SlideShare a Scribd company logo
Secure and Reliable Power Consumption
Monitoring in Untrustworthy Micro-grids
Pacome Ambassa1
, Anne Kayem 1
, Stephen Wolthusen 2
Christoph Meinel 3
1
Department of Computer Science 2
NISlab 3
Hasso Plattner Institute
University of Cape Town Department of Computer Science University of Potsdam
South Africa Gjøvik University College, Norway Germany
pambassa, akayem@cs.uct.ac.za stephen.wolthusen@hig.no meinel@hpi.de
International Conference on Future Network Systems and Security (FNSS 2015)
June 13, 2015 Paris, France
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 1 / 17
Outline
1 Introduction
2 Related Work
3 System Description
4 Asynchronous Collection of Household Power Consumption
Data
5 Noise Characterization in Power Consumption Data
6 Conclusion
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 2 / 17
Introduction
Introduction: Context
Low income communities in developing countries:
Computational limitations
Intermittent network connectivity
Unstable power connectivity
Do not have reliable access to electricity
Not connected to national power networks
Access negatively influenced by load shedding
Governments, private developers and NGOs could setup a
Micro-grids for power sharing.
Challenge: Generation does not satisfy demand
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 3 / 17
Introduction
Introduction: Motivation
Design effective and efficient micro-grids architecture...
Re-modeled the power network to incorporate
Incorporate portable and cheap information and communication
technology
Mobile computing devices – popular in developing countries
Sensors
Wireless communication technology.
Reliability and trust properties: critical for grid stability
Reliability: Fair access to the network amongst the Stakeholder,
Trust
Limited computational system enable power network monitoring
Determine power consumption
Ensure reliable operation of the network
state estimations : precondition for grid stability
Integrity of data guide the power distribution
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 4 / 17
Related Work
Related Work
Power network monitoring
Conventional power network monitoring solutions are based on
utilizing smart meters and trustworthy calibrated sensor installed
into home networks for consumption monitoring.
They either don’t make any assumption on the aggregation
process or assume a synchronized system
Monitoring and state estimation in distributed system
Centered on snapshot algorithms
Snapshot algorithm for fully connected network, reliable
communication channel and FIFO message ordering.
Most are not suitable for network with limitation on computation
because of high communication overhead
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 5 / 17
System Description
Micro-Grid network
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 6 / 17
Asynchronous Collection of Household Power Consumption Data
Household Network
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 7 / 17
Asynchronous Collection of Household Power Consumption Data
Notations
Let A the set of all appliances within the house, n = |A|.
Aj the set of active devices, Aj ⊆ A and j ∈ [1,p].
The set of sensors s1,s2,...,sn installed to monitor home
appliances power consumption.
M mobile device represents base station /sink/aggregation point
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 8 / 17
Asynchronous Collection of Household Power Consumption Data
Notations
Let A the set of all appliances within the house, n = |A|.
Aj the set of active devices, Aj ⊆ A and j ∈ [1,p].
The set of sensors s1,s2,...,sn installed to monitor home
appliances power consumption.
M mobile device represents base station /sink/aggregation point
Network model
system can be modeled by an undirected and connected graph
G = (S,E), where S is the set of nodes in the networks and E is a
set of communication links among the nodes in S
G is the communication graph of this WSN.
Two nodes si and sj are connected if and only if si communicates
directly with sj. si and sj are neighbors
The set N (si) is the set of vertices adjacent to si.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 8 / 17
Asynchronous Collection of Household Power Consumption Data
Challenge
Data collection in a distributed communication network under the
following conditions:
1 Lack of globally shared clock between different nodes
(synchronization problems)
2 Unpredictable communication latency
3 Power consumption values are spread across several appliances
4 Nodes and link are susceptible to failure
5 The presence of network adversaries : (data modification attack,
denial of service attacks)
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
Asynchronous Collection of Household Power Consumption Data
Challenge
Data collection in a distributed communication network under the
following conditions:
1 Lack of globally shared clock between different nodes
(synchronization problems)
2 Unpredictable communication latency
3 Power consumption values are spread across several appliances
4 Nodes and link are susceptible to failure
5 The presence of network adversaries : (data modification attack,
denial of service attacks)
Problem
Recording and for collection of power consumption data in
asynchronous networks.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
Asynchronous Collection of Household Power Consumption Data
Challenge
Data collection in a distributed communication network under the
following conditions:
1 Lack of globally shared clock between different nodes
