Skip to main content

Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Grid

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10040))

Included in the following conference series:

Abstract

Electricity theft is the main form of Non-Technical Loss (NTL) fraud in the traditional power grid. In Smart Grid, NTL frauds co-occur with various attacks and have more variants. Time-based Pricing (TBP) is an attracting feature of Smart Grid, which supports real-time pricing and billing. However, adversaries could utilize TBP to commit NTL frauds, and we name them as TNTL frauds. Different from NTL frauds which “steal” electricity, TNTL frauds “steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The price of electricity in your state (2011). http://www.npr.org/sections/money/2011/10/27/141766341/the-price-of-electricity-in-your-state

  2. ANSI C12.19-2012 (2012). https://www.nema.org/Standards/ComplimentaryDocuments/C12-19-2012-Contents-and-Scope.pdf

  3. Emerging markets smart grid: Outlook 2015, December 2014. http://www.northeast-group.com/reports/Brochure-Emerging%20Markets%20Smart%20Grid-Outlook%202015-Northeast%20Group.pdf

  4. Costa, B.C., Alberto, B.L.A., Portela, A.M., Maduro, W., Eler, E.O.: Fraud detection in electric power distribution networks using an ann-based knowledge-discover process. Int. J. Artif. Intell. Appl. (IJAIA) 4(6), 11–23 (2013)

    Google Scholar 

  5. Gao, J., Liu, J., Rajan, B., Nori, R., Fu, B., Xiao, Y., Liang, W., Chen, C.L.P.: SCADA communication and security issues. Secur. Commun. Netw. Secur. Comm. 7(1), 175–194 (2014)

    Article  Google Scholar 

  6. Han, W., Xiao, Y.: NFD: a practical scheme to detect non-technical loss fraud in smart grid. In: Proceedings of the 50th International Conference on Communications (ICC 2014), pp. 605–609, June 2014

    Google Scholar 

  7. Han, W., Xiao, Y.: IP\(^2\)DM for V2G networks in smart grid. In: Proceedings of the 50th International Conference on Communications (ICC 2015), pp. 782–787, June 2015

    Google Scholar 

  8. Han, W., Xiao, Y.: CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid. In: Yang, Q., Yu, W., Challal, Y. (eds.) WASA 2016. LNCS, vol. 9798, pp. 47–55. Springer, Heidelberg (2016). doi:10.1007/978-3-319-42836-9_5

    Chapter  Google Scholar 

  9. Han, W., Xiao, Y.: FNFD: a fast scheme to detect and verify non-technical loss fraud in smart grid. In: International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), Xi’an, China, pp. 24–34, 30 May 2016. doi:10.1145/2903185.2903188

  10. Han, W., Xiao, Y.: Non-technical loss fraud in advanced metering infrastructure in smart grid. In: The 2nd International Conference on Cloud Computing and Security (ICCCS 2016), Part II. LNCS, vol. 10040 (2016). doi:10.1007/978-3-319-48674-1_15

    Google Scholar 

  11. Han, W., Xiong, W., Xiao, Y., Ellabidy, M., Vasilakos, A.V., Xiong, N.: A class of non-statistical traffic anomaly detection in complex network systems. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW 2012), pp. 640–646, June 2012

    Google Scholar 

  12. Lin, C., Chen, S., Kuo, C., Chen, J.: Non-cooperative game model applied to an advanced metering infrastructure for non-technical loss screening in micro-distribution systems. IEEE Trans. Smart Grid 5(5), 2468–2469 (2014)

    Article  Google Scholar 

  13. Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.L.P.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutorials 14(4), pp. 981–997 (2012). Fourth Quarter

    Google Scholar 

  14. McDaniel, P., Smith, S.W.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3), 75–77 (2009)

    Article  Google Scholar 

  15. Werley, E., Angelos, S., Saavedra, O.R., Cortés, O.A.C., Souza, A.: Detection and identification of abnormalities in customer consumptions in power distribution systems. IEEE Trans. Power Delivery 26(4), 2436–2442 (2011)

    Article  Google Scholar 

  16. Xia, X., Liang, W., Xiao, Y., Zheng, M.: BCGI: a fast approach to detect malicious meters in neighborhood area smart grid. In: Proceedings of the 50th International Conference on Communications (ICC 2015), pp. 7228–7233, June 2015

    Google Scholar 

  17. Xia, X., Liang, W., Xiao, Y., Zheng, M., Xiao, Z.: Difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids. In: Proceedings of the 50th International Conference on Communications (ICC 2015), pp. 802–807, June 2015

    Google Scholar 

  18. Xiao, Z., Xiao, Y., Du, D.: Building accountable smart grids in neighborhood area networks. In: Proceedings of the IEEE Global Telecommunications Conference 2011 (GLOBECOM 2011), pp. 1–5, December 2011

    Google Scholar 

  19. Xiao, Z., Xiao, Y., Du, D.: Exploring malicious meter inspection in neighborhood area smart grids. IEEE Trans. Smart Grid 4(1), 214–226 (2013)

    Article  Google Scholar 

  20. Xiao, Z., Xiao, Y., Du, D.: Non-repudiation in neighborhood area networks for smart grid. IEEE Commun. Mag. 51(1), 18–26 (2013)

    Article  Google Scholar 

  21. Yang, W., Wang, Q., Qi, Y., Sun, S.: Time synchronization attacks in ieee802.15.4e networks. In: Proceedings of the 2014 International Conference Identification, Information and Knowledge in the Internet of Things (IIKI 2014), pp. 166–169, October 2014

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by the National Nature Science Foundation of China under the Grant 61374200, and the National Science Foundation (NSF) under Grant CNS-1059265.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Han, W., Xiao, Y. (2016). Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Grid. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48674-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48673-4

  • Online ISBN: 978-3-319-48674-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics