q. Ding, J. Han, X. Zhao, Y. Chen, "Missing-data classification withthe extended full-dimensional Gaussian mixture model: Applications toEMG-based motion recognition, " IEEE Trans. Ind. Electron., vol. 62, no. 8, pp. 4994-5005, Aug. 2015.
    • (2015) IEEE Trans. Ind. Electron. , vol.62 , Issue.8 , pp. 4994-5005
    • Ding, Q.1    Han, J.2    Zhao, X.3    Chen, Y.4
  • 26
    • 84916898086 scopus 로고    scopus 로고
    • Compressive sensing by learning a Gaussian mixturemodel from measurements
    • Jan.
    • J. Yang, et al., "Compressive sensing by learning a Gaussian mixturemodel from measurements, " IEEE Trans. Image Process., vol. 24, no. 1, pp. 106-119, Jan. 2015.
    • (2015) IEEE Trans. Image Process. , vol.24 , Issue.1 , pp. 106-119
    • Yang, J.1
  • 27
    • 84923857090 scopus 로고    scopus 로고
    • Cooperativelocalization in WSNs using Gaussian mixture modeling: DistributedECM algorithms
    • Mar.
    • F. Yin, C. Fritsche, D. Jin, F. Gustafsson, A. M. Zoubir, "Cooperativelocalization in WSNs using Gaussian mixture modeling: DistributedECM algorithms, " IEEE Trans. Signal Process., vol. 63, no. 6, pp. 1448-1463, Mar. 2015.
    • (2015) IEEE Trans. Signal Process. , vol.63 , Issue.6 , pp. 1448-1463
    • Yin, F.1    Fritsche, C.2    Jin, D.3    Gustafsson, F.4    Zoubir, A.M.5
  • 28
    • 84946038022 scopus 로고    scopus 로고
    • Source counting inspeech mixtures by nonparametric Bayesian estimation of an infiniteGaussian mixture model
    • South Brisbane, QLD, Australia
    • O. Walter, L. Drude, R. Haeb-Umbach, "Source counting inspeech mixtures by nonparametric Bayesian estimation of an infiniteGaussian mixture model, " in Proc. IEEE Int. Conf. Acoust. SpeechSignal Process. (ICASSP), South Brisbane, QLD, Australia, 2015, pp. 459-463.
    • (2015) Proc. IEEE Int. Conf. Acoust. SpeechSignal Process. (ICASSP) , pp. 459-463
    • Walter, O.1    Drude, L.2    Haeb-Umbach, R.3
  • 29
    • 84938305349 scopus 로고    scopus 로고
    • Robust point sets matching by fusing featureand spatial information using nonuniform Gaussian mixturemodels
    • Nov.
    • W. Tao and K. Sun, "Robust point sets matching by fusing featureand spatial information using nonuniform Gaussian mixturemodels, " IEEE Trans. Image Process., vol. 24, no. 11, pp. 3754-3767, Nov. 2015.
    • (2015) IEEE Trans. Image Process. , vol.24 , Issue.11 , pp. 3754-3767
    • Tao, W.1    Sun, K.2
  • 30
    • 84937868791 scopus 로고    scopus 로고
    • Image restorationusing Gaussian mixture models with spatially constrained patch clustering
    • Nov.
    • M. Niknejad, H. Rabbani, M. Babaie-Zadeh, "Image restorationusing Gaussian mixture models with spatially constrained patch clustering, "IEEE Trans. Image Process., vol. 24, no. 11, pp. 3624-3636, Nov. 2015.
    • (2015) IEEE Trans. Image Process. , vol.24 , Issue.11 , pp. 3624-3636
    • Niknejad, M.1    Rabbani, H.2    Babaie-Zadeh, M.3
  • 31
  • 33
    • 84881599388 scopus 로고    scopus 로고
    • Deferrable load schedulingoptimization under power price information attacks in smart grid
    • Shanghai, China
    • Q. Dong, D. Niyato, P. Wang, Z. Han, "Deferrable load schedulingoptimization under power price information attacks in smart grid, " inProc. Wireless Commun. Netw. Conf. (WCNC), Shanghai, China, 2013, pp. 4683-4688.
    • (2013) Proc. Wireless Commun. Netw. Conf. (WCNC) , pp. 4683-4688
    • Dong, Q.1    Niyato, D.2    Wang, P.3    Han, Z.4
  • 34
    • 84155167232 scopus 로고    scopus 로고
    • Cyber-physical security of a smart grid infrastructure
    • Jan.
    • Y. Mo, et al., "Cyber-physical security of a smart grid infrastructure, "Proc. IEEE, vol. 100, no. 1, pp. 195-209, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 195-209
    • Mo, Y.1
  • 36
    • 84936872495 scopus 로고    scopus 로고
    • Vulnerability assessment and defense technologyfor smart home cybersecurity considering pricing cyberattacks
    • San Jose, CA, USA
    • Y. Liu, S. Hu, T.-Y. Ho, "Vulnerability assessment and defense technologyfor smart home cybersecurity considering pricing cyberattacks, "in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design, San Jose, CA, USA, 2014, pp. 183-190.