(synchronization problems)
2 Unpredictable communication latency
3 Power consumption values are spread across several appliances
4 Nodes and link are susceptible to failure
5 The presence of network adversaries : (data modification attack,
denial of service attacks)
Problem
Recording and for collection of power consumption data in
asynchronous networks.
Similar to the computation problem of recording the in global state
distributed system
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
Asynchronous Collection of Household Power Consumption Data
Snapshot Algorithm: A solution for Global State collection
The distributed snapshot produce a global state of a DS
Collection of local states of process Pi .
Collection of the channel state .
The state of process Pi is the content of processors, register, stack
and memory
The state of the channel is characterize by the set of message in
transit
A global state corresponds to the entire household’s energy
consumption compute from per appliance consumption.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 10 / 17
Asynchronous Collection of Household Power Consumption Data
The Proposed Snapshot Algorithm
Marker: the control message that informs the sensor node to
record the value(s) measured. It contains: sid, the ID of the sender
node; and snapnumb, the snapshot number.
Feedback: the message sent by a sensor to the sink node. It
contains: sid , identifier of the sender node; Nsnd, the new value
recorded; snapnumb an integer which indicates the snapshot; and
Mid , the ID of the sink node.
lmd: a real number which is the reading of the sensor at a given
point in time.
Osnd: the old value collected in the previous snapshot
flag: A Boolean value that indicates if a sensor node has received
the marker.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 11 / 17
Asynchronous Collection of Household Power Consumption Data
The Proposed Algorithm
‚ Assume a spanning tree for communication [Li et al, 2005]
ƒ Three steps algorithm:
® Snapshot initiation
® Reception of Marker
® Feedback response
Phase 1: Snapshot initiation
The mobile device broadcast Marker (sid ,snapnumb) over a spanning
tree initiate the collection
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
Asynchronous Collection of Household Power Consumption Data
The Proposed Algorithm
‚ Assume a spanning tree for communication [Li et al, 2005]
ƒ Three steps algorithm:
® Snapshot initiation
® Reception of Marker
® Feedback response
Phase 2: Reception of Marker
Upon receiving the marker message, Marker (sid ,snapnumb), the
receiver (an adjacent neighbor sj ∈ N (si) first check the flag value.
If the value of flag is false, sj has not yet received the marker then
it records its current readings lmd.
sj broadcast the control message Marker (sj,snapnumb) to its
adjacent neighbor.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
Asynchronous Collection of Household Power Consumption Data
The Proposed Algorithm
‚ Assume a spanning tree for communication [Li et al, 2005]
ƒ Three steps algorithm:
® Snapshot initiation
® Reception of Marker
® Feedback response
Phase 3: Feedback response
If Nsnd = Osnd send Feedback with (sid ,Nsnd,snapnumb,Mid ) .
Osnd ← Nsnd.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
Noise Characterization in Power Consumption Data
Noise in Power Data
Noisy in measured data are due to:Errors from the physical
measurement and Malicious measurements
1 Errors from the physical measurement (measurement errors):
The difference between the measured value and the true value
Let u be the true value, x be the measured value and β be the
measurement error. Then, β = x −u or u = x −β.
Three different types of measurement errors: systematic errors,
random errors and negligent errors
2 Malicious measurements: false data injection:
Random false data injection attacks
Targeted false data injection attacks
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 13 / 17
Noise Characterization in Power Consumption Data
Measurement Errors
1 Systematic errors
Result from imperfections of the metering equipment, inexact
adjustment and pre-settings
No statistical techniques to quantify systematic errors
[Hughes,2010]
2 Random errors
The reading of si taken at different time fluctuates.
The combination of such tiny perturbations is represented as a
random variable X
X follow Gaussian distributions.
3 Negligent errors
Result from mistakes or a malfunction of the measuring device
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 14 / 17
Noise Characterization in Power Consumption Data
Malicious measurements: false data injection
Maliciously inject bad measurement into the data stream in order
to misreport consumption
Two attacks scenarios [Liu,2009]
Random data injection attacks
Targeted data injection attacks.
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 15 / 17
Conclusion
Conclusion
Most of the daily activity are electricity dependent
Framework for a cost efficient micro grid architecture for power
distribution in low resource environment
Efficient distributed snapshot algorithm for power consumption
collection in an asynchronous and distributed network
Message complexity is O(N) in a network with N nodes
Characterization of noise in data collection
On-going work: demand load management over distributed
network as a method of scheduling to optimize power consumption
in such a ways to guarantee grid stability
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 16 / 17
Thank for your kind attention !!!
Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 17 / 17

