Abstract
The Internet of Things (IoT)-based advanced metering infrastructure (AMI) provides real-time information from smart meters to both grid operators and customers. The meter data is collected and stored digitally and is transmitted through wireless networks. With the remarkably increasing usage of smart grid systems over conventional utility grid networks, it becomes imperative to ensure that such a system is secured from potential threats. Energy theft by meter tampering and false data injection (FDI) attacks are the most common forms of attacks that attempt to compromise the security of a smart grid system. In this paper, we introduce a new machine learning-based multi-model prediction system known as intelligent energy cyber physical systems (iECPS) for smart energy theft detection and verification. Furthermore, the system has more robustness since a verification from the users themselves (through e-mail) is considered as final validation to decide further course of action. In addition, to successfully detect and prevent FDI attack during transmission of data from sub-meters or meters to smart grids, a watermarking and de-watermarking system is also proposed. It involves encryption and decryption of meter data by means of a PN-sequence available at both ends. The proposed scheme detects electricity theft performed by tapping on the user’s smart meter with high accuracy. Also, the watermarking scheme discerns FDI attacks while maintaining data consistency, with a significant similarity factor and low channel SNR. The proposed system has accuracy of 99.77%, precision 0.998, recall 1.0, F1 score 0.999 and FPR 0.999 which has better results than similar previous works.
Similar content being viewed by others
References
Dileep G (2020) A survey on smart grid technologies and applications, Renewable energy, vol. 146, pp. 2589 – 2625, [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0960148119312790
Mohanty SP (2020) Advances in transportation cyber-physical system (t-cps). IEEE Consumer Electron Mag 9(4):4–6
Jain A, Joshi AM (2019) Device authentication in iot using reconfigurable puf, In: 2019 2nd IEEE middle east and North Africa communications conference (MENACOMM). IEEE 1–4
Gunduz MZ, Das R (2020) Cyber-security on smart grid: threats and potential solutions. Comput Netw 169:107094
Abdollahy S, Mammoli A, Cheng F, Ellis A, Johnson J (2013) Distributed compensation of a large intermittent energy resource in a distribution feeder, In: 2013 IEEE PES innovative smart grid technologies conference (ISGT) pp 1–6
Hossain E, Khan I, Un-Noor F, Sikander SS (2018) Application of big data and machine learning in smart grid, and associated security concerns: A review. IEEE 7:13 960-13 988
Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Sec Privacy 9(3):49–51
Miller B, Rowe DC (2012) A survey scada of and critical infrastructure incidents, In: RIIT ’12
Bronk C, Tikk-Ringas E (2013) The cyber attack on saudi aramco. Survival 55(2):81–96
Case DU (2016) Analysis of the cyber-attack on the Ukrainian power grid. Electr Inf Shar Anal Cent 21:388
Lee R, Assante M, Conway T (2016) Analysis of the cyber attack on the ukrainian power grid, In: SANS industrial control systems
Pandey RK, Misra M (2016) Cyber security threats - smart grid infrastructure, In: 2016 national power systems conference (NPSC), pp 1–6
Huang X, Qin Z, Liu H (2018) A survey on power grid cyber security: from component-wise vulnerability assessment to system-wide impact analysis. IEEE Access 6:69 023-69 035
Lighari SN, Jensen BB, Hussain DMA, Shaikh AA (2014) Attacks and their defenses for advanced metering infrastructure. In: 2014 6th international congress on ultra modern telecommunications and control systems and workshops (ICUMT), pp 148–151
Rao NSV, Poole SW, Ma CYT, He F, Zhuang J, Yau DKY (2016) Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal Official Publ Soc Risk Anal 36(4):694–710
Gholami A, Shekari T, Amirioun MH, Aminifar F, Amini MH, Sargolzaei A (2018) Toward a consensus on the definition and taxonomy of power system resilience. IEEE Access 6:32 035-32 053
Zhu B, Joseph A, Sastry S (2011) A taxonomy of cyber attacks on scada systems, In: Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing, ser. ITHINGSCPSCOM ’11. USA: IEEE Computer Society, pp 380–388. [Online]. Available: https://doi.org/10.1109/iThings/CPSCom.2011.34
Camarinha-Matos L (2016) Collaborative smart grids - a survey on trends. Renew Sustain Energy Rev 65:283–294, 11
Zhou Y, Chen X, Zomaya AY, Wang L, Hu S (2015) A dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home. IEEE Trans Emerg Top Comput 3(4):502–513
Costa B, Alberto B, Portela A, W M, Eler E. O. (2013) Fraud detection in electric power distribution networks using an ann-based knowledge-discovery process. Int J Artif Intell Appl 4:17–23, 11
Jokar P, Arianpoo N, Leung VCM (2016) Electricity theft detection in ami using customers’ consumption patterns. IEEE Trans Smart Grid 7(1):216–226
McLaughlin S, Holbert B, Fawaz A, Berthier R, Zonouz S (2013) A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J Sel Areas Commun 31(7):1319–1330
Yu W, Bhattarai S, Ge L (2012) A novel architecture against false data injection attacks in smart grid. In: Communication and information systems security symposium, pp 907–911
Joshi AM (2019) Hardware implementation of audio watermarking based on dwt transform, In: Ethics, laws, and policies for privacy, security, and liability. IntechOpen,
Joshi A, Mishra V, Patrikar R (2012) Real time implementation of digital watermarking algorithm for image and video application. Watermarking 2:65
Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2011) Smart grid data integrity attacks: characterizations and countermeasures, In: IEEE international conference on smart grid communications (SmartGridComm) 2011:232–237
Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet Things J 4(6):1844–1852
Joshi AM, Jain P, Mohanty SP, Agrawal N (2020) iglu 2.0: A new wearable for accurate non-invasive continuous serum glucose measurement in iomt framework. IEEE Trans Consum Electron 66(4):327–335
Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735
Sharma G, Parashar A, Joshi AM (2021) Dephnn: a novel hybrid neural network for electroencephalogram (eeg)-based screening of depression. Biomed Signal Process Control 66:102393
Chung J, Gülçehre Ç, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling, In: CoRR, vol. [Online]. Available: arXiv:1412.3555
Arghandeh R, Mili L, Mehrmanesh L (2016) On the definition of cyber-physical resilience in power systems. Renew Sustain Energy Rev 58:1060–1069
Huang X, Qin Z, Liu H (2018) A survey on power grid cyber security: from component-wise vulnerability assessment to system-wide impact analysis. IEEE Access PP:1–1, 11
Kappagantu R, Daniel SA (2018) Challenges and issues of smart grid implementation: a case of indian scenario. J Elect Syst Inf Technol 5:453–467
Joshi AM, Mishra V, Patrikar RM (2016) Fpga prototyping of video watermarking for ownership verification based on h. 264/avc. Multimed Tools Appl 75(6):3121–3144
Vyas DG, Trivedi N, Pandya V, Bhatt P, Pujara A (2019) Future challenges and issues in evolution of the smart grid and recommended possible solutions. In: 2019 IEEE 16th India council international conference (INDICON), pp 1–4
Ganguly P, Nasipuri M, Dutta S (2019) Challenges of the existing security measures deployed in the smart grid framework. In: 2019 IEEE 7th international conference on smart energy grid engineering (SEGE), pp 1–5
Li W, Logenthiran T, Phan V-T, Woo WL (2019) A novel smart energy theft system (sets) for iot-based smart home. IEEE Internet Things J 6(3):5531–5539
Bhattarai S, Ge L, Yu W (2012) A novel architecture against false data injection attacks in smart grid, In: 2012 IEEE international conference on communications (ICC). IEEE, pp 907–911
Lichman M et al (2013) Electricity load diagrams 2011–2014 data set. Online. Available: https://archive.ics.uci.edu/ml/datasets/ElectricityLoadDiagrams20112014
Liu Y, Zhou Y, Hu S (2018) Combating coordinated pricing cyberattack and energy theft in smart home cyber-physical systems. IEEE Trans Comput Aided Des Integr Circuits Syst 37(3):573–586
Mahapatra K, Chaudhuri NR (2019) Online robust pca for malicious attack-resilience in wide-area mode metering application. IEEE Trans Power Syst 34(4):2598–2610
Anwar A, Mahmood AN (2016) Stealthy and blind false injection attacks on scada ems in the presence of gross errors, In: 2016 IEEE power and energy society general meeting (PESGM). IEEE pp 1–5
Joshi AM et al (2016) Dwt-dct based blind audio watermarking using arnold scrambling and cyclic codes, In: 2016 3rd international conference on signal processing and integrated networks (SPIN). IEEE, pp 79–84
Joshi A, Mishra V, Patrikar R (2015) Real time implementation of integer DCT based video watermarking architecture. Int Arab J Inf Technol 12:741–747
A. Amara korba and N. El Islem karabadji, (2019) Smart grid energy fraud detection using svm. In: 2019 international conference on networking and advanced systems (ICNAS), pp 1–6
CER Smart Metering Project - electricity customer behaviour trial, 2009-2010 [dataset]. Irish social science data archive. SN: 0012-00, 2013. [Online]. Available: https://www.ucd.ie/issda/data/commissionforenergyregulationcer/
Manocha S, Bansal V, Kaushal I, Bhat A (2020) Efficient power theft detection using smart meter data in advanced metering infrastructure. In: 2020 4th international conference on intelligent computing and control systems (ICICCS), pp 765–770
Open Energy Information [Online]. Available:. [Online]. Available: http://en.openei.org/datasets/dataset/commercial-and-residential-hourly-load-profiles-for-all-tmy3-locations-in-the-united-states
de Souza MA, Pereira JL, Alves GD, de Oliveira BC, Melo ID, Garcia PA (2020) Detection and identification of energy theft in advanced metering infrastructures. Elect Power Syst Res 182:May
Hasan MN, Toma RN, Nahid A-A, Islam MMM, Kim J-M (2019) Electricity theft detection in smart grid systems: a cnn-lstm based approach. Energies 12(17):3310
DataFountain. [Online]. Available, Dec, (2016) Online. Available: https://www.datafountain.cn./competitions/241/details
Jindal A, Dua A, Kaur K, Singh M, Kumar N, Mishra S (2016) Decision tree and svm-based data analytics for theft detection in smart grid. IEEE Trans Industr Inf 12(3):1005–1016
Yao D, Wen M, Liang X, Fu Z, Zhang K, Yang B (2019) Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J 6(5):7659–7669
Yu Z-H, Chin W-L (2015) Blind false data injection attack using pca approximation method in smart grid. IEEE Trans Smart Grid 6(3):1219–1226
Anwar A, Mahmood AN, Pickering M (2017) Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements. J Comput Syst Sci 83(1):58–72 [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0022000016300174
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jain, H., Kumar, M. & Joshi, A.M. Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection. Electr Eng 104, 331–346 (2022). https://doi.org/10.1007/s00202-021-01380-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00202-021-01380-9