Skip to main content

Advertisement

Log in

Interpolation search-based malicious user detection in smart grids

  • Original Paper
  • Published:
Electrical Engineering Aims and scope Submit manuscript

Abstract

Nowadays energy theft in smart grids has led to severe economic loss to utility companies and countries across the world. Malicious users who illegally steal electricity from the distribution centre without getting noticed lead to unplanned power loss and blackouts in many developing countries. In order to prevent and find the malicious users who steal electricity, a system must be introduced in such a way that the malicious users will be identified easily in a large neighbourhood area network. In this work, to detect energy theft, a decision-making system using the Hadoop multi-cluster model with interpolation search algorithm has been proposed to calculate the actual energy consumed by every user and classify the user as the honest user or malicious user. The proposed interpolation-based approach is lightweight in its operation, which reduces the time complexity for predicting the malicious users in the NAN. The simulation results indicate that the proposed algorithm performs better than the existing approaches in terms of number of inspection steps, execution speed, detection accuracy and false-negative rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. R. Katakey (2014) India fights to keep the lights on. Bloomberg Businessweek. https://www.bloomberg.com/news/articles/2014-06-05/india-fights-electricity-theft-as-modi-pledges-energy-upgrade

  2. Ghasemi A, Gitizadeh M (2018) Detection of illegal consumers using pattern classification approach combined with Levenberg–Marquardt method in smart grid. Int J Electr Power Energy Syst 99:363–375. https://doi.org/10.1016/j.ijepes.2018.01.036

    Article  Google Scholar 

  3. Hasan M, Toma R, Nahid A, Islam M, Kim J (2019) Electricity theft detection in smart grid systems: a CNN-LSTM based approach. Energies 12(17):3310

    Article  Google Scholar 

  4. Chandel P, Thakur T (2019) Smart meter data analysis for electricity theft detection using neural networks. Adv Sci Technol Eng Syst J 4:161–168. https://doi.org/10.25046/aj040420

    Article  Google Scholar 

  5. McLaughlin S, Holbert B, Fawaz A et al (2013) A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J Sel Areas Commun 31:1319–1330. https://doi.org/10.1109/jsac.2013.130714

    Article  Google Scholar 

  6. Xiao F, Ai Q (2018) Electricity theft detection in smart grid using random matrix theory. IET Gener Transm Distrib 12:371–378. https://doi.org/10.1049/iet-gtd.2017.0898

    Article  Google Scholar 

  7. Yuan L, Kant K, Mohapatra P, Chuah C-N (2006) DoX: A peer-to-peer antidote for DNS cache poisoning attacks. In: 2006 IEEE international conference on communications. https://doi.org/10.1109/icc.2006.255120.

  8. Naim K, Khelifa B, Fateh B (2020) A Cryptographic-based approach for electricity theft detection in smart grid. Comput Mater Contin 62:97–117. https://doi.org/10.32604/cmc.2020.09391

    Article  Google Scholar 

  9. Nagi J, Yap KS, Tiong SK et al (2010) Nontechnical loss detection for metered customers in power utility using support vector machines. IEEE Trans Power Deliv 25:1162–1171. https://doi.org/10.1109/tpwrd.2009.2030890

    Article  Google Scholar 

  10. Mccary E, Xiao Y (2017) Malicious device inspection home area network in smart grids. Int J Sens Netw 25:45. https://doi.org/10.1504/ijsnet.2017.086791

    Article  Google Scholar 

  11. Xia X, Liang W, Xiao Y, et al (2015) A difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids. In: 2015 IEEE international conference on communications (ICC). https://doi.org/10.1109/icc.2015.7248420.

  12. Xiao Z, Xiao Y, Du DH-C (2013) Exploring malicious meter inspection in neighborhood area smart grids. IEEE Trans Smart Grid 4:214–226. https://doi.org/10.1109/tsg.2012.2229397

    Article  Google Scholar 

  13. Xia X, Liang W, Xiao Y, Zheng M (2015) BCGI: A fast approach to detect malicious meters in neighborhood area smart grid. In: 2015 IEEE international conference on communications (ICC). https://doi.org/10.1109/icc.2015.7249480.

  14. Lo C-H, Ansari N (2013) CONSUMER: a novel hybrid intrusion detection system for distribution networks in smart grid. IEEE Trans Emerg Top Comput 1:33–44. https://doi.org/10.1109/tetc.2013.2274043

    Article  Google Scholar 

  15. Xia X, Xiao Y, Liang W (2019) ABSI: an adaptive binary splitting algorithm for malicious meter inspection in smart grid. IEEE Trans Inf Forensics Secur 14:445–458. https://doi.org/10.1109/tifs.2018.2854703

    Article  Google Scholar 

  16. Xia X, Xiao Y, Liang W, Zheng M (2018) GTHI: A Heuristic algorithm to detect malicious users in smart grids. IEEE Trans Netw Sci Eng. https://doi.org/10.1109/tnse.2018.2855139

    Article  Google Scholar 

  17. Khoo B, Cheng Y (2011) Using RFID for anti-theft in a Chinese electrical supply company: a cost-benefit analysis. In: 2011 wireless telecommunications symposium (WTS). https://doi.org/10.1109/wts.2011.5960892.