More Related Content

What's hot

Load monitoring using uct
Load monitoring using uctLoad monitoring using uct
Load monitoring using uct
MadhumithaR10
 
Thesis
ThesisThesis
1.3.4speedy
1.3.4speedy1.3.4speedy
1.3.4speedy
Talia Carbis
 
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
IRJET Journal
 
Application of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter controlApplication of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter control
Asoka Technologies
 
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
paperpublications3
 
Neural network based identification of multimachine power system
Neural network based identification of multimachine power systemNeural network based identification of multimachine power system
Neural network based identification of multimachine power system
csandit
 
Image procerssing
Image procerssingImage procerssing
Image procerssing
ChandruSimbu
 
Multi string PV array
Multi string PV arrayMulti string PV array
Multi string PV array
NIT MEGHALAYA
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
ijcisjournal
 
M.sc. m kamel
M.sc. m kamelM.sc. m kamel
M.sc. m kamel
Ashraf Aboshosha
 
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
GE Energy Connections
 
Power system
Power systemPower system
Power system
ChandruSimbu
 
finallink
finallinkfinallink
finallink
Sarin S Abraham
 
Final_Report
Final_ReportFinal_Report
Final_Report
Vignesh Thangavel
 

What's hot (15)

Load monitoring using uct
Load monitoring using uctLoad monitoring using uct
Load monitoring using uct
 
Thesis
ThesisThesis
Thesis
 
1.3.4speedy
1.3.4speedy1.3.4speedy
1.3.4speedy
 
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
ANFIS Control of Energy Control Center for Distributed Wind and Solar Generat...
 
Application of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter controlApplication of artificial neural networks for shunt active power filter control
Application of artificial neural networks for shunt active power filter control
 
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
Design and Implementation of Wireless Sensor Node for WSN for Automatic Meter...
 
Neural network based identification of multimachine power system
Neural network based identification of multimachine power systemNeural network based identification of multimachine power system
Neural network based identification of multimachine power system
 
Image procerssing
Image procerssingImage procerssing
Image procerssing
 
Multi string PV array
Multi string PV arrayMulti string PV array
Multi string PV array
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
 
M.sc. m kamel
M.sc. m kamelM.sc. m kamel
M.sc. m kamel
 
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
What If You Never Had to Balance a Load Again? GP100: Balanced Load. Unparall...
 
