Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids

With the development of demand response technologies, the pricing scheme in smart grids is moving from flat pricing to multiple pricing (MP), which facilitates the energy saving at the consumer side. However, the flexible pricing policy may be exploited for the stealthy reduction of utility bills. In this paper, we present a hidden electricity theft (HET) attack by exploiting the emerging MP scheme. The basic idea is that attackers can tamper with smart meters to cheat the utility that some electricity is consumed under a lower price. To construct the HET attack, we propose an optimization problem aiming at maximizing the attack profits while evading current detection methods, and design two algorithms to conduct the attack on smart meters. Moreover, we disclose and exploit several new vulnerabilities of smart meters to demonstrate the feasibility of HET attacks. To protect smart grids against HET attacks, we propose several defense and detection countermeasures, including selective protection on smart meters, limiting the attack cycle, and updating the billing mechanism. Extensive experiments on a real data set demonstrate that the attack could cause high economic losses, and the proposed countermeasures could effectively mitigate the attack’s impact at a low cost.

[1]  Andrei Gurtov,et al.  Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Thomas B. Smith,et al.  Electricity theft: a comparative analysis , 2004 .

[3]  Emma Marris,et al.  Energy: Upgrading the grid , 2008, Nature.

[4]  Imrich Chlamtac,et al.  Smart Meter Data Privacy: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[5]  Wil L. Kling,et al.  Theft detection and smart metering practices and expectations in the Netherlands , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).

[6]  Yang Xiao,et al.  SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid , 2020, IEEE Transactions on Information Forensics and Security.

[7]  A.H. Nizar,et al.  Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method , 2008, IEEE Transactions on Power Systems.

[8]  Ira Horowitz,et al.  A review of electricity product differentiation , 2014 .

[9]  Lingyu Wang,et al.  Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status , 2017, IEEE Transactions on Information Forensics and Security.

[10]  Jianzhong Wu,et al.  k-means based load estimation of domestic smart meter measurements , 2017 .

[11]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[12]  Wei Liang,et al.  ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid , 2019, IEEE Transactions on Information Forensics and Security.

[13]  H. Vincent Poor,et al.  Smart Meter Privacy With Renewable Energy and an Energy Storage Device , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Edgard Jamhour,et al.  A Tunable Fraud Detection System for Advanced Metering Infrastructure Using Short-Lived Patterns , 2019, IEEE Transactions on Smart Grid.

[15]  A. James 2010 , 2011, Philo of Alexandria: an Annotated Bibliography 2007-2016.

[16]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[17]  Neeraj Kumar,et al.  Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.

[18]  Jia-Lun Tsai,et al.  Secure Anonymous Key Distribution Scheme for Smart Grid , 2016, IEEE Transactions on Smart Grid.

[19]  Lingfeng Wang,et al.  Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft , 2011 .

[20]  Victor C. M. Leung,et al.  Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.

[21]  Yang Xiao,et al.  Non-repudiation in neighborhood area networks for smart grid , 2013, IEEE Communications Magazine.

[22]  Vaibhav Fanibhare,et al.  Energy theft detection using AMIDS and cryptographic protection in smart grids , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).

[23]  Robert Czechowski,et al.  The most frequent energy theft techniques and hazards in present power energy consumption , 2016, 2016 Joint Workshop on Cyber- Physical Security and Resilience in Smart Grids (CPSR-SG).

[24]  Brian Warshay Upgrading the grid , 2015 .

[25]  Yang Liu,et al.  Coordinating the operations of smart buildings in smart grids , 2018 .

[26]  R. F. Ghajar,et al.  Cost/benefit analysis of an AMR system to reduce electricity theft and maximize revenues for Électricité du Liban , 2003 .

[27]  Michael Conlon,et al.  A clustering approach to domestic electricity load profile characterisation using smart metering data , 2015 .

[28]  Dmitry Podkuiko,et al.  Embedded Firmware Diversity for Smart Electric Meters , 2010, HotSec.

[29]  Nadeem Javaid,et al.  Minimizing Electricity Theft Using Smart Meters in AMI , 2012, 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[30]  S. Borenstein,et al.  Dynamic Pricing, Advanced Metering, and Demand Response in Electricity Markets , 2002 .

[31]  Saman A. Zonouz,et al.  A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures , 2013, IEEE Journal on Selected Areas in Communications.

[32]  Ram Rajagopal,et al.  Short Term Electricity Load Forecasting on Varying Levels of Aggregation , 2014, ArXiv.