    • (2014) Proc. IEEE/ACM Int. Conf. Comput.-Aided Design , pp. 183-190
    • Liu, Y.1    Hu, S.2    Ho, T.-Y.3
  • 38
    • 84904156635 scopus 로고    scopus 로고
    • Non-negative factor analysis of Gaussian mixturemodel weight adaptation for language and dialect recognition
    • Jul.
    • M. H. Bahari, et al., "Non-negative factor analysis of Gaussian mixturemodel weight adaptation for language and dialect recognition, "IEEE/ACM Trans. Audio, Speech, Language Process., vol. 22, no. 7, pp. 1117-1129, Jul. 2014.
    • (2014) IEEE/ACM Trans. Audio, Speech, Language Process , vol.22 , Issue.7 , pp. 1117-1129
    • Bahari, M.H.1
  • 39
    • 84897937578 scopus 로고    scopus 로고
    • Cross-lingual subspace Gaussianmixture models for low-resource speech recognition
    • Jan.
    • L. Lu, A. Ghoshal, S. Renals, "Cross-lingual subspace Gaussianmixture models for low-resource speech recognition, " IEEE/ACMTrans. Audio, Speech, Language Process., vol. 22, no. 1, pp. 17-27, Jan. 2014.
    • (2014) IEEE/ACMTrans. Audio, Speech, Language Process. , vol.22 , Issue.1 , pp. 17-27
    • Lu, L.1    Ghoshal, A.2    Renals, S.3
  • 42
    • 84962562081 scopus 로고    scopus 로고
    • An analysis of RFID authentication schemesfor Internet of Things in healthcare environment using elliptic curvecryptography
    • Feb.
    • D. He and S. Zeadally, "An analysis of RFID authentication schemesfor Internet of Things in healthcare environment using elliptic curvecryptography, " IEEE Internet Things J., vol. 2, no. 1, pp. 72-83, Feb. 2015.
    • (2015) IEEE Internet Things J. , vol.2 , Issue.1 , pp. 72-83
    • He, D.1    Zeadally, S.2
  • 43
    • 84871989307 scopus 로고    scopus 로고
    • A novel architecture against false datainjection attacks in smart grid
    • Ottawa, ON, Canada
    • S. Bhattarai, L. Ge, W. Yu, "A novel architecture against false datainjection attacks in smart grid, " in Proc. IEEE Int. Conf. Commun. (ICC), Ottawa, ON, Canada, 2012, pp. 907-911.
    • (2012) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 907-911
    • Bhattarai, S.1    Ge, L.2    Yu, W.3
  • 44
    • 84893618889 scopus 로고    scopus 로고
    • Detecting false data injection in smart grid innetworkaggregation
    • Vancouver, BC, Canada
    • L. Yang and F. Li, "Detecting false data injection in smart grid innetworkaggregation, " in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Vancouver, BC, Canada, 2013, pp. 408-413.
    • (2013) Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm) , pp. 408-413
    • Yang, L.1    Li, F.2
  • 45
    • 84908307120 scopus 로고    scopus 로고
    • EPPP4SMS: Efficient privacy-preservingprotocol for smart metering systems and its simulation using realworlddata
    • Nov.
    • F. Borges and M. Mühlhaüser, "EPPP4SMS: Efficient privacy-preservingprotocol for smart metering systems and its simulation using realworlddata, " IEEE Trans. Smart Grid, vol. 5, no. 6, pp. 2701-2708, Nov. 2014.
    • (2014) IEEE Trans. Smart Grid , vol.5 , Issue.6 , pp. 2701-2708
    • Borges, F.1    Mühlhaüser, M.2
  • 46
    • 84928721888 scopus 로고    scopus 로고
    • Enhancednetwork coding to maintain privacy in smart grid communication
    • Dec.
    • H. Nicanfar, P. Talebifard, A. Alasaad, V. C. M. Leung, "Enhancednetwork coding to maintain privacy in smart grid communication, " IEEETrans. Emerg. Topics Comput., vol. 1, no. 2, pp. 286-296, Dec. 2013.
    • (2013) IEEETrans. Emerg. Topics Comput. , vol.1 , Issue.2 , pp. 286-296
    • Nicanfar, H.1    Talebifard, P.2    Alasaad, A.3    Leung, V.C.M.4
  • 48
    • 84963763666 scopus 로고    scopus 로고
    • BLITHE: Behavior rule-basedinsider threat detection for smart grid
    • Apr.
    • H. Bao, R. Lu, B. Li, R. Deng, "BLITHE: Behavior rule-basedinsider threat detection for smart grid, " IEEE Internet Things J., vol. 3, no. 2, pp. 190-205, Apr. 2016.
    • (2016) IEEE Internet Things J. , vol.3 , Issue.2 , pp. 190-205
    • Bao, H.1    Lu, R.2    Li, B.3    Deng, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.