Power system
Power systemPower system
Power system
 
finallink
finallinkfinallink
finallink
 
Final_Report
Final_ReportFinal_Report
Final_Report
 

Viewers also liked

Rendición de cuentas 2015 - Super
Rendición de cuentas 2015 - SuperRendición de cuentas 2015 - Super
Rendición de cuentas 2015 - Super
eluniversocom
 
TreMonti Brochure - Compliance 2016
TreMonti Brochure - Compliance 2016TreMonti Brochure - Compliance 2016
TreMonti Brochure - Compliance 2016
Heidjer Staecker
 
Rendición de cuentas 2015 - Viva samborondon
Rendición de cuentas 2015 - Viva samborondonRendición de cuentas 2015 - Viva samborondon
Rendición de cuentas 2015 - Viva samborondon
eluniversocom
 
TreMonti Brochure - Technology Transfer sm
TreMonti Brochure - Technology Transfer smTreMonti Brochure - Technology Transfer sm
TreMonti Brochure - Technology Transfer sm
Heidjer Staecker
 
Wallace H. Coulter c3i - Addressable Market Presentation
Wallace H. Coulter c3i - Addressable Market PresentationWallace H. Coulter c3i - Addressable Market Presentation
Wallace H. Coulter c3i - Addressable Market Presentation
Heidjer Staecker
 
FEF: Informe final del Mundial Brasil 2014
FEF: Informe final del Mundial Brasil 2014FEF: Informe final del Mundial Brasil 2014
FEF: Informe final del Mundial Brasil 2014
eluniversocom
 
Pacome fsoc2015 presentation
Pacome fsoc2015 presentationPacome fsoc2015 presentation
Pacome fsoc2015 presentation
pacomeambassa
 
Rendición de cuentas 2015 - Eluniverso.com
Rendición de cuentas 2015 - Eluniverso.comRendición de cuentas 2015 - Eluniverso.com
Rendición de cuentas 2015 - Eluniverso.com
eluniversocom
 
Importancia de las tic en la educación power
Importancia de las tic en la educación powerImportancia de las tic en la educación power
Importancia de las tic en la educación power
Ketty Michelle Charris Martinez
 
AUTM ERM Social Innovation & Entrep (sml)
AUTM ERM Social Innovation & Entrep (sml)AUTM ERM Social Innovation & Entrep (sml)
AUTM ERM Social Innovation & Entrep (sml)
Heidjer Staecker
 
Rendición de cuentas 2015 - Viva guayaquil
Rendición de cuentas 2015 - Viva guayaquilRendición de cuentas 2015 - Viva guayaquil
Rendición de cuentas 2015 - Viva guayaquil
eluniversocom
 
TreMonti Brochure - Economic Development[1]
TreMonti Brochure - Economic Development[1]TreMonti Brochure - Economic Development[1]
TreMonti Brochure - Economic Development[1]
Heidjer Staecker
 
Rendición de cuentas 2015 - El Universo
Rendición de cuentas 2015 - El UniversoRendición de cuentas 2015 - El Universo
Rendición de cuentas 2015 - El Universo
eluniversocom
 

Viewers also liked (13)

Rendición de cuentas 2015 - Super
Rendición de cuentas 2015 - SuperRendición de cuentas 2015 - Super
Rendición de cuentas 2015 - Super
 
TreMonti Brochure - Compliance 2016
TreMonti Brochure - Compliance 2016TreMonti Brochure - Compliance 2016
TreMonti Brochure - Compliance 2016
 
Rendición de cuentas 2015 - Viva samborondon
Rendición de cuentas 2015 - Viva samborondonRendición de cuentas 2015 - Viva samborondon
Rendición de cuentas 2015 - Viva samborondon
 
TreMonti Brochure - Technology Transfer sm
TreMonti Brochure - Technology Transfer smTreMonti Brochure - Technology Transfer sm
TreMonti Brochure - Technology Transfer sm
 
Wallace H. Coulter c3i - Addressable Market Presentation
Wallace H. Coulter c3i - Addressable Market PresentationWallace H. Coulter c3i - Addressable Market Presentation
Wallace H. Coulter c3i - Addressable Market Presentation
 
FEF: Informe final del Mundial Brasil 2014
FEF: Informe final del Mundial Brasil 2014FEF: Informe final del Mundial Brasil 2014
FEF: Informe final del Mundial Brasil 2014
 
Pacome fsoc2015 presentation
Pacome fsoc2015 presentationPacome fsoc2015 presentation
Pacome fsoc2015 presentation
 
Rendición de cuentas 2015 - Eluniverso.com
Rendición de cuentas 2015 - Eluniverso.comRendición de cuentas 2015 - Eluniverso.com
Rendición de cuentas 2015 - Eluniverso.com
 
Importancia de las tic en la educación power
Importancia de las tic en la educación powerImportancia de las tic en la educación power
Importancia de las tic en la educación power
 
AUTM ERM Social Innovation & Entrep (sml)
AUTM ERM Social Innovation & Entrep (sml)AUTM ERM Social Innovation & Entrep (sml)
AUTM ERM Social Innovation & Entrep (sml)
 
Rendición de cuentas 2015 - Viva guayaquil
Rendición de cuentas 2015 - Viva guayaquilRendición de cuentas 2015 - Viva guayaquil
Rendición de cuentas 2015 - Viva guayaquil
 
TreMonti Brochure - Economic Development[1]
TreMonti Brochure - Economic Development[1]TreMonti Brochure - Economic Development[1]
TreMonti Brochure - Economic Development[1]
 
Rendición de cuentas 2015 - El Universo
Rendición de cuentas 2015 - El UniversoRendición de cuentas 2015 - El Universo
Rendición de cuentas 2015 - El Universo
 

Similar to Ambassa fnss 2015

Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentation
pacomeambassa
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
IRJET Journal
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
D031202018023
D031202018023D031202018023
D031202018023
ijceronline
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
Editor IJCTER
 
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKSHOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
ijaia
 
Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...
IOSR Journals
 
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET Journal
 
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
TELKOMNIKA JOURNAL
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
IJCNCJournal
 
Sensor net
Sensor netSensor net
Sensor net
Ines Bahram
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Editor IJMTER
 
398 .docx
398                                                             .docx398                                                             .docx
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
Mshari Alabdulkarim
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
aciijournal
 
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
IJLT EMAS
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
Yogesh Fulara
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
Jimit Rupani
 

Similar to Ambassa fnss 2015 (20)

Pacome hpi potsdam_presentation
Pacome hpi potsdam_presentationPacome hpi potsdam_presentation
Pacome hpi potsdam_presentation
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
 
C011131925
C011131925C011131925
C011131925
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
D031202018023
D031202018023D031202018023
D031202018023
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
 
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKSHOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
HOME APPLIANCE IDENTIFICATION FOR NILM SYSTEMS BASED ON DEEP NEURAL NETWORKS
 
Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...Intelligent Fault Identification System for Transmission Lines Using Artifici...
Intelligent Fault Identification System for Transmission Lines Using Artifici...
 
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
IRJET- Optimization with PSO and FPO based Control for Energy Efficient of Se...
 
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
Energy-Efficient Compressive Data Gathering Utilizing Virtual Multi-Input Mul...
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
Sensor net
Sensor netSensor net
Sensor net
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
 
398 .docx
398                                                             .docx398                                                             .docx
398 .docx
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
Short Term Load Forecasting: One Week (With & Without Weekend) Using Artifici...
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Ambassa fnss 2015

