SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Secure and Reliable Power Consumption
Monitoring in Untrustworthy Micro-grids
Pacome Ambassa1
, Anne Kayem 1
, Stephen Wolthusen 2
Christoph Meinel 3
1
Department of Computer Science 2
NISlab 3
Hasso Plattner Institute
University of Cape Town Department of Computer Science University of Potsdam
South Africa Gjøvik University College, Norway Germany
pambassa, akayem@cs.uct.ac.za stephen.wolthusen@hig.no meinel@hpi.de
International Conference on Future Network Systems and Security (FNSS 2015)
June 13, 2015 Paris, France
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 1 / 17
Outline
1 Introduction
2 Related Work
3 System Description
4 Asynchronous Collection of Household Power Consumption
Data
5 Noise Characterization in Power Consumption Data
6 Conclusion
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 2 / 17
Introduction
Introduction: Context
Low income communities in developing countries:
Computational limitations
Intermittent network connectivity
Unstable power connectivity
Do not have reliable access to electricity
Not connected to national power networks
Access negatively influenced by load shedding
Governments, private developers and NGOs could setup a
Micro-grids for power sharing.
Challenge: Generation does not satisfy demand
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 3 / 17
Introduction
Introduction: Motivation
Design effective and efficient micro-grids architecture...
Re-modeled the power network to incorporate
Incorporate portable and cheap information and communication
technology
Mobile computing devices – popular in developing countries
Sensors
Wireless communication technology.
Reliability and trust properties: critical for grid stability
Reliability: Fair access to the network amongst the Stakeholder,
Trust
Limited computational system enable power network monitoring
Determine power consumption
Ensure reliable operation of the network
state estimations : precondition for grid stability
Integrity of data guide the power distribution
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 4 / 17
Related Work
Related Work
Power network monitoring
Conventional power network monitoring solutions are based on
utilizing smart meters and trustworthy calibrated sensor installed
into home networks for consumption monitoring.
They either don’t make any assumption on the aggregation
process or assume a synchronized system
Monitoring and state estimation in distributed system
Centered on snapshot algorithms
Snapshot algorithm for fully connected network, reliable
communication channel and FIFO message ordering.
Most are not suitable for network with limitation on computation
because of high communication overhead
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 5 / 17
System Description
Micro-Grid network
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 6 / 17
Asynchronous Collection of Household Power Consumption Data
Household Network
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 7 / 17
Asynchronous Collection of Household Power Consumption Data
Notations
Let A the set of all appliances within the house, n = |A|.
Aj the set of active devices, Aj ⊆ A and j ∈ [1,p].
The set of sensors s1,s2,...,sn installed to monitor home
appliances power consumption.
M mobile device represents base station /sink/aggregation point
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 8 / 17
Asynchronous Collection of Household Power Consumption Data
Notations
Let A the set of all appliances within the house, n = |A|.
Aj the set of active devices, Aj ⊆ A and j ∈ [1,p].
The set of sensors s1,s2,...,sn installed to monitor home
appliances power consumption.
M mobile device represents base station /sink/aggregation point
Network model
system can be modeled by an undirected and connected graph
G = (S,E), where S is the set of nodes in the networks and E is a
set of communication links among the nodes in S
G is the communication graph of this WSN.
Two nodes si and sj are connected if and only if si communicates
directly with sj. si and sj are neighbors
The set N (si) is the set of vertices adjacent to si.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 8 / 17
Asynchronous Collection of Household Power Consumption Data
Challenge
Data collection in a distributed communication network under the
following conditions:
1 Lack of globally shared clock between different nodes
(synchronization problems)
2 Unpredictable communication latency
3 Power consumption values are spread across several appliances
4 Nodes and link are susceptible to failure
5 The presence of network adversaries : (data modification attack,
denial of service attacks)
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
Asynchronous Collection of Household Power Consumption Data
Challenge
Data collection in a distributed communication network under the
following conditions:
1 Lack of globally shared clock between different nodes
(synchronization problems)
2 Unpredictable communication latency
3 Power consumption values are spread across several appliances
4 Nodes and link are susceptible to failure
5 The presence of network adversaries : (data modification attack,
denial of service attacks)
Problem
Recording and for collection of power consumption data in
asynchronous networks.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
Asynchronous Collection of Household Power Consumption Data
Challenge
Data collection in a distributed communication network under the
following conditions:
1 Lack of globally shared clock between different nodes
