File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TSG.2015.2453342
- Scopus: eid_2-s2.0-84939146888
- WOS: WOS:000374971000014
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation
Title | Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation |
---|---|
Authors | |
Keywords | Advanced metering infrastructure (AMI) anomaly detection malware propagation preventive maintenance |
Issue Date | 2016 |
Citation | IEEE Transactions on Smart Grid, 2016, v. 7, n. 3, p. 1314-1328 How to Cite? |
Abstract | Advanced metering infrastructure (AMI) deployment has been widely promoted in recent years to improve the accuracy of billing information as well as to facilitate implementation of demand response. Information integrity and availability of the devices is crucial to the billing information that should reflect accurately on how much the household energy is consumed. The IP-based smart metering devices may exist with unknown vulnerabilities that can introduce backdoors to enable worm propagation across AMI network. The infected devices can be attack agents that would largely disable the metering functionalities or manipulate control variables of each meter. This paper proposes an optimal frequency of on-site investigation and the number of monitoring verification to investigate potential anomalies of malware footprinting by applying the decision process framework of Markovian. The proposed method determines the best inspection strategies based on the observation from the existing anomaly detectors deployed in the network. The considerations include malware propagation characteristics, accuracy of anomaly detectors, and investigation and diagnosis costs. Four scenarios are simulated using the proposed method, demonstrating the effectiveness of investigation on potentially infected electronic meters within an AMI network. |
Persistent Identifier | http://hdl.handle.net/10722/336142 |
ISSN | 2023 Impact Factor: 8.6 2023 SCImago Journal Rankings: 4.863 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Guo, Yonghe | - |
dc.contributor.author | Ten, Chee Wooi | - |
dc.contributor.author | Hu, Shiyan | - |
dc.contributor.author | Weaver, Wayne W. | - |
dc.date.accessioned | 2024-01-15T08:23:51Z | - |
dc.date.available | 2024-01-15T08:23:51Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | IEEE Transactions on Smart Grid, 2016, v. 7, n. 3, p. 1314-1328 | - |
dc.identifier.issn | 1949-3053 | - |
dc.identifier.uri | http://hdl.handle.net/10722/336142 | - |
dc.description.abstract | Advanced metering infrastructure (AMI) deployment has been widely promoted in recent years to improve the accuracy of billing information as well as to facilitate implementation of demand response. Information integrity and availability of the devices is crucial to the billing information that should reflect accurately on how much the household energy is consumed. The IP-based smart metering devices may exist with unknown vulnerabilities that can introduce backdoors to enable worm propagation across AMI network. The infected devices can be attack agents that would largely disable the metering functionalities or manipulate control variables of each meter. This paper proposes an optimal frequency of on-site investigation and the number of monitoring verification to investigate potential anomalies of malware footprinting by applying the decision process framework of Markovian. The proposed method determines the best inspection strategies based on the observation from the existing anomaly detectors deployed in the network. The considerations include malware propagation characteristics, accuracy of anomaly detectors, and investigation and diagnosis costs. Four scenarios are simulated using the proposed method, demonstrating the effectiveness of investigation on potentially infected electronic meters within an AMI network. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Smart Grid | - |
dc.subject | Advanced metering infrastructure (AMI) | - |
dc.subject | anomaly detection | - |
dc.subject | malware propagation | - |
dc.subject | preventive maintenance | - |
dc.title | Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TSG.2015.2453342 | - |
dc.identifier.scopus | eid_2-s2.0-84939146888 | - |
dc.identifier.volume | 7 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | 1314 | - |
dc.identifier.epage | 1328 | - |
dc.identifier.isi | WOS:000374971000014 | - |