skip to main content
10.1145/2744769.2747930acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Impact assessment of net metering on smart home cyberattack detection

Authors Info & Claims
Published:07 June 2015Publication History

ABSTRACT

Despite the increasing popularity of the smart home concept, such a technology is vulnerable to various security threats such as pricing cyberattacks. There are some technical advances in developing detection and defense frameworks against those pricing cyberattacks. However, none of them considers the impact of net metering, which allows the customers to sell the excessively generated renewable energy back to the grid. At a superficial glance, net metering seems to be irrelevant to the cybersecurity, while this paper demonstrates that its implication is actually profound.

In this paper, we propose to analyze the impact of the net metering technology on the smart home pricing cyberattack detection. Net metering changes the grid energy demand, which is considered by the utility when designing the guideline price. Thus, cyberattack detection is compromised if this impact is not considered. It motivates us to develop a new smart home pricing cyberattack detection framework which judiciously integrates the net metering technology with the short/long term detection. The simulation results demonstrate that our new framework can significantly improve the detection accuracy from 65.95% to 95.14% compared to the state-of-art detection technique.

References

  1. {Online}. Available: http://www.solarcity.com/learn/understanding-netmetering.aspxGoogle ScholarGoogle Scholar
  2. Distributed generation and renewable energy current programs for businesses. {Online}. Available: http://docs.cpuc.ca.gov/published/newsrelease/7408.htmGoogle ScholarGoogle Scholar
  3. Z. I. Botev, D. P. Kroese, R. Y. Rubinstein, et al. The cross entropy method for optimization. Machine Learning: Theory and Applications, V. Govindaraju and C. R. Rao, Eds, Chennai: Elsevier BV, 31:35--59, 2013.Google ScholarGoogle Scholar
  4. L. P. Kaelbling, M. L. Littman, and A. Cassandra. Planning and acting in partially observable stochastic domains. Artificial Intelligence, pages 99--134, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Li, S. Gangadhar, S. Cheng, and P. Verma. Maximize user rewards in distributed generation environments using reinforcement learning. In Proceedings of IEEE Energytech, pages 1--6, 2011.Google ScholarGoogle Scholar
  6. L. Liu, Y. Zhou, Y. Liu, and S. Hu. Dynamic programming based game theoretic algorithm for economical multi-user smart home scheduling. In Proceedings of IEEE Midwest Symposium on Circuits and Systems, pages 362--365, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  7. Y. Liu, S. Hu, and T.-Y. Ho. Leveraging strategic defense techniques for smart home pricing cyberattacks. Accepted to IEEE Transactions on Dependable and Secure Computing.Google ScholarGoogle Scholar
  8. Y. Liu, S. Hu, and T.-Y. Ho. Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. In Proceedings of IEEE/ACM International Conference on Computer-Aided Design, pages 183--190, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Mohsenian-Rad, V. Wong, J. Jatskevich, R. Schober, and A. Leon-Garcia. Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid. IEEE Transactions on Smart Grid, 1(3):320--331, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  10. K. Tuomas, F. Rossi, and A. Lendasse. Ls-svm functional network for time series prediction. In Proceedings of European Symposium on Artificial Neural Networks, 2006.Google ScholarGoogle Scholar

Index Terms

  1. Impact assessment of net metering on smart home cyberattack detection

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                DAC '15: Proceedings of the 52nd Annual Design Automation Conference
                June 2015
                1204 pages
                ISBN:9781450335201
                DOI:10.1145/2744769

                Copyright © 2015 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 7 June 2015

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate1,770of5,499submissions,32%

                Upcoming Conference

                DAC '24
                61st ACM/IEEE Design Automation Conference
                June 23 - 27, 2024
                San Francisco , CA , USA

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader