SlideShare a Scribd company logo
1 of 15
Download to read offline
1/ 13
Security for Resilient Power Grids in
Resource Constrained Environment
Pacome Landry AMBASSA
HPI PhD Research School in CS4A
Department of Computer Science
University of Cape Town; South Africa
mailto:pambassa@cs.uct.ac.za
10th Annual Symposium on Future Trends in Service Oriented Computing 2015
Doctoral Symposium
Hasso Plattner Institut; Potsdam, Germany
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 1 / 13
2/ 13
Outline
1 Introduction
2 Micro-grid Architecture
3 Preliminary Results
Power network Monitoring
Security against energy theft
4 Conclusion
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 2 / 13
3/ 13
Introduction
Introduction: Context
Low resource environment
Computational limitations
Intermittent Network
connectivity
Unstable power connectivity
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 3 / 13
4/ 13
Introduction
Introduction: Motivation
Inexpensive and efficient formation and operation of so-called
micro-grids, primarily based on renewable energy to ensure fair access
or distribution of electricity to disadvantaged communities.
Re-modeling the micro-grid architecture
Incorporate portable and cheap information
and communication technology
Mobile computing devices popular in
developing countries
Inexpensive sensors with limited trust
Wireless communication technology.
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 4 / 13
5/ 13
Micro-grid Architecture
Proposed Micro-grid Framework
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 5 / 13
6/ 13
Micro-grid Architecture
Secure Resilient Micro-grid Architectures
1 Micro-grids based on distributed generation ( on renewable
including PV or wind) and network management
2 Distributed generation (mix Smaller private generators and shared
generator) across small communities
3 Fluctuations in energy production may not allow instant satisfaction
of all demand
4 Power network model
Tree topology with branches to each house
5 Communication network
Hierarchical with three layered architectures
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 6 / 13
7/ 13
Micro-grid Architecture
Problem Statement...
Research Problems
1 Problem #1: Power network monitoring ...
For monitoring and controlling small-scale electricity grids to
counteract fluctuations in energy production and consumption
2 Problem #2: secure the grid against energy theft, potential fraud,
and simple mistakes,
Limited trustworthiness of metering device and unreliability of the
network
3 Problem #3: Privacy and trust in the power use
data can be used to profile individual and their behaviors:
jeopardize privacy
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 7 / 13
8/ 13
Preliminary Results Power network Monitoring
Household Network
« Ambassa, Kayem, Wolthusen & Meinel , “Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids”, In Proc.,
First international Conference, FNSS 2015 , pp. 166-180
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 8 / 13
9/ 13
Preliminary Results Power network Monitoring
Collection of home power consumption data
Idea: Use Distributed
snapshot algorithm to compute
the global state of the
household power consumption
Use a k edges spanning
tree as a communication
graph
Use delay snapshot to
collect a vector of data
measured during an interval
of time
The global state represents
the lower bound of
household’s consumption
Figure 1: Communication Tree
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 9 / 13
10/ 13
Preliminary Results Security against energy theft
Errors Characterization in Power Consumption Data
Errors
Measurement Errors
Systematic errors Random errors
Maliciously Induced Errors
random false
data injection
Targeted false
data injection
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
10/ 13
Preliminary Results Security against energy theft
Errors Characterization in Power Consumption Data
Errors
Measurement Errors
Systematic errors Random errors
Maliciously Induced Errors
random false
data injection
Targeted false
data injection
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
10/ 13
Preliminary Results Security against energy theft
Errors Characterization in Power Consumption Data
Errors
Measurement Errors
Systematic errors Random errors
Maliciously Induced Errors
random false
data injection
Targeted false
data injection
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
11/ 13
Preliminary Results Security against energy theft
Power Consumption Modeling
Four Category of Loads
Resistive Loads
Deterministic ON-OFF model [Barker et al.,2013]
Inductive Loads
Piecewise polynomial function
Non-linear Loads
Non deterministic and vary randomly
Composite Loads
Piecewise function
Household aggregates Loads
Function That represent the summation of individuals loads over a
time interval: Monotonically increasing function
« Ambassa, Kayem, Wolthusen & Meinel , “ Modeling and Collection of Micro-Grids Power Consumption Data in the Presence of
Adversaries”,CRITIS, May 2015,(Under review)
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 11 / 13
12/ 13
Conclusion
Conclusion
Micro-grids networks are a cost effective solution for providing
access to electricity service in rural communities
Privacy, security and trust in power grids are major problems
We proposed:
Framework for a cost efficient network for power sharing in
constrained resource environment
Delay snapshot algorithm to collect individual appliance
consumption
Power consumption modeling that serves as a baseline for normal
consumption
Errors characterization in data collection
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 12 / 13
13/ 13
Thank you for your kind attention !!!
P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 13 / 13

More Related Content

Viewers also liked

La Globalizacion
La GlobalizacionLa Globalizacion
La Globalizacion
paulaandrea
 
2011-01-20 popong webpage
2011-01-20 popong webpage2011-01-20 popong webpage
2011-01-20 popong webpage
Team POPONG
 