  • 1. Secure and Reliable Power Consumption Monitoring in Untrustworthy Micro-grids Pacome Ambassa1 , Anne Kayem 1 , Stephen Wolthusen 2 Christoph Meinel 3 1 Department of Computer Science 2 NISlab 3 Hasso Plattner Institute University of Cape Town Department of Computer Science University of Potsdam South Africa Gjøvik University College, Norway Germany pambassa, akayem@cs.uct.ac.za stephen.wolthusen@hig.no meinel@hpi.de International Conference on Future Network Systems and Security (FNSS 2015) June 13, 2015 Paris, France Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 1 / 17
  • 2. Outline 1 Introduction 2 Related Work 3 System Description 4 Asynchronous Collection of Household Power Consumption Data 5 Noise Characterization in Power Consumption Data 6 Conclusion Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 2 / 17
  • 3. Introduction Introduction: Context Low income communities in developing countries: Computational limitations Intermittent network connectivity Unstable power connectivity Do not have reliable access to electricity Not connected to national power networks Access negatively influenced by load shedding Governments, private developers and NGOs could setup a Micro-grids for power sharing. Challenge: Generation does not satisfy demand Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 3 / 17
  • 4. Introduction Introduction: Motivation Design effective and efficient micro-grids architecture... Re-modeled the power network to incorporate Incorporate portable and cheap information and communication technology Mobile computing devices – popular in developing countries Sensors Wireless communication technology. Reliability and trust properties: critical for grid stability Reliability: Fair access to the network amongst the Stakeholder, Trust Limited computational system enable power network monitoring Determine power consumption Ensure reliable operation of the network state estimations : precondition for grid stability Integrity of data guide the power distribution Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 4 / 17
  • 5. Related Work Related Work Power network monitoring Conventional power network monitoring solutions are based on utilizing smart meters and trustworthy calibrated sensor installed into home networks for consumption monitoring. They either don’t make any assumption on the aggregation process or assume a synchronized system Monitoring and state estimation in distributed system Centered on snapshot algorithms Snapshot algorithm for fully connected network, reliable communication channel and FIFO message ordering. Most are not suitable for network with limitation on computation because of high communication overhead Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 5 / 17
  • 6. System Description Micro-Grid network Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 6 / 17
  • 7. Asynchronous Collection of Household Power Consumption Data Household Network Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 7 / 17
  • 8. Asynchronous Collection of Household Power Consumption Data Notations Let A the set of all appliances within the house, n = |A|. Aj the set of active devices, Aj ⊆ A and j ∈ [1,p]. The set of sensors s1,s2,...,sn installed to monitor home appliances power consumption. M mobile device represents base station /sink/aggregation point Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 8 / 17
  • 9. Asynchronous Collection of Household Power Consumption Data Notations Let A the set of all appliances within the house, n = |A|. Aj the set of active devices, Aj ⊆ A and j ∈ [1,p]. The set of sensors s1,s2,...,sn installed to monitor home appliances power consumption. M mobile device represents base station /sink/aggregation point Network model system can be modeled by an undirected and connected graph G = (S,E), where S is the set of nodes in the networks and E is a set of communication links among the nodes in S G is the communication graph of this WSN. Two nodes si and sj are connected if and only if si communicates directly with sj. si and sj are neighbors The set N (si) is the set of vertices adjacent to si. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 8 / 17
  • 10. Asynchronous Collection of Household Power Consumption Data Challenge Data collection in a distributed communication network under the following conditions: 1 Lack of globally shared clock between different nodes (synchronization problems) 2 Unpredictable communication latency 3 Power consumption values are spread across several appliances 4 Nodes and link are susceptible to failure 5 The presence of network adversaries : (data modification attack, denial of service attacks) Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
  • 11. Asynchronous Collection of Household Power Consumption Data Challenge Data collection in a distributed communication network under the following conditions: 1 Lack of globally shared clock between different nodes (synchronization problems) 2 Unpredictable communication latency 3 Power consumption values are spread across several appliances 4 Nodes and link are susceptible to failure 5 The presence of network adversaries : (data modification attack, denial of service attacks) Problem Recording and for collection of power consumption data in asynchronous networks. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
