Skip to main content

Advertisement

Log in

Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection

  • Original Paper
  • Published:
Electrical Engineering Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT)-based advanced metering infrastructure (AMI) provides real-time information from smart meters to both grid operators and customers. The meter data is collected and stored digitally and is transmitted through wireless networks. With the remarkably increasing usage of smart grid systems over conventional utility grid networks, it becomes imperative to ensure that such a system is secured from potential threats. Energy theft by meter tampering and false data injection (FDI) attacks are the most common forms of attacks that attempt to compromise the security of a smart grid system. In this paper, we introduce a new machine learning-based multi-model prediction system known as intelligent energy cyber physical systems (iECPS) for smart energy theft detection and verification. Furthermore, the system has more robustness since a verification from the users themselves (through e-mail) is considered as final validation to decide further course of action. In addition, to successfully detect and prevent FDI attack during transmission of data from sub-meters or meters to smart grids, a watermarking and de-watermarking system is also proposed. It involves encryption and decryption of meter data by means of a PN-sequence available at both ends. The proposed scheme detects electricity theft performed by tapping on the user’s smart meter with high accuracy. Also, the watermarking scheme discerns FDI attacks while maintaining data consistency, with a significant similarity factor and low channel SNR. The proposed system has accuracy of 99.77%, precision 0.998, recall 1.0, F1 score 0.999 and FPR 0.999 which has better results than similar previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

References

  1. Dileep G (2020) A survey on smart grid technologies and applications, Renewable energy, vol. 146, pp. 2589 – 2625, [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0960148119312790

  2. Mohanty SP (2020) Advances in transportation cyber-physical system (t-cps). IEEE Consumer Electron Mag 9(4):4–6

    Article  Google Scholar 

  3. Jain A, Joshi AM (2019) Device authentication in iot using reconfigurable puf, In: 2019 2nd IEEE middle east and North Africa communications conference (MENACOMM). IEEE 1–4

  4. Gunduz MZ, Das R (2020) Cyber-security on smart grid: threats and potential solutions. Comput Netw 169:107094

    Article  Google Scholar 

  5. Abdollahy S, Mammoli A, Cheng F, Ellis A, Johnson J (2013) Distributed compensation of a large intermittent energy resource in a distribution feeder, In: 2013 IEEE PES innovative smart grid technologies conference (ISGT) pp 1–6

  6. Hossain E, Khan I, Un-Noor F, Sikander SS (2018) Application of big data and machine learning in smart grid, and associated security concerns: A review. IEEE 7:13 960-13 988

    Google Scholar 

  7. Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Sec Privacy 9(3):49–51

    Article  Google Scholar 

  8. Miller B, Rowe DC (2012) A survey scada of and critical infrastructure incidents, In: RIIT ’12

  9. Bronk C, Tikk-Ringas E (2013) The cyber attack on saudi aramco. Survival 55(2):81–96

    Article  Google Scholar 

  10. Case DU (2016) Analysis of the cyber-attack on the Ukrainian power grid. Electr Inf Shar Anal Cent 21:388

  11. Lee R, Assante M, Conway T (2016) Analysis of the cyber attack on the ukrainian power grid, In: SANS industrial control systems

  12. Pandey RK, Misra M (2016) Cyber security threats - smart grid infrastructure, In: 2016 national power systems conference (NPSC), pp 1–6

  13. Huang X, Qin Z, Liu H (2018) A survey on power grid cyber security: from component-wise vulnerability assessment to system-wide impact analysis. IEEE Access 6:69 023-69 035

    Article  Google Scholar 

  14. Lighari SN, Jensen BB, Hussain DMA, Shaikh AA (2014) Attacks and their defenses for advanced metering infrastructure. In: 2014 6th international congress on ultra modern telecommunications and control systems and workshops (ICUMT), pp 148–151

  15. Rao NSV, Poole SW, Ma CYT, He F, Zhuang J, Yau DKY (2016) Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal Official Publ Soc Risk Anal 36(4):694–710

    Article  Google Scholar 

  16. Gholami A, Shekari T, Amirioun MH, Aminifar F, Amini MH, Sargolzaei A (2018) Toward a consensus on the definition and taxonomy of power system resilience. IEEE Access 6:32 035-32 053

