Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks

  • Mahmoud NabilEmail author
  • Muhammad Ismail
  • Mohamed Mahmoud
  • Mostafa Shahin
  • Khalid Qaraqe
  • Erchin Serpedin
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)


Advanced metering infrastructure (AMI) is the primary step to establish a modern smart grid. AMI enables a flexible two-way communication between smart meters and utility company for monitoring and billing purposes. However, AMI suffers from the deceptive behavior of malicious consumers who report false electricity usage in order to reduce their bills, which is known as electricity theft cyber-attacks. In this chapter, we present deep learning-based detectors that can efficiently thwart electricity theft cyber-attacks in smart grid AMI networks. First, we present a customer-specific detector based on a deep feed-forward and recurrent neural networks (RNN). Then, we develop generalized electricity theft detectors that are more robust against contamination attacks compared with customer-specific detectors. In all detectors, optimization of hyperparameters is investigated to improve the performance of the developed detectors. In particular, the hyperparameters of the detectors are optimized via sequential, random, and genetic optimization-based grid search approaches. Extensive test studies are carried out against real energy consumption data to investigate all detectors performance. Also, the performance of the developed deep learning-based detectors is compared with a shallow machine learning approach and a superior performance is observed for the deep learning-based detectors.


Electricity theft Cyber-attacks AMI networks Deep machine learning 



This publication was made possible by NPRP grant # NPRP9-055-2-022 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors.