  • 12. Asynchronous Collection of Household Power Consumption Data Challenge Data collection in a distributed communication network under the following conditions: 1 Lack of globally shared clock between different nodes (synchronization problems) 2 Unpredictable communication latency 3 Power consumption values are spread across several appliances 4 Nodes and link are susceptible to failure 5 The presence of network adversaries : (data modification attack, denial of service attacks) Problem Recording and for collection of power consumption data in asynchronous networks. Similar to the computation problem of recording the in global state distributed system Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 9 / 17
  • 13. Asynchronous Collection of Household Power Consumption Data Snapshot Algorithm: A solution for Global State collection The distributed snapshot produce a global state of a DS Collection of local states of process Pi . Collection of the channel state . The state of process Pi is the content of processors, register, stack and memory The state of the channel is characterize by the set of message in transit A global state corresponds to the entire household’s energy consumption compute from per appliance consumption. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 10 / 17
  • 14. Asynchronous Collection of Household Power Consumption Data The Proposed Snapshot Algorithm Marker: the control message that informs the sensor node to record the value(s) measured. It contains: sid, the ID of the sender node; and snapnumb, the snapshot number. Feedback: the message sent by a sensor to the sink node. It contains: sid , identifier of the sender node; Nsnd, the new value recorded; snapnumb an integer which indicates the snapshot; and Mid , the ID of the sink node. lmd: a real number which is the reading of the sensor at a given point in time. Osnd: the old value collected in the previous snapshot flag: A Boolean value that indicates if a sensor node has received the marker. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 11 / 17
  • 15. Asynchronous Collection of Household Power Consumption Data The Proposed Algorithm ‚ Assume a spanning tree for communication [Li et al, 2005] ƒ Three steps algorithm: ® Snapshot initiation ® Reception of Marker ® Feedback response Phase 1: Snapshot initiation The mobile device broadcast Marker (sid ,snapnumb) over a spanning tree initiate the collection Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
  • 16. Asynchronous Collection of Household Power Consumption Data The Proposed Algorithm ‚ Assume a spanning tree for communication [Li et al, 2005] ƒ Three steps algorithm: ® Snapshot initiation ® Reception of Marker ® Feedback response Phase 2: Reception of Marker Upon receiving the marker message, Marker (sid ,snapnumb), the receiver (an adjacent neighbor sj ∈ N (si) first check the flag value. If the value of flag is false, sj has not yet received the marker then it records its current readings lmd. sj broadcast the control message Marker (sj,snapnumb) to its adjacent neighbor. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
  • 17. Asynchronous Collection of Household Power Consumption Data The Proposed Algorithm ‚ Assume a spanning tree for communication [Li et al, 2005] ƒ Three steps algorithm: ® Snapshot initiation ® Reception of Marker ® Feedback response Phase 3: Feedback response If Nsnd = Osnd send Feedback with (sid ,Nsnd,snapnumb,Mid ) . Osnd ← Nsnd. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 12 / 17
  • 18. Noise Characterization in Power Consumption Data Noise in Power Data Noisy in measured data are due to:Errors from the physical measurement and Malicious measurements 1 Errors from the physical measurement (measurement errors): The difference between the measured value and the true value Let u be the true value, x be the measured value and β be the measurement error. Then, β = x −u or u = x −β. Three different types of measurement errors: systematic errors, random errors and negligent errors 2 Malicious measurements: false data injection: Random false data injection attacks Targeted false data injection attacks Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 13 / 17
  • 19. Noise Characterization in Power Consumption Data Measurement Errors 1 Systematic errors Result from imperfections of the metering equipment, inexact adjustment and pre-settings No statistical techniques to quantify systematic errors [Hughes,2010] 2 Random errors The reading of si taken at different time fluctuates. The combination of such tiny perturbations is represented as a random variable X X follow Gaussian distributions. 3 Negligent errors Result from mistakes or a malfunction of the measuring device Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 14 / 17
  • 20. Noise Characterization in Power Consumption Data Malicious measurements: false data injection Maliciously inject bad measurement into the data stream in order to misreport consumption Two attacks scenarios [Liu,2009] Random data injection attacks Targeted data injection attacks. Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 15 / 17
  • 21. Conclusion Conclusion Most of the daily activity are electricity dependent Framework for a cost efficient micro grid architecture for power distribution in low resource environment Efficient distributed snapshot algorithm for power consumption collection in an asynchronous and distributed network Message complexity is O(N) in a network with N nodes Characterization of noise in data collection On-going work: demand load management over distributed network as a method of scheduling to optimize power consumption in such a ways to guarantee grid stability Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 16 / 17
  • 22. Thank for your kind attention !!! Ambassa, Kayem, Wolthusen & Meinel (UCT, HIG & HPI) Power monitoring in a micro-grid 17 / 17