SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid

Integrated with cutting-edge equipment and technologies, smart grid takes prominent advantages over traditional power systems. However, hardware and software techniques also bring smart grid numerous security concerns, especially various cyberattacks. Malicious users can launch cyberattacks to tamper with smart meters anytime and anywhere, mainly for the purpose of stealing electricity. This makes electricity theft much easier to commit and more difficult to detect. Researchers have devised many approaches to identify malicious users. However, these approaches suffer from either poor accuracy or expensive cost of deploying monitoring devices. This paper aims to locate malicious users using a limited number of monitoring devices (called inspectors) within the shortest detection time. Before inspectors conduct any inspection, suspicions that users steal electricity are comprehensively assessed, mainly through analyzing prior records of electricity theft as well as deviations between the reported and predicted normal consumptions. On the basis of these suspicions, we further propose a suspicion assessment-based inspection (SAI) algorithm, in which the users with the highest suspicions will be first probed individually. Then, the other users will be probed by a binary tree-based inspection strategy. The binary tree is built according to users’ suspicions. The inspection order of the nodes on the binary tree is also determined by the suspicions. The experiment results show that the SAI algorithm outperforms the existing methods.

[1]  Lingfeng Wang,et al.  Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft , 2011 .

[2]  Saman A. Zonouz,et al.  A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures , 2013, IEEE Journal on Selected Areas in Communications.

[3]  José Roberto Sanches Mantovani,et al.  Detecting and Locating Non-Technical Losses in Modern Distribution Networks , 2018, IEEE Transactions on Smart Grid.

[4]  Wei Liang,et al.  ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid , 2019, IEEE Transactions on Information Forensics and Security.

[5]  Bum-Joo Lee,et al.  Extended smart meters-based remote detection method for illegal electricity usage , 2013 .

[6]  Yang Xiao,et al.  A novel detector to detect colluded non-technical loss frauds in smart grid , 2017, Comput. Networks.

[7]  Yang Xiao,et al.  Non-repudiation in neighborhood area networks for smart grid , 2013, IEEE Communications Magazine.

[8]  Yang Xiao,et al.  Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids , 2013, IEEE Transactions on Smart Grid.

[9]  Chao Liu,et al.  An unsupervised anomaly detection approach using energy-based spatiotemporal graphical modeling , 2017 .

[10]  Sieh Kiong Tiong,et al.  Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines , 2010, IEEE Transactions on Power Delivery.

[11]  Yang Xiao,et al.  A survey of intrusion detection systems in smart grid , 2017, Int. J. Sens. Networks.

[12]  P. R. Mahalingam,et al.  Predicting Financial Savings Decisions Using Sigmoid Function and Information Gain Ratio , 2016 .

[13]  Alfred Blumstein,et al.  THE IDENTIFICATION OF “CAREER CRIMINALS” FROM “CHRONIC OFFENDERS” IN A COHORT , 1980 .

[14]  Alvaro A. Cárdenas,et al.  Evaluating Electricity Theft Detectors in Smart Grid Networks , 2012, RAID.

[15]  Yang Liu,et al.  Cyberthreat Analysis and Detection for Energy Theft in Social Networking of Smart Homes , 2015, IEEE Transactions on Computational Social Systems.

[16]  Mohammed G. H. al Zamil,et al.  A profile based data segmentation for in-home activity recognition , 2019, Int. J. Sens. Networks.

[17]  Pan Li,et al.  Privacy-Preserving Energy Theft Detection in Smart Grids: A P2P Computing Approach , 2013 .

[18]  Yang Xiao,et al.  Malicious device inspection home area network in smart grids , 2017, Int. J. Sens. Networks.

[19]  Syed Khaleel Ahmed,et al.  Detection of abnormalities and electricity theft using genetic Support Vector Machines , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[20]  Yang Xiao,et al.  NFD: Non-technical loss fraud detection in Smart Grid , 2017, Comput. Secur..

[21]  Sang-Yep Nam,et al.  A Novel Remote Detection Method of Illegal Electricity Usage Based on Smart Resistance , 2011 .

[22]  Xiaodong Liu,et al.  Home appliances classification based on multi-feature using ELM , 2018, Int. J. Sens. Networks.

[23]  Yang Xiao,et al.  Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid , 2018, Comput. Secur..

[24]  Bing Dong,et al.  A hybrid model approach for forecasting future residential electricity consumption , 2016 .

[25]  Alfred Blumstein,et al.  Delinquency Careers: Innocents, Desisters, and Persisters , 1985, Crime and Justice.

[26]  Mianxiong Dong,et al.  Game-theoretical energy management design for smart cyber-physical power systems , 2015 .

[27]  Megan C. Kurlychek,et al.  SCARLET LETTERS AND RECIDIVISM: DOES AN OLD CRIMINAL RECORD PREDICT FUTURE OFFENDING?* , 2006 .

[28]  Noureddine Hamdi,et al.  Distributed cooperative spectrum sensing with wireless sensor network cluster architecture for smart grid communications , 2017, Int. J. Sens. Networks.

[29]  G. Grimmett,et al.  Probability and random processes , 2002 .

[30]  Yang Xiao,et al.  Design a fast Non-Technical Loss fraud detector for smart grid , 2016, Secur. Commun. Networks.

[31]  Megan C. Kurlychek,et al.  Enduring Risk? Old Criminal Records and Predictions of Future Criminal Involvement , 2007 .

[32]  D. Farrington,et al.  Prediction in criminology , 1986 .

[33]  Ann Dryden Witte,et al.  Predicting Recidivism Using Survival Models , 1988 .

[34]  Jun Luo,et al.  Energy-theft detection issues for advanced metering infrastructure in smart grid , 2014, Tsinghua Science and Technology.

[35]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[36]  Chris Chatfield,et al.  Holt‐Winters Forecasting: Some Practical Issues , 1988 .

[37]  A.H. Nizar,et al.  Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method , 2008, IEEE Transactions on Power Systems.

[38]  Nikos D. Hatziargyriou,et al.  Review of non-technical loss detection methods , 2018 .

[39]  Chan-Nan Lu,et al.  Non-technical loss detection using state estimation and analysis of variance , 2013, 2013 IEEE Power & Energy Society General Meeting.