(synchronization problems)
2 Unpredictable communication latency
3 Power consumption values are spread across several appliances
4 Nodes and link are susceptible to failure
5 The presence of network adversaries : (data modification attack,
denial of service attacks)
Problem
Recording and for collection of power consumption data in
asynchronous networks.
Similar to the computation problem of recording the in global state
distributed system
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
Asynchronous Collection of Household Power Consumption Data
Snapshot Algorithm: A solution for Global State collection
The distributed snapshot produce a global state of a DS
Collection of local states of process Pi .
Collection of the channel state .
The state of process Pi is the content of processors, register, stack
and memory
The state of the channel is characterize by the set of message in
transit
A global state corresponds to the entire household’s energy
consumption compute from per appliance consumption.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 10 / 17
Asynchronous Collection of Household Power Consumption Data
The Proposed Snapshot Algorithm
Marker: the control message that informs the sensor node to
record the value(s) measured. It contains: sid, the ID of the sender
node; and snapnumb, the snapshot number.
Feedback: the message sent by a sensor to the sink node. It
contains: sid , identifier of the sender node; Nsnd, the new value
recorded; snapnumb an integer which indicates the snapshot; and
Mid , the ID of the sink node.
lmd: a real number which is the reading of the sensor at a given
point in time.
Osnd: the old value collected in the previous snapshot
flag: A Boolean value that indicates if a sensor node has received
the marker.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 11 / 17
Asynchronous Collection of Household Power Consumption Data
The Proposed Algorithm
‚ Assume a spanning tree for communication [Li et al, 2005]
ƒ Three steps algorithm:
® Snapshot initiation
® Reception of Marker
® Feedback response
Phase 1: Snapshot initiation
The mobile device broadcast Marker (sid ,snapnumb) over a spanning
tree initiate the collection
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
Asynchronous Collection of Household Power Consumption Data
The Proposed Algorithm
‚ Assume a spanning tree for communication [Li et al, 2005]
ƒ Three steps algorithm:
® Snapshot initiation
® Reception of Marker
® Feedback response
Phase 2: Reception of Marker
Upon receiving the marker message, Marker (sid ,snapnumb), the
receiver (an adjacent neighbor sj ∈ N (si) first check the flag value.
If the value of flag is false, sj has not yet received the marker then
it records its current readings lmd.
sj broadcast the control message Marker (sj,snapnumb) to its
adjacent neighbor.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
Asynchronous Collection of Household Power Consumption Data
The Proposed Algorithm
‚ Assume a spanning tree for communication [Li et al, 2005]
ƒ Three steps algorithm:
® Snapshot initiation
® Reception of Marker
® Feedback response
Phase 3: Feedback response
If Nsnd = Osnd send Feedback with (sid ,Nsnd,snapnumb,Mid ) .
Osnd ← Nsnd.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
Noise Characterization in Power Consumption Data
Noise in Power Data
Noisy in measured data are due to:Errors from the physical
measurement and Malicious measurements
1 Errors from the physical measurement (measurement errors):
The difference between the measured value and the true value
Let u be the true value, x be the measured value and β be the
measurement error. Then, β = x −u or u = x −β.
Three different types of measurement errors: systematic errors,
random errors and negligent errors
2 Malicious measurements: false data injection:
Random false data injection attacks
Targeted false data injection attacks
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 13 / 17
Noise Characterization in Power Consumption Data
Measurement Errors
1 Systematic errors
Result from imperfections of the metering equipment, inexact
adjustment and pre-settings
No statistical techniques to quantify systematic errors
[Hughes,2010]
2 Random errors
The reading of si taken at different time fluctuates.
The combination of such tiny perturbations is represented as a
random variable X
X follow Gaussian distributions.
3 Negligent errors
Result from mistakes or a malfunction of the measuring device
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 14 / 17
Noise Characterization in Power Consumption Data
Malicious measurements: false data injection
Maliciously inject bad measurement into the data stream in order
to misreport consumption
Two attacks scenarios [Liu,2009]
Random data injection attacks
Targeted data injection attacks.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 15 / 17
Conclusion
Conclusion
Most of the daily activity are electricity dependent
Framework for a cost efficient micro grid architecture for power
distribution in low resource environment
Efficient distributed snapshot algorithm for power consumption
collection in an asynchronous and distributed network
Message complexity is O(N) in a network with N nodes
Characterization of noise in data collection
On-going work: demand load management over distributed
network as a method of scheduling to optimize power consumption
in such a ways to guarantee grid stability
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 16 / 17
Thank for your kind attention !!!
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 17 / 17

