Efficient and Privacy-Preserving ConvLSTM-Based Detection of Electricity Theft Cyber-Attacks in Smart Grids

被引:0
作者
Anin, Johnson [1 ]
Khan, Muhammad Jahanzeb [2 ]
Abdelsalam, Omar [3 ]
Nabil, Mahmoud [4 ]
Hu, Fei [1 ]
Alsharif, Ahmad [2 ,5 ]
机构
[1] Univ Alabama, Dept Elect & Comp Engn, Tuscaloosa, AL 35487 USA
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[3] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 35405 USA
[4] Univ North Carolina A&T, Elect & Comp Engn, Greensboro, NC 27411 USA
[5] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Banha 13511, Egypt
基金
美国国家科学基金会;
关键词
Smart grid; privacy preservation; electricity theft cyber-attacks; Conv-LSTM neural networks; functional encryption; FUNCTIONAL ENCRYPTION; SCHEME;
D O I
10.1109/ACCESS.2024.3478068
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Advanced Metering Infrastructure (AMI) networks, Smart Meters (SMs), are installed at consumers' houses, provide electric utilities with fine-grained power consumption data necessary for accurate billing, load monitoring, and energy management. However, utility companies are still subjected to electricity theft cyber-attacks in which fraudulent consumers may manipulate their reported readings and hence reduce their bills. Several ML-based electricity theft detectors have been proposed in the literature, however, they either do not capture well the deeper periodicity and temporal features in energy consumption data or violate consumers' privacy by running these models over unencrypted power consumption data. To address these challenges, we propose in this paper a Conv-LSTM-based detector that integrates a 2-D Convolutional Neural Network (CNN) model with a Long Short-Term Memory (LSTM) network to significantly improve the model's functionality and detection accuracy, specifically addressing the inherent periodicity and temporal dependencies in electricity consumption data. Moreover, to run the proposed model over encrypted 2D data and preserve consumers' privacy, we designed a novel lightweight Inner Product Functional Encryption (IPFE) scheme that allows SMs to send their encrypted power consumption data to the Electric Utility (EU) which can securely compute the first feature map of the first convolutional layer of the Conv-LSTM detector while preserving consumer privacy. Our analysis and experiments demonstrate that our scheme is secure and efficiently detecting fraudulent consumers with minimal overhead. In specific, our model achieves a Detection Rate (DR) of 92.95%, a False Alarm Rate (FAR) of 3.68%, and a High Detection (HD) rate of 89.27%, resulting in an overall Accuracy (ACC) of 94.65%. Moreover, our scheme achieves high Precision (PR) at 98.80% and a robust Area Under the Curve (AUC) value of 98.50%. These results highlight the effectiveness of our approach in enhancing both detection accuracy and reliability all while protecting consumers' privacy.
引用
收藏
页码:153089 / 153104
页数:16
相关论文
共 53 条
[1]   Simple Functional Encryption Schemes for Inner Products [J].
Abdalla, Michel ;
Bourse, Florian ;
De Caro, Angelo ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :733-751
[2]   Fully Secure Functional Encryption for Inner Products, from Standard Assumptions [J].
Agrawal, Shweta ;
Libert, Benoit ;
Stehle, Damien .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :333-362
[3]   Review of various modeling techniques for the detection of electricity theft in smart grid environment [J].
Ahmad, Tanveer ;
Chen, Huanxin ;
Wang, Jiangyu ;
Guo, Yabin .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2018, 82 :2916-2933
[4]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[5]   MDMS: Efficient and Privacy-Preserving Multidimension and Multisubset Data Collection for AMI Networks [J].
Alsharif, Ahmad ;
Nabil, Mahmoud ;
Sherif, Ahmed ;
Mahmoud, Mohamed ;
Song, Min .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :10363-10374
[6]   EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks [J].
Alsharif, Ahmad ;
Nabil, Mahmoud ;
Tonyali, Samet ;
Mohammed, Hawzhin ;
Mahmoud, Mohamed ;
Akkaya, Kemal .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :3309-3321
[7]   EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks [J].
Alsharif, Ahmad ;
Nabil, Mahmoud ;
Mahmoud, Mohamed M. E. A. ;
Abdallah, Mohamed .
IEEE ACCESS, 2019, 7 :27829-27845
[8]  
Alsharif A, 2018, 2018 25TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), P196, DOI 10.1109/ICT.2018.8464835
[9]  
[Anonymous], SMART GRID PRIVACY
[10]  
[Anonymous], 2012, CER smart metering project electricity customer behaviour trial dataset. 1st ed