A difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids

In this paper, we explore the malicious meter inspection (MMI) problem in neighborhood area smart grids. By exploiting a binary inspection tree, we propose a Difference-Comparison-based Inspection (DCI) algorithm to quickly target the malicious meters. Different from existing algorithms, the DCI algorithm is designed based on three rules that are derived according to the difference comparison results in each local subtree. An attractive feature of the DCI algorithm is that it manages to skip a large number of nodes on the binary inspection tree and thus accelerates the detection of malicious nodes. Both analysis and simulation results show that DCI outperforms the existing inspection algorithms in terms of inspection speed, regardless of the ratio and permutation of malicious meters.

[1]  A.H. Nizar,et al.  A Data Mining Based NTL Analysis Method , 2007, 2007 IEEE Power Engineering Society General Meeting.

[2]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[3]  Lingfeng Wang,et al.  Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft , 2011 .

[4]  Yang Xiao,et al.  Non-repudiation in neighborhood area networks for smart grid , 2013, IEEE Communications Magazine.

[5]  Yang Xiao,et al.  NFD: A practical scheme to detect non-technical loss fraud in smart grid , 2014, 2014 IEEE International Conference on Communications (ICC).

[6]  A.H. Nizar,et al.  Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method , 2008, IEEE Transactions on Power Systems.

[7]  A Brookstone Reducing revenue leakage in your practice. , 1999, Canadian family physician Medecin de famille canadien.

[8]  Andrew W. Appel Security Seals on Voting Machines: A Case Study , 2011, TSEC.

[9]  Jing Liu,et al.  Achieving Accountability in Smart Grid , 2014, IEEE Systems Journal.

[10]  Yang Xiao,et al.  Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids , 2013, IEEE Transactions on Smart Grid.

[11]  Sieh Kiong Tiong,et al.  Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines , 2010, IEEE Transactions on Power Delivery.

[12]  Ronald L. Rivest,et al.  Introduction to Algorithms, Second Edition , 2001 .

[13]  A. H. Nizar,et al.  Identification and detection of electricity customer behaviour irregularities , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[14]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[15]  Syed Khaleel Ahmed,et al.  Detection of abnormalities and electricity theft using genetic Support Vector Machines , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[16]  Ninghui Li,et al.  Introduction to special section SACMAT'08 , 2011, TSEC.