ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid

Electricity theft is a widespread problem that causes tremendous economic losses for all utility companies around the globe. As many countries struggle to update their antique power systems to emerging smart grids, more and more smart meters are deployed throughout the world. Compared with analog meters which can be tampered with by only physical attacks, smart meters can be manipulated by malicious users with both physical and cyber-attacks for the purpose of stealing electricity. Thus, electricity theft will become even more serious in a smart grid than in a traditional power system if utility companies do not implement efficient solutions. The goal of this paper is to identify all malicious users in a neighborhood area in a smart grid within the shortest detection time. We propose an adaptive binary splitting inspection (ABSI) algorithm which adopts a group testing method to locate the malicious users. There are two considered inspection strategies in this paper: a scanning method in which users will be inspected individually, and a binary search method by which a specific number of users will be examined as a whole. During the inspection process of our proposed scheme, the inspection strategy as well as the number of users in the groups to be inspected are adaptively adjusted. Simulation results show that the proposed ABSI algorithm outperforms existing methods.

[1]  G. Grimmett,et al.  Probability and random processes , 2002 .

[2]  Yang Xiao,et al.  NFD: A practical scheme to detect non-technical loss fraud in smart grid , 2014, 2014 IEEE International Conference on Communications (ICC).

[3]  Alvaro A. Cardenas,et al.  Incomplete clustering of electricity consumption: an empirical analysis with industrial and residential datasets , 2017 .

[4]  F. Hwang A Method for Detecting all Defective Members in a Population by Group Testing , 1972 .

[5]  Yang Xiao,et al.  Design a fast Non-Technical Loss fraud detector for smart grid , 2016, Secur. Commun. Networks.

[6]  Yang Xiao,et al.  Non-repudiation in neighborhood area networks for smart grid , 2013, IEEE Communications Magazine.

[7]  Tansel Yucelen,et al.  Adaptive control architectures for mitigating sensor attacks in cyber-physical systems , 2016 .

[8]  Syed Khaleel Ahmed,et al.  Detection of abnormalities and electricity theft using genetic Support Vector Machines , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[9]  Xinyu Yang,et al.  On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.

[10]  Zhen Ling,et al.  An End-to-End View of IoT Security and Privacy , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[11]  Yang Xiao,et al.  NFD: Non-technical loss fraud detection in Smart Grid , 2017, Comput. Secur..

[12]  Yang Xiao,et al.  A survey of communication/networking in Smart Grids , 2012, Future Gener. Comput. Syst..

[13]  R. Dorfman The Detection of Defective Members of Large Populations , 1943 .

[14]  Wei Song,et al.  Self-healing hierarchical architecture for ZigBee network in smart grid application , 2015, Int. J. Sens. Networks.

[15]  Hamid Sharif,et al.  Energy harvesting for wireless sensor networks: applications and challenges in smart grid , 2016, Int. J. Sens. Networks.

[16]  P.S.N. Rao,et al.  Energy loss estimation in distribution feeders , 2006, IEEE Transactions on Power Delivery.

[17]  S. Lakshmivarahan,et al.  Probability and Random Processes , 2007 .

[18]  Yang Xiao,et al.  BCGI: A fast approach to detect malicious meters in neighborhood area smart grid , 2015, 2015 IEEE International Conference on Communications (ICC).

[19]  Yang Xiao,et al.  CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid , 2016, WASA.

[20]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[21]  Yang Xiao,et al.  Malicious device inspection home area network in smart grids , 2017, Int. J. Sens. Networks.

[22]  Chao Gao,et al.  Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.

[23]  Yang Xiao,et al.  A difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids , 2015, 2015 IEEE International Conference on Communications (ICC).

[24]  C C O Ramos,et al.  A New Approach for Nontechnical Losses Detection Based on Optimum-Path Forest , 2011, IEEE Transactions on Power Systems.

[25]  Noureddine Hamdi,et al.  Distributed cooperative spectrum sensing with wireless sensor network cluster architecture for smart grid communications , 2017, Int. J. Sens. Networks.

[26]  Yang Xiao,et al.  Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid , 2017, Comput. J..

[27]  Chao Liu,et al.  An unsupervised anomaly detection approach using energy-based spatiotemporal graphical modeling , 2017 .

[28]  Yang Xiao,et al.  FNFD: A Fast Scheme to Detect and Verify Non-Technical Loss Fraud in Smart Grid , 2016 .

[29]  Victor C. M. Leung,et al.  Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.

[30]  Charles M. Grinstead,et al.  Introduction to probability , 1999, Statistics for the Behavioural Sciences.

[31]  Nada Golmie,et al.  Toward Integrating Distributed Energy Resources and Storage Devices in Smart Grid , 2017, IEEE Internet of Things Journal.

[32]  Nirwan Ansari,et al.  CONSUMER: A Novel Hybrid Intrusion Detection System for Distribution Networks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[33]  Yang Xiao,et al.  A novel detector to detect colluded non-technical loss frauds in smart grid , 2017, Comput. Networks.

[34]  Yang Xiao,et al.  Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids , 2013, IEEE Transactions on Smart Grid.

[35]  Sieh Kiong Tiong,et al.  Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines , 2010, IEEE Transactions on Power Delivery.

[36]  L. Dworsky An Introduction to Probability , 2008 .

[37]  Arlan Luiz Bettiol,et al.  Non-technical losses identification using Optimum-Path Forest and state estimation , 2015, 2015 IEEE Eindhoven PowerTech.

[38]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[39]  Yang Xiao,et al.  A survey of intrusion detection systems in smart grid , 2017, Int. J. Sens. Networks.

[40]  J.E.R. Alves,et al.  Identification of energy theft and tampered meters using a central observer meter: a mathematical approach , 2003, 2003 IEEE PES Transmission and Distribution Conference and Exposition (IEEE Cat. No.03CH37495).

[41]  A.H. Nizar,et al.  Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method , 2008, IEEE Transactions on Power Systems.

[42]  Jun Luo,et al.  Energy-theft detection issues for advanced metering infrastructure in smart grid , 2014, Tsinghua Science and Technology.

[43]  Yang Xiao,et al.  Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid , 2018, Comput. Secur..