Abstract

Advanced Metering Infrastructure (AMI) is a component of electrical networks that combines the energy and telecommunication infrastructure to collect, measure and analyze consumer energy consumptions. One of the main elements of AMI is a smart meter that used to manage electricity generation and distribution to end-user. The rapid implementation of AMI raises the need to deliver better maintenance performance and monitoring more efficiently while keeping consumers informed on their consumption habits. The convergence from analog to digital has made AMI tend to inherit the current vulnerabilities of digital devices that prone to cyber-attack, where attackers can manipulate the consumer energy consumption for their benefit. A huge amount of data generated in AMI allows attackers to manipulate the consumer energy consumption to their benefit once they manage to hack into the AMI environment. Anomalies detection is a technique can be used to identify any rare event such as data manipulation that happens in AMI based on the data collected from the smart meter. The purpose of this study is to review existing studies on anomalies techniques used to detect data manipulation in AMI and smart grid systems. Furthermore, several measurement methods and approaches used by existing studies will be addressed.

Highlights

  • In the energy sector, the utilization of electric meters was initially applied to industrial and commercial users because of the requirement to have more advanced data rates and progressively granular charging data demands [1]

  • There are 6 type of attacks presented in this study: (1) all the sample multiple by the random chosen coefficient, (2) on-off attack where the consumption is set to zero during interval, (3) it multiple the consumptions by the irregular factor that changes after some time, (4) reports a variable in time arbitrary division of every day means utilization, (5) day by day mean utilization is always reported, and (6) the aggregate total of power utilization is accurately presented

  • WORKS Various potential security issues related to advanced metering infrastructure (AMI) have been identified and an actual threat scenario has been implemented confirming the vulnerability of AMI environments

Read more

Summary

Introduction

The utilization of electric meters was initially applied to industrial and commercial users because of the requirement to have more advanced data rates and progressively granular charging data demands [1]. The usage bit by bit extended to all end-user classes to accommodate a large number of customers. Automated meter reading (AMR) has been used to collect meter data by utilizing one-way communication. In recent years, advanced metering infrastructure (AMI) has been intensively built along with the evolution from the conventional electrical grid to the increasing growth of the smart grid. AMI will collect, calculate and analyze the consumer power consumption data and transmit this information from a smart meter to a data collector center which forwarded to a head-end system on the utility part.

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call