Contenu connexe

Tendances

Load monitoring using uct
Load monitoring using uctLoad monitoring using uct
Load monitoring using uctMadhumithaR10
 
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...IRJET Journal
 
Application of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter controlApplication of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter controlAsoka Technologies
 
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...paperpublications3
 
Neural network based identification of multimachine power system
Neural network based identification of multimachine power systemNeural network based identification of multimachine power system
Neural network based identification of multimachine power systemcsandit
 
Multi string PV array
Multi string PV arrayMulti string PV array
Multi string PV arrayNIT MEGHALAYA
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes ijcisjournal
 
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...GE Energy Connections
 

Tendances (15)

Load monitoring using uct
Load monitoring using uctLoad monitoring using uct
Load monitoring using uct
 
Thesis
ThesisThesis
Thesis
 
1.3.4speedy
1.3.4speedy1.3.4speedy
1.3.4speedy
 
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
 
Application of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter controlApplication of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter control
 
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
 
Neural network based identification of multimachine power system
Neural network based identification of multimachine power systemNeural network based identification of multimachine power system
Neural network based identification of multimachine power system
 
Image procerssing
Image procerssingImage procerssing
Image procerssing
 
Multi string PV array
Multi string PV arrayMulti string PV array
Multi string PV array
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
 
M.sc. m kamel
M.sc. m kamelM.sc. m kamel
M.sc. m kamel
 
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
 
Power system
Power systemPower system
Power system
 
finallink
finallinkfinallink
finallink
 
Final_Report
Final_ReportFinal_Report
Final_Report
 

En vedette

Rendición de cuentas 2015 - Super
Rendición de cuentas 2015 - SuperRendición de cuentas 2015 - Super
Rendición de cuentas 2015 - Supereluniversocom
 
TreMonti Brochure - Compliance 2016
TreMonti Brochure - Compliance 2016TreMonti Brochure - Compliance 2016
TreMonti Brochure - Compliance 2016Heidjer Staecker
 
Rendición de cuentas 2015 - Viva samborondon
Rendición de cuentas 2015 - Viva samborondonRendición de cuentas 2015 - Viva samborondon
Rendición de cuentas 2015 - Viva samborondoneluniversocom
 
TreMonti Brochure - Technology Transfer sm
TreMonti Brochure - Technology Transfer smTreMonti Brochure - Technology Transfer sm
TreMonti Brochure - Technology Transfer smHeidjer Staecker
 
Wallace H. Coulter c3i - Addressable Market Presentation
Wallace H. Coulter c3i - Addressable Market PresentationWallace H. Coulter c3i - Addressable Market Presentation
Wallace H. Coulter c3i - Addressable Market PresentationHeidjer Staecker
 
FEF: Informe final del Mundial Brasil 2014
FEF: Informe final del Mundial Brasil 2014FEF: Informe final del Mundial Brasil 2014
FEF: Informe final del Mundial Brasil 2014eluniversocom
 
Pacome fsoc2015 presentation
Pacome fsoc2015 presentationPacome fsoc2015 presentation
Pacome fsoc2015 presentationpacomeambassa
 
Rendición de cuentas 2015 - Eluniverso.com
Rendición de cuentas 2015 - Eluniverso.comRendición de cuentas 2015 - Eluniverso.com
Rendición de cuentas 2015 - Eluniverso.comeluniversocom
 
AUTM ERM Social Innovation & Entrep (sml)
AUTM ERM Social Innovation & Entrep (sml)AUTM ERM Social Innovation & Entrep (sml)
AUTM ERM Social Innovation & Entrep (sml)Heidjer Staecker
 
