PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks

In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every few minutes) to the system operator for billing, real-time load monitoring, and energy management. On the other hand, the AMI networks are vulnerable to cyber-attacks where malicious consumers report false (low) electricity consumption to reduce their bills in an illegal way. Therefore, it is imperative to develop schemes to accurately identify the consumers that steal electricity by reporting false electricity usage. Most of the existing schemes rely on machine learning for electricity theft detection using the consumers’ fine-grained power consumption meter readings. However, this fine-grained data that is used for electricity theft detection, load monitoring, and billing can also be misused to infer sensitive information regarding the consumers such as whether they are on travel, the appliances they use, and so on. In this paper, we propose an efficient and privacy-preserving electricity theft detection scheme for the AMI network and we refer to it as PPETD. Our scheme allows system operators to identify the electricity thefts, monitor the loads, and compute electricity bills efficiently using masked fine-grained meter readings without violating the consumers’ privacy. The PPETD uses secret sharing to allow the consumers to send masked readings to the system operator such that these readings can be aggregated for the purpose of monitoring and billing. In addition, secure two-party protocols using arithmetic and binary circuits are executed by the system operator and each consumer to evaluate a generalized convolutional-neural network model on the reported masked fine-grained power consumption readings for the purpose of electricity theft detection. An extensive analysis of real datasets is performed to evaluate the security and the performance of the PPETD. Our results confirm that our scheme is accurate in detecting fraudulent consumers with privacy preservation and acceptable communication and computation overhead.

[1]  Mohamed Baza,et al.  Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units , 2018, 2019 IEEE International Conference on Blockchain (Blockchain).

[2]  Mariana Raykova,et al.  Secure Computation for Machine Learning With SPDZ , 2019, ArXiv.

[3]  Mohamed M. Abdallah,et al.  Privacy-Preserving Collection of Power Consumption Data for Enhanced AMI Networks , 2018, 2018 25th International Conference on Telecommunications (ICT).

[4]  Muhammad Tariq,et al.  Electricity Theft Detection and Localization in Grid-Tied Microgrids , 2018, IEEE Transactions on Smart Grid.

[5]  Surya Ganguli,et al.  Resurrecting the sigmoid in deep learning through dynamical isometry: theory and practice , 2017, NIPS.

[6]  Erchin Serpedin,et al.  A Deep Learning Approach for Detection of Electricity Theft Cyber Attacks in Smart Grids , 2018 .

[7]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[10]  Mohamed Baza,et al.  Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval , 2019, 2019 International Conference on Smart Applications, Communications and Networking (SmartNets).

[11]  Martín Abadi,et al.  TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.

[12]  Marcel Keller,et al.  Overdrive: Making SPDZ Great Again , 2018, IACR Cryptol. ePrint Arch..

[13]  Farrukh Nagi,et al.  Improving SVM-Based Nontechnical Loss Detection in Power Utility Using the Fuzzy Inference System , 2011, IEEE Transactions on Power Delivery.

[14]  Victor C. M. Leung,et al.  Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.

[15]  Chongqing Kang,et al.  A Novel Combined Data-Driven Approach for Electricity Theft Detection , 2019, IEEE Transactions on Industrial Informatics.

[16]  Léon Bottou,et al.  Large-Scale Machine Learning with Stochastic Gradient Descent , 2010, COMPSTAT.

[17]  Xiaohui Liang,et al.  Energy Theft Detection With Energy Privacy Preservation in the Smart Grid , 2019, IEEE Internet of Things Journal.

[18]  Haibo He,et al.  ADASYN: Adaptive synthetic sampling approach for imbalanced learning , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[19]  C C O Ramos,et al.  A New Approach for Nontechnical Losses Detection Based on Optimum-Path Forest , 2011, IEEE Transactions on Power Systems.

[20]  Farinaz Koushanfar,et al.  DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).

[21]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[22]  Pan Li,et al.  Privacy-Preserving Energy Theft Detection in Smart Grids: A P2P Computing Approach , 2013 .

[23]  Zibin Zheng,et al.  Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids , 2018, IEEE Transactions on Industrial Informatics.

[24]  Paul Dierckx,et al.  Curve and surface fitting with splines , 1994, Monographs on numerical analysis.

[25]  Marcel Keller,et al.  Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.

[26]  Pan Li,et al.  Privacy-Preserving Energy Theft Detection in Microgrids: A State Estimation Approach , 2016, IEEE Transactions on Power Systems.

[27]  Kemal Akkaya,et al.  EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks , 2018, IEEE Internet of Things Journal.

[28]  Mahmoud Nabil,et al.  EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks , 2019, IEEE Access.

[29]  Mohamed Baza,et al.  Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid , 2019, ArXiv.

[30]  Pedro Antmann,et al.  Reducing Technical and Non-Technical Losses in the Power Sector , 2009 .

[31]  Erchin Serpedin,et al.  Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).

[32]  Yoshua Bengio,et al.  Convolutional networks for images, speech, and time series , 1998 .

[33]  Roi Livni,et al.  On the Computational Efficiency of Training Neural Networks , 2014, NIPS.

[34]  Yao Lu,et al.  Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..

[35]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[36]  Neeraj Kumar,et al.  Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.

[37]  Mohamed Baza,et al.  Mimic Learning to Generate a Shareable Network Intrusion Detection Model , 2019, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).

[38]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[39]  Mostafa M. Fouda,et al.  An efficient distributed approach for key management in microgrids , 2015, 2015 11th International Computer Engineering Conference (ICENCO).

[40]  David Evans,et al.  Obliv-C: A Language for Extensible Data-Oblivious Computation , 2015, IACR Cryptol. ePrint Arch..

[41]  Jonathan Katz,et al.  Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.

[42]  Mohamed Baza,et al.  Detecting Sybil Attacks Using Proofs of Work and Location in VANETs , 2019, IEEE Transactions on Dependable and Secure Computing.

[43]  G. W. Hart,et al.  Nonintrusive appliance load monitoring , 1992, Proc. IEEE.

[44]  Pan Li,et al.  Privacy-preserving energy theft detection in smart grids , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[45]  Kemal Akkaya,et al.  Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[46]  Mohamed Baza,et al.  Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles , 2018, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[47]  Nicholas J. P. Race,et al.  A privacy preserving approach to energy theft detection in smart grids , 2016, 2016 IEEE International Smart Cities Conference (ISC2).