A novel detector to detect colluded non-technical loss frauds in smart grid

被引:27
作者
Han, Wenlin [2 ]
Xiao, Yang [1 ,2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Smart grid security; Smart meter; Non-technical loss; Colluded fraud; Malicious meter; V2G NETWORKS; ALGORITHM; SECURITY; ISSUES;
D O I
10.1016/j.comnet.2016.10.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Non-Technical Loss (NTL) fraud occurs when a fraudster tampers with a smart meter so that the meter registers less electricity consumption than the actual consumed amount, and therefore the utility becomes the victim who suffers the corresponding economic loss. In the literature, many detection schemes have been proposed to detect NTL frauds. However, some NTL frauds are far more complicated than what the existing schemes expect. We recently discovered a new potential type of frauds, a variant of NTL frauds, called Colluded Non-Technical Loss (CNTL) frauds in the Smart Grid. In a CNTL fraud, multiple fraudsters can co-exist or collaborate to commit the fraud. Existing detection schemes cannot detect CNTL frauds since these methods do not consider the co-existing or collaborating fraudsters, and therefore cannot distinguish one from many fraudsters. In this paper, we propose a CNTL fraud detector to detect CNTL frauds. The proposed method can quickly detect a tampered meter based on recursive least squares. After identifying the tampered meter, the proposed scheme can detect different fraudsters using mathematical models. Our experiments show that our method is effective in detecting CNTL frauds. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:19 / 31
页数:13
相关论文
共 47 条
[1]  
[Anonymous], P 11 INT C ENT INF S
[2]  
[Anonymous], 2 INT C CLOUD COMP S
[3]  
[Anonymous], P 50 INT C COMM ICC
[4]  
[Anonymous], MONITORING ADV METER
[5]  
Baig Zubair A., 2012, International Journal of Security and Networks, V7, P83
[6]  
Depuru SSSR., 2011, POWER SYSTEMS C EXPO, P1
[7]  
Detwiler P., 2013, ELECT THEFT BIGGER I
[8]   Secure and privacy-preserving information aggregation for smart grids [J].
Li F. ;
Luo B. ;
Liu P. .
International Journal of Security and Networks, 2011, 6 (01) :28-39
[9]   Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement [J].
Fu, Zhangjie ;
Ren, Kui ;
Shu, Jiangang ;
Sun, Xingming ;
Huang, Fengxiao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) :2546-2559
[10]   Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing [J].
Fu, Zhangjie ;
Sun, Xingming ;
Liu, Qi ;
Zhou, Lu ;
Shu, Jiangang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) :190-200