A game theory model for electricity theft detection and privacy-aware control in AMI systems

We introduce a model for the operational costs of an electric distribution utility. The model focuses on two of the new services that are enabled by the Advanced Metering Infrastructure (AMI): (1) the fine-grained anomaly detection that is possible thanks to the frequent smart meter sampling rates (e.g., 15 minute sampling intervals of some smart meter deployments versus monthly-readings from old meters), and (2) the ability to shape the load thanks to advanced demand-response mechanisms that leverage AMI networks, such as direct-load control. We then study two security problems in this context. (1) In the first part of the paper we formulate the problem of electricity theft detection (one of the use-cases of anomaly detection) as a game between the electric utility and the electricity thief. The goal of the electricity thief is to steal a predefined amount of electricity while minimizing the likelihood of being detected, while the electric utility wants to maximize the probability of detection and the degree of operational cost it will incur for managing this anomaly detection mechanism. (2) In the second part of the paper we formulate the problem of privacy-preserving demand response as a control theory problem, and show how to select the maximum sampling interval for smart meters in order to protect the privacy of consumers while maintaining the desired load shaping properties of demand-response programs.

[1]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[2]  Ian A. Hiskens,et al.  Achieving Controllability of Electric Loads , 2011, Proceedings of the IEEE.

[3]  Patrick D. McDaniel,et al.  Protecting consumer privacy from electric load monitoring , 2011, CCS '11.

[4]  Saman A. Zonouz,et al.  AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[5]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[6]  David E. Culler,et al.  Identifying models of HVAC systems using semiparametric regression , 2012, 2012 American Control Conference (ACC).

[7]  Gelareh Taban,et al.  Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[8]  Pedro Antmann,et al.  Reducing Technical and Non-Technical Losses in the Power Sector , 2009 .

[9]  George Danezis,et al.  Privacy-preserving smart metering , 2011, WPES '11.

[10]  Dmitry Podkuiko,et al.  Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.

[11]  Andrew W. Appel Security Seals on Voting Machines: A Case Study , 2011, TSEC.

[12]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[13]  Alvaro A. Cárdenas,et al.  Evaluating Electricity Theft Detectors in Smart Grid Networks , 2012, RAID.