Energy Theft Detection With Energy Privacy Preservation in the Smart Grid

As a prominent early instance of the Internet of Things in the smart grid, the advanced metering infrastructure (AMI) provides real-time information from smart meters to both grid operators and customers, exploiting the full potential of demand response. However, the newly collected information without security protection can be maliciously altered and result in huge loss. In this paper, we propose an energy theft detection scheme with energy privacy preservation in the smart grid. Especially, we use combined convolutional neural networks (CNNs) to detect abnormal behavior of the metering data from a long-period pattern observation. In addition, we employ Paillier algorithm to protect the energy privacy. In other words, the users’ energy data are securely protected in the transmission and the data disclosure is minimized. Our security analysis demonstrates that in our scheme data privacy and authentication are both achieved. Experimental results illustrate that our modified CNN model can effectively detect abnormal behaviors at an accuracy up to 92.67%.

[1]  Chao-Kai Wen,et al.  Electricity theft detection in low voltage networks with smart meters using state estimation , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).

[2]  Tanveer Ahmad,et al.  Non-Technical Loss Detection, Prevention and Suppression Issues for AMI in Smart Grid , 2015 .

[3]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[4]  Rongxing Lu,et al.  A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications , 2015, IEEE Internet of Things Journal.

[5]  Jiguo Yu,et al.  A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[6]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[7]  Jun Luo,et al.  Energy-theft detection issues for advanced metering infrastructure in smart grid , 2014, Tsinghua Science and Technology.

[8]  Xiaohui Liang,et al.  PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[9]  Pan Li,et al.  Privacy-preserving energy theft detection in smart grids , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[10]  Tara N. Sainath,et al.  Improving deep neural networks for LVCSR using rectified linear units and dropout , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[11]  Neeraj Kumar,et al.  Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.

[12]  Sook-Chin Yip,et al.  Energy theft and defective meters detection in AMI using linear regression , 2017, 2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe).

[13]  Zibin Zheng,et al.  Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids , 2018, IEEE Transactions on Industrial Informatics.

[14]  Jiaying Lin,et al.  Energy theft detection via integrated distribution state estimation based on AMI and SCADA measurements , 2015, 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT).

[15]  Zekeriya Erkin,et al.  Private Computation of Spatial and Temporal Power Consumption with Smart Meters , 2012, ACNS.

[16]  필립 듀플레시스,et al.  Access network, gateway and management server for a cellular wireless communication system , 2006 .

[17]  Pan Li,et al.  State estimation for energy theft detection in microgrids , 2014, 9th International Conference on Communications and Networking in China.

[18]  Robert P. Sheridan,et al.  Random Forest: A Classification and Regression Tool for Compound Classification and QSAR Modeling , 2003, J. Chem. Inf. Comput. Sci..

[19]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[20]  João Paulo Papa,et al.  Social-Spider Optimization-based Support Vector Machines applied for energy theft detection , 2016, Comput. Electr. Eng..

[21]  S. Shankar Sastry,et al.  Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure , 2015, IEEE Control Systems.

[22]  Chan-Nan Lu,et al.  Non-technical loss detection using state estimation and analysis of variance , 2013, 2013 IEEE Power & Energy Society General Meeting.

[23]  Gang Wang,et al.  Gated Siamese Convolutional Neural Network Architecture for Human Re-identification , 2016, ECCV.

[24]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[25]  Xuemin Shen,et al.  Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-Side Networks , 2017, IEEE Transactions on Smart Grid.

[26]  Vincent W. S. Wong,et al.  Smart Meter Privacy: Exploiting the Potential of Household Energy Storage Units , 2018, IEEE Internet of Things Journal.

[27]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[28]  Léon Bottou,et al.  Stochastic Gradient Descent Tricks , 2012, Neural Networks: Tricks of the Trade.

[29]  Mi Wen,et al.  A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[30]  Bin Liu,et al.  Loss analysis simulation of SVC / DC Deicer under SVC mode , 2016, 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).

[31]  Pan Li,et al.  Privacy-Preserving Energy Theft Detection in Microgrids: A State Estimation Approach , 2016, IEEE Transactions on Power Systems.

[32]  Nicholas J. P. Race,et al.  A privacy preserving approach to energy theft detection in smart grids , 2016, 2016 IEEE International Smart Cities Conference (ISC2).

[33]  Peng Liu,et al.  Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.

[34]  Lingfeng Wang,et al.  Support vector machine based data classification for detection of electricity theft , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[35]  Xiaohui Liang,et al.  ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[36]  Syed Khaleel Ahmed,et al.  Detection of abnormalities and electricity theft using genetic Support Vector Machines , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[37]  S. Shankar Sastry,et al.  A game theory model for electricity theft detection and privacy-aware control in AMI systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[38]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..