Rule-based classification of energy theft and anomalies in consumers load demand profile

被引:28
作者
Jain, Sonal [1 ]
Choksi, Kushan A. [2 ]
Pindoriya, Naran M. [1 ]
机构
[1] Indian Inst Technol Gandhinagar, Dept Elect Engn, Palaj 382355, Gujarat, India
[2] Indian Inst Technol, Dept Elect Engn, Mumbai 400076, Maharashtra, India
关键词
pattern classification; power consumption; data mining; security of data; learning (artificial intelligence); fraud; power system management; power engineering computing; data privacy; metering; power meters; knowledge based systems; meta data; classification block; rule-based classification; energy theft; consumers load demand profile; advanced metering infrastructure; AMI; consumers consumption patterns; power utilities; fraud detection methodology; data mining techniques; consumer consumption patterns; rule-base learning; validation technique; energy anomalies; abnormality type classification; validation block; privacy preservation; metadata; NONTECHNICAL LOSS ANALYSIS; NETWORKS;
D O I
10.1049/iet-stg.2019.0081
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The invent of advanced metering infrastructure (AMI) opens the door for a comprehensive analysis of consumers consumption patterns including energy theft studies, which were not possible beforehand. This study proposes a fraud detection methodology using data mining techniques such as hierarchical clustering and decision tree classification to identify abnormalities in consumer consumption patterns and further classify the abnormality type into the anomaly, fraud, high or low power consumption based on rule-based learning. The proposed algorithm uses real-time dataset of Nana Kajaliyala village, Gujarat, India. The focus has been on generalizing the algorithm for varied practical cases to make it adaptive towards non-malicious changes in consumer profile. Simultaneously, this study proposes a novel validation technique used for validation, which utilizes predicted profiles to ensure accurate bifurcation between anomaly and theft targets. The result exhibits high detection ratio and low false-positive ratio due to the application of appropriate validation block. The proposed methodology is also investigated from point of view of privacy preservation and is found to be relatively secure owing to low-sampling rates, minimal usage of metadata and communication layer. The proposed algorithm has an edge over state-of-the-art theft detection algorithms in detection accuracy and robustness towards outliers.
引用
收藏
页码:612 / 624
页数:13
相关论文
共 43 条
  • [1] Non-technical loss analysis and prevention using smart meters
    Ahmad, Tanveer
    [J]. RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2017, 72 : 573 - 589
  • [2] Amin S., 2012, INT C DEC GAM THEOR, P264
  • [3] GAME-THEORETIC MODELS OF ELECTRICITY THEFT DETECTION IN SMART UTILITY NETWORKS PROVIDING NEW CAPABILITIES WITH ADVANCED METERING INFRASTRUCTURE
    Amin, Saurabh
    Schwartz, Galina A.
    Cardenas, Alvaro A.
    Sastry, S. Shankar
    [J]. IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01): : 66 - 81
  • [4] [Anonymous], 2013, DAILY NEWS ANAL
  • [5] [Anonymous], 2009, PRIVACY NEW ENERGY I
  • [6] [Anonymous], 2014, CONDITIONAL GENERATI
  • [7] [Anonymous], 2017, WEO 2017 SPEC REP
  • [8] [Anonymous], 2009, P IET C EXH EL DISTR
  • [9] Brockwell Peter J, 2002, INTRO TIME SERIES FO, V2
  • [10] Cárdenas AA, 2012, ANN ALLERTON CONF, P1830, DOI 10.1109/Allerton.2012.6483444