Rendición de cuentas 2015 - Viva guayaquil
Rendición de cuentas 2015 - Viva guayaquilRendición de cuentas 2015 - Viva guayaquil
Rendición de cuentas 2015 - Viva guayaquileluniversocom
 
TreMonti Brochure - Economic Development[1]
TreMonti Brochure - Economic Development[1]TreMonti Brochure - Economic Development[1]
TreMonti Brochure - Economic Development[1]Heidjer Staecker
 
Rendición de cuentas 2015 - El Universo
Rendición de cuentas 2015 - El UniversoRendición de cuentas 2015 - El Universo
Rendición de cuentas 2015 - El Universoeluniversocom
 

En vedette (13)

Rendición de cuentas 2015 - Super
Rendición de cuentas 2015 - SuperRendición de cuentas 2015 - Super
Rendición de cuentas 2015 - Super
 
TreMonti Brochure - Compliance 2016
TreMonti Brochure - Compliance 2016TreMonti Brochure - Compliance 2016
TreMonti Brochure - Compliance 2016
 
Rendición de cuentas 2015 - Viva samborondon
Rendición de cuentas 2015 - Viva samborondonRendición de cuentas 2015 - Viva samborondon
Rendición de cuentas 2015 - Viva samborondon
 
TreMonti Brochure - Technology Transfer sm
TreMonti Brochure - Technology Transfer smTreMonti Brochure - Technology Transfer sm
TreMonti Brochure - Technology Transfer sm
 
Wallace H. Coulter c3i - Addressable Market Presentation
Wallace H. Coulter c3i - Addressable Market PresentationWallace H. Coulter c3i - Addressable Market Presentation
Wallace H. Coulter c3i - Addressable Market Presentation
 
FEF: Informe final del Mundial Brasil 2014
FEF: Informe final del Mundial Brasil 2014FEF: Informe final del Mundial Brasil 2014
FEF: Informe final del Mundial Brasil 2014
 
Pacome fsoc2015 presentation
Pacome fsoc2015 presentationPacome fsoc2015 presentation
Pacome fsoc2015 presentation
 
Rendición de cuentas 2015 - Eluniverso.com
Rendición de cuentas 2015 - Eluniverso.comRendición de cuentas 2015 - Eluniverso.com
Rendición de cuentas 2015 - Eluniverso.com
 
Importancia de las tic en la educación power
Importancia de las tic en la educación powerImportancia de las tic en la educación power
Importancia de las tic en la educación power
 
AUTM ERM Social Innovation & Entrep (sml)
AUTM ERM Social Innovation & Entrep (sml)AUTM ERM Social Innovation & Entrep (sml)
AUTM ERM Social Innovation & Entrep (sml)
 
Rendición de cuentas 2015 - Viva guayaquil
Rendición de cuentas 2015 - Viva guayaquilRendición de cuentas 2015 - Viva guayaquil
Rendición de cuentas 2015 - Viva guayaquil
 
TreMonti Brochure - Economic Development[1]
TreMonti Brochure - Economic Development[1]TreMonti Brochure - Economic Development[1]
TreMonti Brochure - Economic Development[1]
 
Rendición de cuentas 2015 - El Universo
Rendición de cuentas 2015 - El UniversoRendición de cuentas 2015 - El Universo
Rendición de cuentas 2015 - El Universo
 

Similaire à Ambassa fnss 2015

Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentationpacomeambassa
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksIRJET Journal
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSEditor IJCTER
 
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKSHOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKSijaia
 
Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...IOSR Journals
 
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET Journal
 
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...TELKOMNIKA JOURNAL
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Editor IJMTER
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
 
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...IJLT EMAS
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 

Similaire à Ambassa fnss 2015 (20)

Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentation
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
 
C011131925
C011131925C011131925
C011131925
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
D031202018023
D031202018023D031202018023
D031202018023
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
 
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKSHOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
 
Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...
 
