Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid

被引:6
作者
Zhang, Guoming [1 ]
Ji, Xiaoyu [1 ]
Li, Yanjie [1 ]
Xu, Wenyuan [1 ]
机构
[1] Zhejiang Univ, Sch Elect Engn, Hangzhou 310027, Peoples R China
关键词
power sensor; smart grid; condition monitoring; machine learning; EXECUTION; DESIGN;
D O I
10.3390/s20133635
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As a critical component in the smart grid, the Distribution Terminal Unit (DTU) dynamically adjusts the running status of the entire smart grid based on the collected electrical parameters to ensure the safe and stable operation of the smart grid. However, as a real-time embedded device, DTU has not only resource constraints but also specific requirements on real-time performance, thus, the traditional anomaly detection method cannot be deployed. To detect the tamper of the program running on DTU, we proposed a power-based non-intrusive condition monitoring method that collects and analyzes the power consumption of DTU using power sensors and machine learning (ML) techniques, the feasibility of this approach is that the power consumption is closely related to the executing code in CPUs, that is when the execution code is tampered with, the power consumption changes accordingly. To validate this idea, we set up a testbed based on DTU and simulated four types of imperceptible attacks that change the code running in ARM and DSP processors, respectively. We generate representative features and select lightweight ML algorithms to detect these attacks. We finally implemented the detection system on the windows and ubuntu platform and validated its effectiveness. The results show that the detection accuracy is up to 99.98% in a non-intrusive and lightweight way.
引用
收藏
页码:1 / 17
页数:19
相关论文
共 36 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Abri F, 2019, IEEE INT CONF BIG DA, P3252, DOI 10.1109/BigData47090.2019.9006514
[3]  
Aidong Xu, 2019, 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2), P2659, DOI 10.1109/EI247390.2019.9062014
[4]  
[Anonymous], 2016, SAE, DOI DOI 10.13274/J.CNKI.HDZJ.2016.08.001
[5]  
[Anonymous], 2013, P 2013 USENIX WORKSH
[6]  
Brusco G., 2016, 2016 IEEE 16 INT C E
[7]  
Caciotta M., 2011, P ICREPQ, P362, DOI [10.24084/repqj09.362, DOI 10.24084/REPQJ09.362]
[8]  
Conti J, 2016, ASHG POP FOLK MUSIC, P37
[9]  
Feng C., 2019, P 26 ANN NETW DISTR
[10]   pyAudioAnalysis: An Open-Source Python']Python Library for Audio Signal Analysis [J].
Giannakopoulos, Theodoros .
PLOS ONE, 2015, 10 (12)