summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ma/safety_reset.tex10
1 files changed, 5 insertions, 5 deletions
diff --git a/ma/safety_reset.tex b/ma/safety_reset.tex
index 544d095..371de28 100644
--- a/ma/safety_reset.tex
+++ b/ma/safety_reset.tex
@@ -504,7 +504,7 @@ faceplate that can be activated with a flashlight as a crude contact-less input
All meters provide several options for security seals to be installed to detect opening of the meter or access to its
terminal block. The shape and type of these security seals varies. Factory-installed seals are used to detect tampering
of the meter itself while seals made by the utility during meter installation are used to guard the meter's terminal
-block and detect attempts at by-passing.
+block and detect attempts at by-passing\cite{czechowski01}.
\section{Regulatory frameworks around the world}
@@ -719,10 +719,10 @@ recognized by security experts\cite{anderson01}.
A point we will not consider in much depth is theft of electricity. An incentive for the introduction of smart metering
that is frequently cited in utility industry publications outside of a general public's view is the reduction of
-electricity theft. Academic papers tend to either focus on other benefits such as generation efficiency gains through
-better forecasting or try to rationalize the funamentally anti-consumer nature of smart metering with strenuous claims
-of ``enormous social benefits''\cite{mcdaniel01}. Academics rarely point out the large economical incentive such
-\emph{revenue protection} mechanisms provide\cite{anderson01}.
+electricity theft\cite{czechowski01}. Academic papers tend to either focus on other benefits such as generation
+efficiency gains through better forecasting or try to rationalize the funamentally anti-consumer nature of smart
+metering with strenuous claims of ``enormous social benefits''\cite{mcdaniel01}. Academics rarely point out the large
+economical incentive such \emph{revenue protection} mechanisms provide\cite{anderson01}.
This thesis will entirely focus on grid stability and discard electricity theft. For the attack scenarios we lay out
billing inaccuracies of utility companies are of very low urgency compared to grid stability. In fact stability is a