On-line Detection of Malicious Activities Based on Edge Computing in Micro-grid System

With the continuous deployment of smart grids, various new smart technologies applied to the power grids have emerged, and the security boundaries of the power systems have gradually blurred, so that the power security protection measures urgently need to be updated. Aiming at the smart micro-grid system based on edge computing, this paper introduces a non-intrusive load monitoring (NILM) method, combined with the advantages of edge computing, and designs an online detection mechanism for malicious activities of terminal devices. This method is dedicated to achieving device-level security assurance.

[1]  Fadi Al-Turjman,et al.  Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure , 2020, IEEE Access.

[2]  Hong Wen,et al.  Internet of Things Based Smart Grids Supported by Intelligent Edge Computing , 2019, IEEE Access.

[3]  Hong Wen,et al.  A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing , 2019, IEEE Transactions on Cloud Computing.

[4]  Zhao Yang,et al.  Application of micro-grid control system in smart park , 2019 .

[5]  Yushan Li,et al.  Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.

[6]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[7]  Hong Wen,et al.  Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks , 2017, IEEE Communications Letters.

[8]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[9]  Bala Venkatesh,et al.  Smart metering and functionalities of smart meters in smart grid - a review , 2015, 2015 IEEE Electrical Power and Energy Conference (EPEC).

[10]  Anil Nerode,et al.  A Micro-Grid Distributed Intelligent Control and Management System , 2015, IEEE Transactions on Smart Grid.

[11]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[12]  Hong Wen,et al.  A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.

[13]  Hong Wen,et al.  Physical layer assist authentication technique for smart meter system , 2013, IET Commun..

[14]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[15]  E. Farjah,et al.  Novel embedded real-time NILM for electric loads disaggregating and diagnostic , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".

[16]  S. Drenker,et al.  Nonintrusive monitoring of electric loads , 1999 .