    Article  Google Scholar 

  17. Zhu B, Joseph A, Sastry S (2011) A taxonomy of cyber attacks on scada systems, In: Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing, ser. ITHINGSCPSCOM ’11. USA: IEEE Computer Society, pp 380–388. [Online]. Available: https://doi.org/10.1109/iThings/CPSCom.2011.34

  18. Camarinha-Matos L (2016) Collaborative smart grids - a survey on trends. Renew Sustain Energy Rev 65:283–294, 11

    Article  Google Scholar 

  19. Zhou Y, Chen X, Zomaya AY, Wang L, Hu S (2015) A dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home. IEEE Trans Emerg Top Comput 3(4):502–513

    Article  Google Scholar 

  20. Costa B, Alberto B, Portela A, W M, Eler E. O. (2013) Fraud detection in electric power distribution networks using an ann-based knowledge-discovery process. Int J Artif Intell Appl 4:17–23, 11

    Google Scholar 

  21. Jokar P, Arianpoo N, Leung VCM (2016) Electricity theft detection in ami using customers’ consumption patterns. IEEE Trans Smart Grid 7(1):216–226

  22. McLaughlin S, Holbert B, Fawaz A, Berthier R, Zonouz S (2013) A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J Sel Areas Commun 31(7):1319–1330

    Article  Google Scholar 

  23. Yu W, Bhattarai S, Ge L (2012) A novel architecture against false data injection attacks in smart grid. In: Communication and information systems security symposium, pp 907–911

  24. Joshi AM (2019) Hardware implementation of audio watermarking based on dwt transform, In: Ethics, laws, and policies for privacy, security, and liability. IntechOpen,

  25. Joshi A, Mishra V, Patrikar R (2012) Real time implementation of digital watermarking algorithm for image and video application. Watermarking 2:65

    Google Scholar 

  26. Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2011) Smart grid data integrity attacks: characterizations and countermeasures, In: IEEE international conference on smart grid communications (SmartGridComm) 2011:232–237

  27. Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet Things J 4(6):1844–1852

    Article  Google Scholar 

  28. Joshi AM, Jain P, Mohanty SP, Agrawal N (2020) iglu 2.0: A new wearable for accurate non-invasive continuous serum glucose measurement in iomt framework. IEEE Trans Consum Electron 66(4):327–335

    Article  Google Scholar 

  29. Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735

    Article  Google Scholar 

  30. Sharma G, Parashar A, Joshi AM (2021) Dephnn: a novel hybrid neural network for electroencephalogram (eeg)-based screening of depression. Biomed Signal Process Control 66:102393

    Article  Google Scholar 

  31. Chung J, Gülçehre Ç, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling, In: CoRR, vol. [Online]. Available: arXiv:1412.3555

  32. Arghandeh R, Mili L, Mehrmanesh L (2016) On the definition of cyber-physical resilience in power systems. Renew Sustain Energy Rev 58:1060–1069

    Article  Google Scholar 

  33. Huang X, Qin Z, Liu H (2018) A survey on power grid cyber security: from component-wise vulnerability assessment to system-wide impact analysis. IEEE Access PP:1–1, 11

    Google Scholar 

  34. Kappagantu R, Daniel SA (2018) Challenges and issues of smart grid implementation: a case of indian scenario. J Elect Syst Inf Technol 5:453–467

    Article  Google Scholar 

  35. Joshi AM, Mishra V, Patrikar RM (2016) Fpga prototyping of video watermarking for ownership verification based on h. 264/avc. Multimed Tools Appl 75(6):3121–3144

    Article  Google Scholar 

  36. Vyas DG, Trivedi N, Pandya V, Bhatt P, Pujara A (2019) Future challenges and issues in evolution of the smart grid and recommended possible solutions. In: 2019 IEEE 16th India council international conference (INDICON), pp 1–4

  37. Ganguly P, Nasipuri M, Dutta S (2019) Challenges of the existing security measures deployed in the smart grid framework. In: 2019 IEEE 7th international conference on smart energy grid engineering (SEGE), pp 1–5

