Protecting consumer privacy from electric load monitoring
read more
Citations
Mobile Edge Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
Review: The role of communication systems in smart grids: Architectures, technical solutions and research challenges
Smart Meter Privacy: A Theoretical Framework
Technical Privacy Metrics: A Systematic Survey
References
Nonintrusive appliance load monitoring
False data injection attacks against state estimation in electric power grids
Security and Privacy Challenges in the Smart Grid
A Generic Battery Model for the Dynamic Simulation of Hybrid Electric Vehicles
Remote timing attacks are practical
Related Papers (5)
Frequently Asked Questions (13)
Q2. How long does the steady state last?
Following several high amplitude loads at the beginning of the trace, the steady state converges to durations of half a day or more by Apr. 22nd.
Q3. How many meaningful events were exposed to NILM algorithms per day?
Simulations of NILL over real usage profiles in four homes showed that between 1.1 and 5.9 meaningful events were exposed to NILM algorithms per day.
Q4. What is the way to find a minimal target load?
Target load selection is also useful for battery sizing, i.e., if there is no feasible target load for a given battery capacity, a larger battery should be used.
Q5. What is the effect of NILL on the number of features in the load profile?
When the load profile is simulated in NILLenabled residences (NILL), the number of features drops signifi-cantly (around 95% or more).
Q6. How does the battery perform in a low recovery state?
The KL value chosen in a low recovery state allows the battery to recharge quickly to just below a maximum SOC (80% in their experiments).
Q7. How is the load profile data inserted in the circuit?
With regards to timing in the circuit, the load profile data is inserted at the rate of one sample per second, the same rate at which it was recorded.
Q8. Why is NILL a more challenging task than one might initially surmise?
because of the physical limits and structure of electrical systems, this is a more challenging task than one might initially surmise.
Q9. What is the way to find a low recovery state?
An example of a low recovery state in their experimental results is shown in section 4.3.A NILL system requires an initial value for KSS to bootstrap normal operation.
Q10. What is the effect of the RFM on the NILM algorithm?
as RFM approaches zero, there is very little signal relative to the original profile for a NILM algorithm to operate on.
Q11. What is the approach to decompose the load profile?
The approach is to decompose the load profile into a composite of individual appliances features, i.e., representative pairs of ON/OFF events.
Q12. What is the entropy of a time series?
In Table 9, the entropy is computed in two ways: one in which zero values of the respective time series are included when calculating a probability mass function for the time series, and one in which the zero values are excluded.
Q13. Why was the bin size chosen to allow for higher entropy?
The bin size was chosen this small to allow for the potential of higher entropy due to higher precision but not any smaller in order to mitigate the introduction of undue noise.