A Statistical Framework for Detecting Electricity Theft Activities in Smart Grid Distribution Networks

Electricity distribution networks have undergone rapid change with the introduction of smart meter technology, that have advanced sensing and communications capabilities, resulting in improved measurement and control functions. However, the same capabilities have enabled various cyber-attacks. A particular attack focuses on electricity theft, where the attacker alters (increases) the electricity consumption measurements recorded by the smart meter of other users, while reducing her own measurement. Thus, such attacks, since they maintain the total amount of power consumed at the distribution transformer are hard to detect by techniques that monitor mean levels of consumption patterns. To address this data integrity problem, we develop statistical techniques that utilize information on higher order statistics of electricity consumption and thus are capable of detecting such attacks and also identify the users (attacker and victims) involved. The models work both for independent and correlated electricity consumption streams. The results are illustrated on synthetic data, as well as emulated attacks leveraging real consumption data.

[1]  William H. Sanders,et al.  F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[2]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[3]  Jianhui Wang,et al.  Smart Transmission Grid: Vision and Framework , 2010, IEEE Transactions on Smart Grid.

[4]  Thomas B. Smith,et al.  Electricity theft: a comparative analysis , 2004 .

[5]  Lingfeng Wang,et al.  High performance computing for detection of electricity theft , 2013 .

[6]  Natalia Bailey,et al.  A Multiple Testing Approach to the Regularisation of Large Sample Correlation Matrices , 2014, Journal of Econometrics.

[7]  Hamid Gharavi Smart Grid: The Electric Energy System of the Future , 2011 .

[8]  Victor C. M. Leung,et al.  Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.

[9]  Wen-Long Chin,et al.  Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid , 2015, IEEE Transactions on Smart Grid.

[10]  S. Shankar Sastry,et al.  A game theory model for electricity theft detection and privacy-aware control in AMI systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[11]  Farrokh Albuyeh,et al.  Grid of the future , 2009, IEEE Power and Energy Magazine.

[12]  George Michailidis,et al.  Adaptive statistical detection of false data injection attacks in smart grids , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[13]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[14]  Panos M. Pardalos,et al.  Optimization and Security Challenges in Smart Power Grids , 2013 .

[15]  Georgios B. Giannakis,et al.  Monitoring and Optimization for Power Grids: A Signal Processing Perspective , 2013, IEEE Signal Processing Magazine.

[16]  Hamid Sharif,et al.  A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.

[17]  Nikos D. Hatziargyriou,et al.  Review of non-technical loss detection methods , 2018 .

[18]  George Michailidis,et al.  Correlative monitoring for detection of false data injection attacks in smart grids , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[19]  Ying Jun Zhang,et al.  Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.

[20]  Zuyi Li,et al.  Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.

[21]  KokSheik Wong,et al.  Detection of energy theft and defective smart meters in smart grids using linear regression , 2017 .

[22]  Joaquim L. Viegas,et al.  Clustering-based novelty detection for identification of non-technical losses , 2018, International Journal of Electrical Power & Energy Systems.

[23]  Stefan Axelsson,et al.  The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.

[24]  Saman A. Zonouz,et al.  A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures , 2013, IEEE Journal on Selected Areas in Communications.

[25]  KokSheik Wong,et al.  An anomaly detection framework for identifying energy theft and defective meters in smart grids , 2018, International Journal of Electrical Power & Energy Systems.

[26]  Tanveer Ahmad,et al.  Review of various modeling techniques for the detection of electricity theft in smart grid environment , 2018 .

[27]  Jun Luo,et al.  Energy-theft detection issues for advanced metering infrastructure in smart grid , 2014, Tsinghua Science and Technology.

[28]  Walid Saad,et al.  Smart grid data injection attacks: To defend or not? , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[29]  Daniel Nikovski,et al.  Electricity theft detection using smart meter data , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).