Skip to main content

Advanced Monitoring Based Intrusion Detection System for Distributed and Intelligent Energy Theft: DIET Attack in Advanced Metering Infrastructure

  • Chapter
  • First Online:
Transactions on Computational Science XXXI

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 10730))

Abstract

Power grid and energy theft has an eternal relationship. Though we moved towards Smart Grid, with an expectation for a more efficient, reliable and secure service, so does the attackers. Smart Grid and AMI systems incorporate a good number of security measures, still it is open to various threats. Recent attacks on Smart Grids in U.S., Gulf State and Ukraine proved that the attacks on the grid have become more sophisticated. In this paper we have introduced a new, distributed and intelligent energy theft: DIET attack and proposed an advanced Intrusion Detection System to protect AMI system. The proposed IDS can perform a passive monitoring on the system as well as detect attackers. This features make this IDS more robust and reliable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jiang, R., Lu, R., Wang, Y., Luo, J., Shen, C., Shen, X.S.: Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Sci. Technol. 19(2), 105–120 (2014)

    Article  Google Scholar 

  2. Grochocki, D., Huh, J.H., Berthier, R., Bobba, R., Sanders, W.H., Crdenas, A.A., Jetcheva, J.G.: AMI threats, intrusion detection requirements and deployment recommendations. In: Smart Grid Communications (SmartGridComm), pp. 395–400. IEEE (2012)

    Google Scholar 

  3. McLaughlin, S., Podkuiko, D., McDaniel, P.: Energy theft in the advanced metering infrastructure. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 176–187. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14379-3_15

    Chapter  Google Scholar 

  4. ABB Inc.: Energy Efficiency in the Power Grid. ABB Inc., Fort Smith (2007)

    Google Scholar 

  5. U.S. Energy Information Administration. www.eia.gov

  6. Chakraborty, M., Deb, N., Chaki, N.: POMSec: Pseudo-opportunistic, multipath secured routing protocol for communications in smart grid. In: Saeed, K., Homenda, W., Chaki, R. (eds.) CISIM 2017. LNCS, vol. 10244, pp. 264–276. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59105-6_23

    Chapter  Google Scholar 

  7. Chakraborty, M., Chaki, N.: An IPv6 based hierarchical address configuration scheme for smart grid. In: Applications and Innovations in Mobile Computing (AIMoC), Kolkata, pp. 109–116 (2015). https://doi.org/10.1109/AIMOC.2015.7083838

  8. Nagi, J., Yap, K.S., Tiong, S.K., Ahmed, S.K., Mohamad, M.: Nontechnical loss detection for metered customers in power utility using support vector machines. IEEE Trans. Power Deliv. 25(2), 1162–1171 (2010)

    Article  Google Scholar 

  9. Depuru, S., Wang, L., Devabhaktuni, V.: Support vector machine based data classification for detection of electricity theft. In: IEEE/PES Power Systems Conference and Exposition (PSCE), pp. 1–8 (2011)

    Google Scholar 

  10. Depuru, S., Wang, L., Devabhaktuni, V., Green, R.C.: High performance computing for detection of electricity theft. Int. J. Electr. Power Energy Syst. 47, 21–30 (2013)

    Article  Google Scholar 

  11. McLaughlin, S., Holbert, B., Zonouz, S., Berthier, R.: AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures. In: IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp. 354–359 (2012)

    Google Scholar 

  12. Khoo, B., Cheng, Y.: Using RFID for anti-theft in a Chinese electrical supply company: A cost-benefit analysis. In: IEEE Wireless Telecommunications Symposium (WTS), pp. 1–6 (2011)

    Google Scholar 

  13. Xiao, Z., Xiao, Y., Du, D.H.C.: Non-repudiation in neighborhood area networks for smart grid. IEEE Commun. Mag. 51(1), 18–26 (2013)

    Article  Google Scholar 

  14. Amin, S., Schwartz, G.A., Tembine, H.: Incentives and security in electricity distribution networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 264–280. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34266-0_16

    Chapter  Google Scholar 

  15. Cardenas, A.A., Amin, S., Schwartz, G., Dong, R., Sastry, S.: A game theory model for electricity theft detection and privacy-aware control in AMI systems. In: IEEE 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1830–1837 (2012)

    Google Scholar 

  16. QualNet 5.2 Simulator: Scalable network technologies Inc.

    Google Scholar 

  17. Kim, M.: A survey on guaranteeing availability in smart grid communications. In: Advanced Communication Technology (ICACT), pp. 314–317 (2012)

    Google Scholar 

  18. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall Press, Upper Saddle River (2010). ISBN: 0136097049 9780136097044

    Google Scholar 

  19. Mashima, D., Cárdenas, A.A.: Evaluating electricity theft detectors in smart grid networks. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 210–229. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33338-5_11

    Chapter  Google Scholar 

  20. Jokar, P., Arianpoo, N., Leung, V.C.M.: Electricity theft detection in AMI using customers consumption patterns. IEEE Trans. Smart Grid 7(1), 216–226 (2016)

    Article  Google Scholar 

  21. Ruppe, R., Griswald, S., Walsh, P., Martin, R.: Near Term Digital Radio (NTDR) system. In: MILCOM 1997, pp. 1282–1287 (1997)

    Google Scholar 

  22. Berthier, R., Sanders, W.H.: Specification-based intrusion detection for advanced metering infrastructures. In: IEEE 17th Pacific Rim International Symposium on Dependable Computing, pp. 184–193 (2011)

    Google Scholar 

Download references

Acknowledgments

This work is a part of the Ph.D. work of the author, a Senior Research Fellow of Council of Scientific & Industrial Research (CSIR), Government of India. We would like to acknowledge CSIR, for providing the support required for carrying out the research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manali Chakraborty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer-Verlag GmbH Germany

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chakraborty, M. (2018). Advanced Monitoring Based Intrusion Detection System for Distributed and Intelligent Energy Theft: DIET Attack in Advanced Metering Infrastructure. In: Gavrilova, M., Tan, C., Chaki, N., Saeed, K. (eds) Transactions on Computational Science XXXI. Lecture Notes in Computer Science(), vol 10730. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-56499-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-56499-8_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-56498-1

  • Online ISBN: 978-3-662-56499-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics