FPETD: Fault-Tolerant and Privacy-Preserving Electricity Theft Detection

被引:4
作者
Dong, Siliang [1 ]
Zeng, Zhixin [1 ]
Liu, Yining [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Comp & Informat Secur, Guilin, Peoples R China
基金
中国国家自然科学基金;
关键词
37;
D O I
10.1155/2021/6650784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electricity theft occurs from time to time in the smart grid, which can cause great losses to the power supplier, so it is necessary to prevent the occurrence of electricity theft. Using machine learning as an electricity theft detection tool can quickly lock participants suspected of electricity theft; however, directly publishing user data to the detector for machine learning-based detection may expose user privacy. In this paper, we propose a real-time fault-tolerant and privacy-preserving electricity theft detection (FPETD) scheme that combines n-source anonymity and a convolutional neural network (CNN). In our scheme, we designed a fault-tolerant raw data collection protocol to collect electricity data and cut off the correspondence between users and their data, thereby ensuring the fault tolerance and data privacy during the electricity theft detection process. Experiments have proven that our dimensionality reduction method makes our model have an accuracy rate of 92.86% for detecting electricity theft, which is much better than others.
引用
收藏
页数:11
相关论文
共 36 条
  • [1] [Anonymous], 2016, ARXIV PREPRINT ARXIV
  • [2] Arora I, 2016, PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), P51, DOI 10.1109/IC3I.2016.7917934
  • [3] A Market Framework for Decentralized Congestion Management in Smart Distribution Grids Considering Collaboration Among Electric Vehicle Aggregators
    Asrari, Arash
    Ansari, Meisam
    Khazaei, Javad
    Fajri, Poria
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (02) : 1147 - 1158
  • [4] Online electricity theft detection and prevention scheme for smart cities
    Ballal, Makarand Sudhakar
    Suryawanshi, Hiralal
    Mishra, Mahesh Kumar
    Jaiswal, Gajanan
    [J]. IET SMART CITIES, 2020, 2 (03) : 155 - 164
  • [5] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [6] An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks
    Chen, Chien-Ming
    Xiang, Bing
    Wu, Tsu-Yang
    Wang, King-Hang
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (07):
  • [7] Chen G., 2019, INT C MED IM PHYS EN, DOI [10.1109/ICMIPE47306.2019.9098216, DOI 10.1109/ICMIPE47306.2019.9098216]
  • [8] Lightweight Privacy-Preserving Raw Data Publishing Scheme
    Chen, Jingxue
    Liu, Gao
    Liu, Yining
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 2170 - 2174
  • [9] Chen SW, 2019, PROCEEDINGS OF 2019 IEEE 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2019), P308, DOI [10.1109/ICCSNT47585.2019.8962432, 10.1109/iccsnt47585.2019.8962432]
  • [10] England Brandon S., 2019, 2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia), P2440, DOI 10.1109/ISGT-Asia.2019.8881529