  38. Li W, Logenthiran T, Phan V-T, Woo WL (2019) A novel smart energy theft system (sets) for iot-based smart home. IEEE Internet Things J 6(3):5531–5539

    Article  Google Scholar 

  39. Bhattarai S, Ge L, Yu W (2012) A novel architecture against false data injection attacks in smart grid, In: 2012 IEEE international conference on communications (ICC). IEEE, pp 907–911

  40. Lichman M et al (2013) Electricity load diagrams 2011–2014 data set. Online. Available: https://archive.ics.uci.edu/ml/datasets/ElectricityLoadDiagrams20112014

  41. Liu Y, Zhou Y, Hu S (2018) Combating coordinated pricing cyberattack and energy theft in smart home cyber-physical systems. IEEE Trans Comput Aided Des Integr Circuits Syst 37(3):573–586

    Article  Google Scholar 

  42. Mahapatra K, Chaudhuri NR (2019) Online robust pca for malicious attack-resilience in wide-area mode metering application. IEEE Trans Power Syst 34(4):2598–2610

    Article  Google Scholar 

  43. Anwar A, Mahmood AN (2016) Stealthy and blind false injection attacks on scada ems in the presence of gross errors, In: 2016 IEEE power and energy society general meeting (PESGM). IEEE pp 1–5

  44. Joshi AM et al (2016) Dwt-dct based blind audio watermarking using arnold scrambling and cyclic codes, In: 2016 3rd international conference on signal processing and integrated networks (SPIN). IEEE, pp 79–84

  45. Joshi A, Mishra V, Patrikar R (2015) Real time implementation of integer DCT based video watermarking architecture. Int Arab J Inf Technol 12:741–747

  46. A. Amara korba and N. El Islem karabadji, (2019) Smart grid energy fraud detection using svm. In: 2019 international conference on networking and advanced systems (ICNAS), pp 1–6

  47. CER Smart Metering Project - electricity customer behaviour trial, 2009-2010 [dataset]. Irish social science data archive. SN: 0012-00, 2013. [Online]. Available: https://www.ucd.ie/issda/data/commissionforenergyregulationcer/

  48. Manocha S, Bansal V, Kaushal I, Bhat A (2020) Efficient power theft detection using smart meter data in advanced metering infrastructure. In: 2020 4th international conference on intelligent computing and control systems (ICICCS), pp 765–770

  49. Open Energy Information [Online]. Available:. [Online]. Available: http://en.openei.org/datasets/dataset/commercial-and-residential-hourly-load-profiles-for-all-tmy3-locations-in-the-united-states

  50. de Souza MA, Pereira JL, Alves GD, de Oliveira BC, Melo ID, Garcia PA (2020) Detection and identification of energy theft in advanced metering infrastructures. Elect Power Syst Res 182:May

  51. Hasan MN, Toma RN, Nahid A-A, Islam MMM, Kim J-M (2019) Electricity theft detection in smart grid systems: a cnn-lstm based approach. Energies 12(17):3310

    Article  Google Scholar 

  52. DataFountain. [Online]. Available, Dec, (2016) Online. Available: https://www.datafountain.cn./competitions/241/details

  53. Jindal A, Dua A, Kaur K, Singh M, Kumar N, Mishra S (2016) Decision tree and svm-based data analytics for theft detection in smart grid. IEEE Trans Industr Inf 12(3):1005–1016

    Article  Google Scholar 

  54. Yao D, Wen M, Liang X, Fu Z, Zhang K, Yang B (2019) Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J 6(5):7659–7669

    Article  Google Scholar 

  55. Yu Z-H, Chin W-L (2015) Blind false data injection attack using pca approximation method in smart grid. IEEE Trans Smart Grid 6(3):1219–1226

    Article  Google Scholar 

  56. Anwar A, Mahmood AN, Pickering M (2017) Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements. J Comput Syst Sci 83(1):58–72 [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0022000016300174

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit M. Joshi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jain, H., Kumar, M. & Joshi, A.M. Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection. Electr Eng 104, 331–346 (2022). https://doi.org/10.1007/s00202-021-01380-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00202-021-01380-9

Keywords

Navigation