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
 
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
Sensor net
Sensor netSensor net
Sensor net
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
 
398 .docx
398                                                             .docx398                                                             .docx
398 .docx
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 

Dernier

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Dernier (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Ambassa fnss 2015

  • 1. Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids Pacome Ambassa1 , Anne Kayem 1 , Stephen Wolthusen 2 Christoph Meinel 3 1 Department of Computer Science 2 NISlab 3 Hasso Plattner Institute University of Cape Town Department of Computer Science University of Potsdam South Africa Gjøvik University College, Norway Germany pambassa, akayem@cs.uct.ac.za stephen.wolthusen@hig.no meinel@hpi.de International Conference on Future Network Systems and Security (FNSS 2015) June 13, 2015 Paris, France Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 1 / 17
  • 2. Outline 1 Introduction 2 Related Work 3 System Description 4 Asynchronous Collection of Household Power Consumption Data 5 Noise Characterization in Power Consumption Data 6 Conclusion Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 2 / 17
  • 3. Introduction Introduction: Context Low income communities in developing countries: Computational limitations Intermittent network connectivity Unstable power connectivity Do not have reliable access to electricity Not connected to national power networks Access negatively influenced by load shedding Governments, private developers and NGOs could setup a Micro-grids for power sharing. Challenge: Generation does not satisfy demand Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 3 / 17
  • 4. Introduction Introduction: Motivation Design effective and efficient micro-grids architecture... Re-modeled the power network to incorporate Incorporate portable and cheap information and communication technology Mobile computing devices – popular in developing countries Sensors Wireless communication technology. Reliability and trust properties: critical for grid stability Reliability: Fair access to the network amongst the Stakeholder, Trust Limited computational system enable power network monitoring Determine power consumption Ensure reliable operation of the network state estimations : precondition for grid stability Integrity of data guide the power distribution Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 4 / 17
  • 5. Related Work Related Work Power network monitoring Conventional power network monitoring solutions are based on utilizing smart meters and trustworthy calibrated sensor installed into home networks for consumption monitoring. They either don’t make any assumption on the aggregation process or assume a synchronized system Monitoring and state estimation in distributed system Centered on snapshot algorithms Snapshot algorithm for fully connected network, reliable communication channel and FIFO message ordering. Most are not suitable for network with limitation on computation because of high communication overhead Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 5 / 17
  • 6. System Description Micro-Grid network Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 6 / 17
  • 7. Asynchronous Collection of Household Power Consumption Data Household Network Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 7 / 17
  • 8. Asynchronous Collection of Household Power Consumption Data Notations Let A the set of all appliances within the house, n = |A|. Aj the set of active devices, Aj ⊆ A and j ∈ [1,p]. The set of sensors s1,s2,...,sn installed to monitor home appliances power consumption. M mobile device represents base station /sink/aggregation point Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 8 / 17
  • 9. Asynchronous Collection of Household Power Consumption Data Notations Let A the set of all appliances within the house, n = |A|. Aj the set of active devices, Aj ⊆ A and j ∈ [1,p]. The set of sensors s1,s2,...,sn installed to monitor home appliances power consumption. M mobile device represents base station /sink/aggregation point Network model system can be modeled by an undirected and connected graph G = (S,E), where S is the set of nodes in the networks and E is a set of communication links among the nodes in S G is the communication graph of this WSN. Two nodes si and sj are connected if and only if si communicates directly with sj. si and sj are neighbors The set N (si) is the set of vertices adjacent to si. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 8 / 17
  • 10. Asynchronous Collection of Household Power Consumption Data Challenge Data collection in a distributed communication network under the following conditions: 1 Lack of globally shared clock between different nodes (synchronization problems) 2 Unpredictable communication latency 3 Power consumption values are spread across several appliances 4 Nodes and link are susceptible to failure 5 The presence of network adversaries : (data modification attack, denial of service attacks) Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
  • 11. Asynchronous Collection of Household Power Consumption Data Challenge Data collection in a distributed communication network under the following conditions: 1 Lack of globally shared clock between different nodes (synchronization problems) 2 Unpredictable communication latency 3 Power consumption values are spread across several appliances 4 Nodes and link are susceptible to failure 5 The presence of network adversaries : (data modification attack, denial of service attacks) Problem Recording and for collection of power consumption data in asynchronous networks. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
