Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks

被引:66
作者
Ibrahem, Mohamed I. [1 ]
Nabil, Mahmoud [2 ]
Fouda, Mostafa M. [3 ,4 ]
Mahmoud, Mohamed M. E. A. [1 ]
Alasmary, Waleed [5 ]
Alsolami, Fawaz [6 ]
机构
[1] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[2] North Carolina A&T Univ, Dept Elect & Comp Engn, Greensboro, NC 27411 USA
[3] Idaho State Univ, Coll Sci & Engn, Dept Elect & Comp Engn, Pocatello, ID 83209 USA
[4] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11629, Egypt
[5] Umm Al Qura Univ, Dept Comp Engn, Mecca 21421, Saudi Arabia
[6] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21341, Saudi Arabia
关键词
Monitoring; Computational modeling; Privacy; Cryptography; Load modeling; Power demand; Machine learning; Dynamic billing; electricity theft detection; functional encryption (FE); machine learning; privacy preservation; SCHEME;
D O I
10.1109/JIOT.2020.3026692
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In advanced metering infrastructure (AMI), smart meters (SMs) are installed at the consumer side to send fine-grained power consumption readings periodically to the system operator (SO) for load monitoring, energy management, and billing. However, fraudulent consumers launch electricity theft cyber attacks by reporting false readings to reduce their bills illegally. These attacks do not only cause financial losses but may also degrade the grid performance because the readings are used for grid management. To identify these attackers, the existing schemes employ machine-learning models using the consumers fine-grained readings, which violates the consumers privacy by revealing their lifestyle. In this article, we propose an efficient scheme that enables the SO to detect electricity theft, compute bills, and monitor load while preserving the consumers privacy. The idea is that SMs encrypt their readings using functional encryption (FE), and the SO uses the ciphertexts to: 1) compute the bills following the dynamic pricing approach; 2) monitor the grid load; and 3) evaluate a machine-learning model to detect fraudulent consumers, without being able to learn the individual readings to preserve consumers privacy. We adapted an FE scheme so that the encrypted readings are aggregated for billing and load monitoring and only the aggregated value is revealed to the SO. Also, we exploited the inner-product operations on encrypted readings to evaluate a machine-learning model to detect fraudulent consumers. The real data set is used to evaluate our scheme, and our evaluations indicate that our scheme is secure and can detect fraudulent consumers accurately with low communication and computation overhead.
引用
收藏
页码:1243 / 1258
页数:16
相关论文
共 36 条
[1]   Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings [J].
Abdalla, Michel ;
Catalano, Dario ;
Fiore, Dario ;
Gay, Romain ;
Ursu, Bogdan .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :597-627
[2]   Simple Functional Encryption Schemes for Inner Products [J].
Abdalla, Michel ;
Bourse, Florian ;
De Caro, Angelo ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :733-751
[3]   Fully Secure Functional Encryption for Inner Products, from Standard Assumptions [J].
Agrawal, Shweta ;
Libert, Benoit ;
Stehle, Damien .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :333-362
[4]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[5]   EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks [J].
Alsharif, Ahmad ;
Nabil, Mahmoud ;
Tonyali, Samet ;
Mohammed, Hawzhin ;
Mahmoud, Mohamed ;
Akkaya, Kemal .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :3309-3321
[6]  
[Anonymous], ELECTRICITY THEFTS S
[7]  
[Anonymous], 2016, TENSORFLOW LARGE SCA
[8]  
[Anonymous], Irish social science data archive
[9]  
Arslan L. M., 2018, 2018 26 SIGN PROC CO, P1, DOI DOI 10.1109/SIU.2018.8404322
[10]   Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption [J].
Baltico, Carmen Elisabetta Zaira ;
Catalano, Dario ;
Fiore, Dario ;
Gay, Romain .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :67-98