  18. Selvapriya C (2014) Competent approach for inspecting electricity theft. Int J Innov Res Sci Eng Technol 3:1763–1766

    Google Scholar 

  19. Jokar P, Arianpoo N, Leung VCM (2016) Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans Smart Grid 7:216–226. https://doi.org/10.1109/tsg.2015.2425222

    Article  Google Scholar 

  20. Jindal A, Dua A, Kaur K et al (2016) Decision tree and SVM-based data analytics for theft detection in smart grid. IEEE Trans Ind Inf 12:1005–1016. https://doi.org/10.1109/tii.2016.2543145

    Article  Google Scholar 

  21. Nagi J, Yap KS, Tiong SK, et al (2008) Detection of abnormalities and electricity theft using genetic support vector machines. In: TENCON 2008–2008 IEEE region 10 conference. https://doi.org/10.1109/tencon.2008.4766403.

  22. Han W, Xiao Y (2014) NFD: A practical scheme to detect non-technical loss fraud in smart grid. In: 2014 IEEE international conference on communications (ICC). Doi: https://doi.org/10.1109/icc.2014.6883385.

  23. Khan Z, Adil M, Javaid N et al (2020) Electricity theft detection using supervised learning techniques on smart meter data. Sustainability 12:8023. https://doi.org/10.3390/su12198023

    Article  Google Scholar 

  24. Yip SC, Wong K, Hew WP, Gan MT, Phan RCW, Tan SW (2017) Detection of energy theft and defective smart meters in smart grids using linear regression. Electr Power Energy Syst 91:230–240. https://doi.org/10.1016/j.ijepes.2017.04.005

    Article  Google Scholar 

  25. Punmiya R, Choe S (2019) Energy theft detection using gradient boosting theft detector with feature engineering-based preprocessing. IEEE Trans Smart Grid 10:2326–2329. https://doi.org/10.1109/tsg.2019.2892595

    Article  Google Scholar 

  26. Ismail M, Shaaban M, Naidu M, Serpedin E (2020) Deep learning detection of electricity theft cyber-attacks in renewable distributed generation. IEEE Trans Smart Grid 11:3428–3437. https://doi.org/10.1109/tsg.2020.2973681

    Article  Google Scholar 

  27. Chassin D (2010) What can the smart grid do for you? And what can you do for the smart grid? Electr J 23:57–63. https://doi.org/10.1016/j.tej.2010.05.001

    Article  Google Scholar 

  28. Otuoze A, Mustafa M, Mohammed O et al (2019) Electricity theft detection by sources of threats for smart city planning. IET Smart Cities 1:52–60. https://doi.org/10.1049/iet-smc.2019.0045

    Article  Google Scholar 

  29. Biswas P, Cai H, Zhou B et al (2020) Electricity theft pinpointing through correlation analysis of master and individual meter readings. IEEE Trans Smart Grid 11:3031–3042. https://doi.org/10.1109/tsg.2019.2961136

    Article  Google Scholar 

  30. Lazaropoulos A (2018) Detection of energy theft in overhead low-voltage power grids—the hook style energy theft in the smart grid era. Trends in Renewable Energy 5:12–46. https://doi.org/10.17737/tre.2019.5.1.0081

    Article  Google Scholar 

  31. Tariq M, Poor H (2016) Electricity theft detection and localization in grid-tied microgrids. IEEE Trans Smart Grid. https://doi.org/10.1109/tsg.2016.2602660

    Article  Google Scholar 

  32. Ting M, Nianrong Z, Feng G, Mengyin R, Hong W (2013) An energy theft detection scheme of smart grid. Smart Grid 03:164–167. https://doi.org/10.12677/sg.2013.36030

    Article  Google Scholar 

  33. Barzamini H, Ghassemian M (2019) Comparison analysis of electricity theft detection methods for advanced metering infrastructure in smart grid. Int J Electron Secur Digit Forensics 11:265. https://doi.org/10.1504/ijesdf.2019.100475

    Article  Google Scholar 

  34. UCI Machine Learning Repository Individual Household Electric Power Consumption Data Set, 2012. https://archive.ics.uci.edu/ml/datasets/Individual+household+electric+power+consumption

  35. (2020) Energy topics. In: Energy—European commission. https://ec.europa.eu/energy/topics/markets-andconsumers/smart-grids-and-meters_en. Accessed 15 Nov 2020

  36. (2020) Smart Grid Neighborhood-Area Network Standard Charges Ahead. In: Electronic Design. https://www.electronicdesign.com/news/trends-analysis/article/21799329/smart-grid-neighborhoodarea-network-standard-charges-ahead. Accessed 15 Nov 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Yogarajan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yogarajan, G., Vinosh, J.A., Prakash, S.K.A. et al. Interpolation search-based malicious user detection in smart grids. Electr Eng 103, 1899–1909 (2021). https://doi.org/10.1007/s00202-020-01196-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00202-020-01196-z

Keywords

Navigation