Kurikulum bio form 4
Kurikulum bio form 4Kurikulum bio form 4
Kurikulum bio form 4
syikin6088
 
HKtangtang.com SEO by Super give me 5
HKtangtang.com SEO by Super give me 5HKtangtang.com SEO by Super give me 5
HKtangtang.com SEO by Super give me 5
Abby Zhang
 

Viewers also liked (20)

Docentes tics
Docentes ticsDocentes tics
Docentes tics
 
Paulaaa
PaulaaaPaulaaa
Paulaaa
 
tareita de informatika
tareita de informatikatareita de informatika
tareita de informatika
 
šAblona motýlci
šAblona motýlcišAblona motýlci
šAblona motýlci
 
Smart school
Smart schoolSmart school
Smart school
 
Module 1 how do you learn- narrated
Module 1   how do you learn- narratedModule 1   how do you learn- narrated
Module 1 how do you learn- narrated
 
Excel® 2013
Excel® 2013Excel® 2013
Excel® 2013
 
La Globalizacion
La GlobalizacionLa Globalizacion
La Globalizacion
 
Publicidad Pepe Pecas
Publicidad Pepe Pecas Publicidad Pepe Pecas
Publicidad Pepe Pecas
 
Toma de decisiones
Toma de decisionesToma de decisiones
Toma de decisiones
 
El respeto angie
El respeto angieEl respeto angie
El respeto angie
 
2011-01-20 popong webpage
2011-01-20 popong webpage2011-01-20 popong webpage
2011-01-20 popong webpage
 
Sde equipo7
Sde equipo7Sde equipo7
Sde equipo7
 
William delgado tapiero
William delgado tapieroWilliam delgado tapiero
William delgado tapiero
 
Mayerlin
MayerlinMayerlin
Mayerlin
 
Kurikulum bio form 4
Kurikulum bio form 4Kurikulum bio form 4
Kurikulum bio form 4
 
HKtangtang.com SEO by Super give me 5
HKtangtang.com SEO by Super give me 5HKtangtang.com SEO by Super give me 5
HKtangtang.com SEO by Super give me 5
 
Ebola hemorragias
Ebola hemorragiasEbola hemorragias
Ebola hemorragias
 
Medicina
MedicinaMedicina
Medicina
 
TEFI Overview and history
TEFI Overview and historyTEFI Overview and history
TEFI Overview and history
 

Similar to Pacome fsoc2015 presentation

Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...
John-André Bjørkhaug
 
9517cnc08
9517cnc089517cnc08
9517cnc08
IJCNCJournal
 
Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000
kabileshcm55
 
Theft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and ArduinoTheft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and Arduino
kabileshcm55
 
AnnaUniversity electives.pdf
AnnaUniversity electives.pdfAnnaUniversity electives.pdf
AnnaUniversity electives.pdf
KandavelEee
 

Similar to Pacome fsoc2015 presentation (20)

Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentation
 
Ambassa fnss 2015
Ambassa fnss 2015Ambassa fnss 2015
Ambassa fnss 2015
 
Power Grid Cybersecurity
Power Grid CybersecurityPower Grid Cybersecurity
Power Grid Cybersecurity
 
Evaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdfEvaluation of cybersecurity threats -mdms.pdf
Evaluation of cybersecurity threats -mdms.pdf
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...
 
January 2024 Top Cited -.pdf
January  2024 Top Cited  -.pdfJanuary  2024 Top Cited  -.pdf
January 2024 Top Cited -.pdf
 
Software Based Transmission Line Fault Analysis
Software Based Transmission Line Fault AnalysisSoftware Based Transmission Line Fault Analysis
Software Based Transmission Line Fault Analysis
 
9517cnc08
9517cnc089517cnc08
9517cnc08
 
Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000Theft Detection00000000000000000000000000
Theft Detection00000000000000000000000000
 
journal about operation management
journal about operation managementjournal about operation management
journal about operation management
 
Battery Storage Integration Into The Electric Grid
Battery Storage Integration Into The Electric GridBattery Storage Integration Into The Electric Grid
Battery Storage Integration Into The Electric Grid
 
Theft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and ArduinoTheft Detection detection of raspberry and Arduino
Theft Detection detection of raspberry and Arduino
 
Design a smart control strategy to implement an intelligent
Design a smart control strategy to implement an intelligentDesign a smart control strategy to implement an intelligent
Design a smart control strategy to implement an intelligent
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
 
Y2AwUCI.pptx
Y2AwUCI.pptxY2AwUCI.pptx
Y2AwUCI.pptx
 
OPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studiesOPAL-RT RT14 Conference: Real-time simulator for power system studies
OPAL-RT RT14 Conference: Real-time simulator for power system studies
 
energy theft detection
energy theft detectionenergy theft detection
energy theft detection
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Security and Privacy Challenges in SMART GRID.
Security and Privacy Challenges in SMART GRID.Security and Privacy Challenges in SMART GRID.
Security and Privacy Challenges in SMART GRID.
 
AnnaUniversity electives.pdf
AnnaUniversity electives.pdfAnnaUniversity electives.pdf
AnnaUniversity electives.pdf
 

Recently uploaded

Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
PirithiRaju
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Lokesh Kothari
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
Sérgio Sacani
 
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
Lokesh Kothari
 

Recently uploaded (20)

Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 

Pacome fsoc2015 presentation

  • 1. 1/ 13 Security for Resilient Power Grids in Resource Constrained Environment Pacome Landry AMBASSA HPI PhD Research School in CS4A Department of Computer Science University of Cape Town; South Africa mailto:pambassa@cs.uct.ac.za 10th Annual Symposium on Future Trends in Service Oriented Computing 2015 Doctoral Symposium Hasso Plattner Institut; Potsdam, Germany P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 1 / 13
  • 2. 2/ 13 Outline 1 Introduction 2 Micro-grid Architecture 3 Preliminary Results Power network Monitoring Security against energy theft 4 Conclusion P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 2 / 13
  • 3. 3/ 13 Introduction Introduction: Context Low resource environment Computational limitations Intermittent Network connectivity Unstable power connectivity P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 3 / 13
  • 4. 4/ 13 Introduction Introduction: Motivation Inexpensive and efficient formation and operation of so-called micro-grids, primarily based on renewable energy to ensure fair access or distribution of electricity to disadvantaged communities. Re-modeling the micro-grid architecture Incorporate portable and cheap information and communication technology Mobile computing devices popular in developing countries Inexpensive sensors with limited trust Wireless communication technology. P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 4 / 13
  • 5. 5/ 13 Micro-grid Architecture Proposed Micro-grid Framework P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 5 / 13
  • 6. 6/ 13 Micro-grid Architecture Secure Resilient Micro-grid Architectures 1 Micro-grids based on distributed generation ( on renewable including PV or wind) and network management 2 Distributed generation (mix Smaller private generators and shared generator) across small communities 3 Fluctuations in energy production may not allow instant satisfaction of all demand 4 Power network model Tree topology with branches to each house 5 Communication network Hierarchical with three layered architectures P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 6 / 13
  • 7. 7/ 13 Micro-grid Architecture Problem Statement... Research Problems 1 Problem #1: Power network monitoring ... For monitoring and controlling small-scale electricity grids to counteract fluctuations in energy production and consumption 2 Problem #2: secure the grid against energy theft, potential fraud, and simple mistakes, Limited trustworthiness of metering device and unreliability of the network 3 Problem #3: Privacy and trust in the power use data can be used to profile individual and their behaviors: jeopardize privacy P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 7 / 13
  • 8. 8/ 13 Preliminary Results Power network Monitoring Household Network « Ambassa, Kayem, Wolthusen & Meinel , “Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids”, In Proc., First international Conference, FNSS 2015 , pp. 166-180 P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 8 / 13
  • 9. 9/ 13 Preliminary Results Power network Monitoring Collection of home power consumption data Idea: Use Distributed snapshot algorithm to compute the global state of the household power consumption Use a k edges spanning tree as a communication graph Use delay snapshot to collect a vector of data measured during an interval of time The global state represents the lower bound of household’s consumption Figure 1: Communication Tree P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 9 / 13
  • 10. 10/ 13 Preliminary Results Security against energy theft Errors Characterization in Power Consumption Data Errors Measurement Errors Systematic errors Random errors Maliciously Induced Errors random false data injection Targeted false data injection P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
  • 11. 10/ 13 Preliminary Results Security against energy theft Errors Characterization in Power Consumption Data Errors Measurement Errors Systematic errors Random errors Maliciously Induced Errors random false data injection Targeted false data injection P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
  • 12. 10/ 13 Preliminary Results Security against energy theft Errors Characterization in Power Consumption Data Errors Measurement Errors Systematic errors Random errors Maliciously Induced Errors random false data injection Targeted false data injection P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 10 / 13
  • 13. 11/ 13 Preliminary Results Security against energy theft Power Consumption Modeling Four Category of Loads Resistive Loads Deterministic ON-OFF model [Barker et al.,2013] Inductive Loads Piecewise polynomial function Non-linear Loads Non deterministic and vary randomly Composite Loads Piecewise function Household aggregates Loads Function That represent the summation of individuals loads over a time interval: Monotonically increasing function « Ambassa, Kayem, Wolthusen & Meinel , “ Modeling and Collection of Micro-Grids Power Consumption Data in the Presence of Adversaries”,CRITIS, May 2015,(Under review) P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 11 / 13
  • 14. 12/ 13 Conclusion Conclusion Micro-grids networks are a cost effective solution for providing access to electricity service in rural communities Privacy, security and trust in power grids are major problems We proposed: Framework for a cost efficient network for power sharing in constrained resource environment Delay snapshot algorithm to collect individual appliance consumption Power consumption modeling that serves as a baseline for normal consumption Errors characterization in data collection P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 12 / 13
  • 15. 13/ 13 Thank you for your kind attention !!! P. L. AMBASSA (HPI in CS4A) Security in Power Network 17-06-2015 13 / 13