Combating Coordinated Pricing Cyberattack and Energy Theft in Smart Home Cyber-Physical Systems

The information exchange between the utility company and the smart community is crucial to the smart home cyber-physical systems. Yet the interaction between the two parties is vulnerable to many potential cyberattacks, among which the most striking ones are pricing cyberattacks and energy theft. Coordinated cyberattacks have emerged as an advanced attacking scheme with both pricing attack and energy theft applied in the cooperative manner, which can induce significant impact to smart home systems even if each attack is applied with only moderate strength. Such attacks cannot be effectively detected since the existing techniques are designed for detecting either pricing attack or energy theft without considering the impact due to coordinated attacks. This paper aims at developing the detection framework for coordinated cyberattacks considering coordinated impacts of various attacking strategies using an advanced continuous state partially observable Markov decision process. Handling coordinated attacks induces drastic increase in time complexity, which motivates us to propose innovative cross entropy state sampling and Fourier belief state approximation for the solving of developed detection framework. Our simulation results demonstrate that the coordinated cyberattack can reduce his/her electricity bill by 32.65%. In addition, the proposed detection technique can better capture coordinated attacks than the conventional detection technique, resulting in 10.31% increase in the hacker’s bill.

[1]  Michael C. Fu,et al.  Solving Continuous-State POMDPs via Density Projection , 2010, IEEE Transactions on Automatic Control.

[2]  Pascal Poupart,et al.  Point-Based Value Iteration for Continuous POMDPs , 2006, J. Mach. Learn. Res..

[3]  E. Liu,et al.  Electricity grid operation and planning related benefits of advanced metering infrastructure , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).

[4]  V. Rich Personal communication , 1989, Nature.

[5]  Shiyan Hu,et al.  A Dynamic Programming Algorithm for Leveraging Probabilistic Detection of Energy Theft in Smart Home , 2015, IEEE Transactions on Emerging Topics in Computing.

[6]  Jie Wu,et al.  Privacy protection via appliance scheduling in smart homes , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[7]  Tongquan Wei,et al.  Uncertainty-Aware Household Appliance Scheduling Considering Dynamic Electricity Pricing in Smart Home , 2013, IEEE Transactions on Smart Grid.

[8]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[9]  Yang Liu,et al.  The Hierarchical Smart Home Cyberattack Detection Considering Power Overloading and Frequency Disturbance , 2016, IEEE Transactions on Industrial Informatics.

[10]  Shie Mannor,et al.  A Tutorial on the Cross-Entropy Method , 2005, Ann. Oper. Res..

[11]  Yang Liu,et al.  Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks , 2016, IEEE Transactions on Dependable and Secure Computing.

[12]  Shiyan Hu,et al.  Introduction to Cyber-Physical System Security: A Cross-Layer Perspective , 2017, IEEE Transactions on Multi-Scale Computing Systems.

[13]  Yang Liu,et al.  Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[14]  Yang Liu,et al.  Economical and Balanced Energy Usage in the Smart Home Infrastructure: A Tutorial and New Results , 2015, IEEE Transactions on Emerging Topics in Computing.

[15]  Shiyan Hu,et al.  Design Automation of Cyber-Physical Systems: Challenges, Advances, and Opportunities , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[16]  Sebastian Thrun,et al.  Monte Carlo POMDPs , 1999, NIPS.

[17]  Vincent W. S. Wong,et al.  Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid , 2010, IEEE Transactions on Smart Grid.

[18]  Pan Li,et al.  Privacy-Preserving Energy Theft Detection in Microgrids: A State Estimation Approach , 2016, IEEE Transactions on Power Systems.

[19]  Jie Wu,et al.  Impact assessment of net metering on smart home cyberattack detection , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[20]  Alex Rogers,et al.  Non-Intrusive Load Monitoring Using Prior Models of General Appliance Types , 2012, AAAI.

[21]  Shiyan Hu,et al.  Game-Theoretic Market-Driven Smart Home Scheduling Considering Energy Balancing , 2017, IEEE Systems Journal.

[22]  Shiyan Hu,et al.  Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation , 2016, IEEE Transactions on Smart Grid.

[23]  Leslie Pack Kaelbling,et al.  Planning and Acting in Partially Observable Stochastic Domains , 1998, Artif. Intell..

[24]  Grant Hernandez,et al.  Smart Nest Thermostat A Smart Spy in Your Home , 2014 .

[25]  Shiyan Hu,et al.  Strategic FRTU Deployment Considering Cybersecurity in Secondary Distribution Network , 2013, IEEE Transactions on Smart Grid.

[26]  Yang Liu,et al.  Cyberthreat Analysis and Detection for Energy Theft in Social Networking of Smart Homes , 2015, IEEE Transactions on Computational Social Systems.

[27]  Nikos A. Vlassis,et al.  Robot Planning in Partially Observable Continuous Domains , 2005, BNAIC.