  • 12. Asynchronous Collection of Household Power Consumption Data Challenge Data collection in a distributed communication network under the following conditions: 1 Lack of globally shared clock between different nodes (synchronization problems) 2 Unpredictable communication latency 3 Power consumption values are spread across several appliances 4 Nodes and link are susceptible to failure 5 The presence of network adversaries : (data modification attack, denial of service attacks) Problem Recording and for collection of power consumption data in asynchronous networks. Similar to the computation problem of recording the in global state distributed system Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
  • 13. Asynchronous Collection of Household Power Consumption Data Snapshot Algorithm: A solution for Global State collection The distributed snapshot produce a global state of a DS Collection of local states of process Pi . Collection of the channel state . The state of process Pi is the content of processors, register, stack and memory The state of the channel is characterize by the set of message in transit A global state corresponds to the entire household’s energy consumption compute from per appliance consumption. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 10 / 17
  • 14. Asynchronous Collection of Household Power Consumption Data The Proposed Snapshot Algorithm Marker: the control message that informs the sensor node to record the value(s) measured. It contains: sid, the ID of the sender node; and snapnumb, the snapshot number. Feedback: the message sent by a sensor to the sink node. It contains: sid , identifier of the sender node; Nsnd, the new value recorded; snapnumb an integer which indicates the snapshot; and Mid , the ID of the sink node. lmd: a real number which is the reading of the sensor at a given point in time. Osnd: the old value collected in the previous snapshot flag: A Boolean value that indicates if a sensor node has received the marker. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 11 / 17
  • 15. Asynchronous Collection of Household Power Consumption Data The Proposed Algorithm ‚ Assume a spanning tree for communication [Li et al, 2005] ƒ Three steps algorithm: ® Snapshot initiation ® Reception of Marker ® Feedback response Phase 1: Snapshot initiation The mobile device broadcast Marker (sid ,snapnumb) over a spanning tree initiate the collection Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
  • 16. Asynchronous Collection of Household Power Consumption Data The Proposed Algorithm ‚ Assume a spanning tree for communication [Li et al, 2005] ƒ Three steps algorithm: ® Snapshot initiation ® Reception of Marker ® Feedback response Phase 2: Reception of Marker Upon receiving the marker message, Marker (sid ,snapnumb), the receiver (an adjacent neighbor sj ∈ N (si) first check the flag value. If the value of flag is false, sj has not yet received the marker then it records its current readings lmd. sj broadcast the control message Marker (sj,snapnumb) to its adjacent neighbor. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
  • 17. Asynchronous Collection of Household Power Consumption Data The Proposed Algorithm ‚ Assume a spanning tree for communication [Li et al, 2005] ƒ Three steps algorithm: ® Snapshot initiation ® Reception of Marker ® Feedback response Phase 3: Feedback response If Nsnd = Osnd send Feedback with (sid ,Nsnd,snapnumb,Mid ) . Osnd ← Nsnd. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
  • 18. Noise Characterization in Power Consumption Data Noise in Power Data Noisy in measured data are due to:Errors from the physical measurement and Malicious measurements 1 Errors from the physical measurement (measurement errors): The difference between the measured value and the true value Let u be the true value, x be the measured value and β be the measurement error. Then, β = x −u or u = x −β. Three different types of measurement errors: systematic errors, random errors and negligent errors 2 Malicious measurements: false data injection: Random false data injection attacks Targeted false data injection attacks Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 13 / 17
  • 19. Noise Characterization in Power Consumption Data Measurement Errors 1 Systematic errors Result from imperfections of the metering equipment, inexact adjustment and pre-settings No statistical techniques to quantify systematic errors [Hughes,2010] 2 Random errors The reading of si taken at different time fluctuates. The combination of such tiny perturbations is represented as a random variable X X follow Gaussian distributions. 3 Negligent errors Result from mistakes or a malfunction of the measuring device Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 14 / 17
  • 20. Noise Characterization in Power Consumption Data Malicious measurements: false data injection Maliciously inject bad measurement into the data stream in order to misreport consumption Two attacks scenarios [Liu,2009] Random data injection attacks Targeted data injection attacks. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 15 / 17
  • 21. Conclusion Conclusion Most of the daily activity are electricity dependent Framework for a cost efficient micro grid architecture for power distribution in low resource environment Efficient distributed snapshot algorithm for power consumption collection in an asynchronous and distributed network Message complexity is O(N) in a network with N nodes Characterization of noise in data collection On-going work: demand load management over distributed network as a method of scheduling to optimize power consumption in such a ways to guarantee grid stability Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 16 / 17
  • 22. Thank for your kind attention !!! Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 17 / 17