Detecting and Locating Non-Technical Losses in Modern Distribution Networks

The recent addition of information and communication technologies in electric power distribution systems has introduced a new class of electricity theft or nontechnical loss. Energy consumption data can be hidden and altered through cyber-attacks that are characterized by the unauthorized access to the application database and digital tampering of smart meters. The development of cost-efficient algorithms to address these types of nontechnical losses also targets the reduction of commercial losses because the full protection of an information system is very expensive. Thus, this paper proposes a strategy to detect nontechnical losses using a multivariate control chart that establishes a reliable region for monitoring the measured variance. After the detection of nontechnical losses, a pathfinding procedure based on the A-Star algorithm is able to locate the consumption point with the non-technical loss. Moreover, a geographical information system application displays the consumption point that is the target of the cyber-attack. The numerical results demonstrate the selectivity and efficiency of the proposed methodology applied for monitoring a real distribution network.

[1]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[2]  Saman A. Zonouz,et al.  A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures , 2013, IEEE Journal on Selected Areas in Communications.

[3]  John D. McDonald,et al.  Electric Power Substations Engineering , 2007 .

[4]  Li Lin,et al.  Smart Meters in Smart Grid: An Overview , 2013, 2013 IEEE Green Technologies Conference (GreenTech).

[5]  A. Monticelli State estimation in electric power systems : a generalized approach , 1999 .

[6]  Nils J. Nilsson,et al.  A Formal Basis for the Heuristic Determination of Minimum Cost Paths , 1968, IEEE Trans. Syst. Sci. Cybern..

[7]  Peter Sanders,et al.  Engineering Route Planning Algorithms , 2009, Algorithmics of Large and Complex Networks.

[8]  Julio Romero Aguero Improving the efficiency of power distribution systems through technical and non-technical losses reduction , 2012, T&D 2012.

[9]  A. D. McAulay,et al.  A Metric Space Approach to the Specification of the Heuristic Function for the A* Algorithm , 1994 .

[10]  Nirwan Ansari,et al.  CONSUMER: A Novel Hybrid Intrusion Detection System for Distribution Networks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[11]  Panida Jirutitijaroen,et al.  A simulation model of cyber threats for energy metering devices in a secondary distribution network , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).

[12]  Lingfeng Wang,et al.  Smart meters for power grid — Challenges, issues, advantages and status , 2011 .

[13]  Yang Xiao,et al.  Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids , 2013, IEEE Transactions on Smart Grid.

[14]  Tatsuya Yamazaki,et al.  Determining location of appliances from multi-hop tree structures of power strip type smart meters , 2009, IEEE Transactions on Consumer Electronics.

[15]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[16]  Jose Roberto Sanches Mantovani,et al.  Distribution system state estimation using the Hamiltonian cycle theory , 2016, 2016 IEEE Power and Energy Society General Meeting (PESGM).

[17]  David H. Su,et al.  Standarization of smart grid in ITU-T , 2013, IEEE Communications Magazine.

[18]  Mulukutla S. Sarma,et al.  Power System Analysis and Design , 1993 .

[19]  A. N. de Souza,et al.  Detection and Identification of Abnormalities in Customer Consumptions in Power Distribution Systems , 2011, IEEE Transactions on Power Delivery.

[20]  Jianhui Wang,et al.  Real-time intrusion detection in power system operations , 2013, IEEE Transactions on Power Systems.

[21]  Elisa Henning,et al.  Multivariate Process Monitoring and Control with R , 2009 .

[22]  Jose Roberto Sanches Mantovani,et al.  Development of a Smart Grid Simulation Environment, Part I: Project of the Electrical Devices Simulator , 2014, Journal of Control, Automation and Electrical Systems.

[23]  James A. Momoh,et al.  Electric Power Distribution, Automation, Protection, and Control , 2007 .

[24]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[25]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.

[26]  Rong Zheng,et al.  Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.

[27]  Dong Wei,et al.  Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.

[28]  Richard L. Church,et al.  Finding shortest paths on real road networks: the case for A* , 2009, Int. J. Geogr. Inf. Sci..

[29]  Chan-Nan Lu,et al.  Non-technical loss detection using smart distribution network measurement data , 2012, IEEE PES Innovative Smart Grid Technologies.

[30]  Jose Roberto Sanches Mantovani,et al.  State estimation of distribution networks through the real-time measurements of the smart meters , 2013, 2013 IEEE Grenoble Conference.

[31]  S. M. Amin,et al.  Smart grid security, privacy, and resilient architectures: Opportunities and challenges , 2012, 2012 IEEE Power and Energy Society General Meeting.

[32]  Yonghe Guo,et al.  Online Data Validation for Distribution Operations Against Cybertampering , 2014, IEEE Transactions on Power Systems.