  1. 1.
    Buevich M, Zhang X, Schnitzer D, Escalada T, Jacquiau-Chamski A, Thacker J, Rowe A (2015) Short paper: microgrid losses: when the whole is greater than the sum of its parts. In: Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments, pp 95–98. ACMGoogle Scholar
  2. 2.
    Viegas JL, Esteves PR, Melício R, Mendes VMF, Vieira SM (2017) Solutions for detection of non-technical losses in the electricity grid: a review. Renew Sust Energ Rev 80:1256–1268CrossRefGoogle Scholar
  3. 3.
    Jokar P, Arianpoo N, Leung VCM (2016) Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans Smart Grid 7(1):216–226CrossRefGoogle Scholar
  4. 4.
    Singh SK, Bose R, Joshi A (2017) Entropy-based electricity theft detection in AMI network. IET Cyber-Phys Syst Theory Appl 3:99–105CrossRefGoogle Scholar
  5. 5.
    Antmann P (2009) Reducing technical and non-technical losses in the power sector. World Bank, Washington, DCGoogle Scholar
  6. 6.
    IBM (2012) Energy theft: incentives to change. Technical reportGoogle Scholar
  7. 7.
    CBC Electricity theft by B.C. Grow-ops costs 100M a year. Online Last accesed Nov 2017
  8. 8.
    Pickering P E-meters offer multiple ways to combat electricity theft and tampering. Online Last accesed Nov 2017
  9. 9.
    Abaide AR, Canha LN, Barin A, Cassel G (2010) Assessment of the smart grids applied in reducing the cost of distribution system losses. In: 2010 7th International Conference on the European Energy Market (EEM). IEEE, pp 1–6Google Scholar
  10. 10.
    Nizar AH, Dong ZY, Wang Y (2008) Power utility nontechnical loss analysis with extreme learning machine method. IEEE Trans Power Syst 23(3):946–955CrossRefGoogle Scholar
  11. 11.
    Nagi J, Yap KS, Tiong SK, Ahmed SK, Nagi F (2011) Improving SVM-based nontechnical loss detection in power utility using the fuzzy inference system. IEEE Trans Power Delivery 26(2):1284–1285CrossRefGoogle Scholar
  12. 12.
    Ramos C, de Sousa A, Papa J, Falcao X (2011) A new approach for nontechnical losses detection based on optimum-path forest. IEEE Trans Power Syst 26(1):181–189CrossRefGoogle Scholar
  13. 13.
    Angelos E, Saavedra O, Cortés C, de Souza A (2011) Detection and identification of abnormalities in customer consumptions in power distribution systems. IEEE Trans Power Delivery 26(4):2436–2442CrossRefGoogle Scholar
  14. 14.
    Lin C-H, Chen S-J, Kuo C-L, Chen J-L (2014) Non-cooperative game model applied to an advanced metering infrastructure for non-technical loss screening in micro-distribution systems. IEEE Trans Smart Grid 5(5):2468–2469CrossRefGoogle Scholar
  15. 15.
    Amin S, Schwartz GA, Cardenas AA, Sastry SS (2015) Game-theoretic models of electricity theft detection in smart utility networks: providing new capabilities with advanced metering infrastructure. IEEE Control Systems 35(1):66–81MathSciNetCrossRefGoogle Scholar
  16. 16.
    Zhou Y, Chen X, Zomaya AY, Wang L, Hu S (2015) A dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home. IEEE Trans Emerg Top Comput 3(4):502–513CrossRefGoogle Scholar
  17. 17.
    Liu Y, Hu S (2015) Cyberthreat analysis and detection for energy theft in social networking of smart homes. IEEE Trans Comput Soc Syst 2(4):148–158CrossRefGoogle Scholar
  18. 18.
    Jindal A, Dua A, Kaur K, Singh M, Kumar N, Mishra S (2016) Decision tree and SVM-based data analytics for theft detection in smart grid. IEEE Trans Ind Inf 12(3):1005–1016CrossRefGoogle Scholar
  19. 19.
    Bhat RR, Trevizan RD, Sengupta R, Li X, Bretas A (2016) Identifying nontechnical power loss via spatial and temporal deep learning. In: Proceedings of 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp 272–279Google Scholar
  20. 20.
    Zhan T-S, Chen S-J, Kao C-C, Kuo C-L, Chen J-L, Lin C-H (2016) Non-technical loss and power blackout detection under advanced metering infrastructure using a cooperative game based inference mechanism. IET Gener Transm Distrib 10(4):873–882CrossRefGoogle Scholar
  21. 21.
    Tariq M, Poor HV (2016) Electricity theft detection and localization in grid-tied microgrids. IEEE Trans Smart GridGoogle Scholar
  22. 22.
    Xiao F, Ai Q (2017) Electricity theft detection in smart grid using random matrix theory. IET Gener Transm DistribGoogle Scholar
  23. 23.
    Dineshkumar K, Ramanathan P, Ramasamy S (2015) Development of ARM processor based electricity theft control system using GSM network. In: 2015 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, pp 1–6Google Scholar
  24. 24.
    Ngamchuen S, Pirak C (2013) Smart anti-tampering algorithm design for single phase smart meter applied to AMI systems. In: 2013 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). IEEE, pp 1–6Google Scholar
  25. 25.
    Khoo B, Cheng Y (2011) Using RFID for anti-theft in a chinese electrical supply company: a cost-benefit analysis. In: Wireless Telecommunications Symposium (WTS). IEEE, pp 1–6Google Scholar
  26. 26.
    Henriques HO, Barbero APL, Ribeiro RM, Fortes MZ, Zanco W, Xavier OS, Amorim RM (2014) Development of adapted ammeter for fraud detection in low-voltage installations. Measurement 56:1–7CrossRefGoogle Scholar
  27. 27.
    Devidas AR, Ramesh MV (2010) Wireless smart grid design for monitoring and optimizing electric transmission in india. In: 2010 Fourth International Conference on Sensor Technologies and Applications (SENSORCOMM). IEEE, pp 637–640Google Scholar
  28. 28.
    Zheng Z, Yang Y, Niu X, Dai H-N, Zhou Y (2018) Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans Ind Inf 14(4):1606–1615CrossRefGoogle Scholar
  29. 29.
    Devices A (2010) Single-phase multifunction metering IC with di/dt sensor interface. MARUTSU, NorwoodGoogle Scholar
  30. 30.
    Bandim CJ, Alves JER, Pinto AV, Souza FC, Loureiro MRB, Magalhaes CA, Galvez-Durand F (2003) Identification of energy theft and tampered meters using a central observer meter: a mathematical approach. In: Transmission and Distribution Conference and Exposition, 2003 IEEE PES, vol 1. IEEE, pp 163–168Google Scholar
  31. 31.
    Lo C-H, Ansari N (2013) Consumer: a novel hybrid intrusion detection system for distribution networks in smart grid. IEEE Trans Emer Top Comput 1(1):33–44CrossRefGoogle Scholar
  32. 32.
    Faria LT, Melo JD, Padilha-Feltrin A (2016) Spatial-temporal estimation for nontechnical losses. IEEE Trans Power Delivery 31(1):362–369CrossRefGoogle Scholar
  33. 33.
    Nagi J, Yap KS, Tiong SK, Ahmed SK, Mohamad M (2010) Nontechnical loss detection for metered customers in power utility using support vector machines. IEEE Trans Power Delivery 25(2):1162–1171CrossRefGoogle Scholar
  34. 34.
    Irish Social Science Data Archive. Online Last accesed Nov 2017
  35. 35.
    He H, Bai Y, Garcia EA, Li S (2008) Adasyn: adaptive synthetic sampling approach for imbalanced learning. In: Proceedings of IEEE International Joint Conference on Computational Intelligence, pp 1322–1328Google Scholar
  36. 36.
    Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press, CambridgezbMATHGoogle Scholar
  37. 37.
    Chung J, Gulcehre C, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555Google Scholar
  38. 38.
    Bergstra J, Bengio Y (2012) Random search for hyper-parameter optimization. J Mach Learn Res 13(Feb):281–305MathSciNetzbMATHGoogle Scholar
  39. 39.
    Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182–197CrossRefGoogle Scholar
  40. 40.
    Eschenauer H, Koski J, Osyczka A (2012) Multicriteria design optimization: procedures and applications. Springer Science & Business Media, New YorkzbMATHGoogle Scholar
  41. 41.
    Pennington J, Schoenholz S, Ganguli S (2017) Resurrecting the sigmoid in deep learning through dynamical isometry: theory and practice. In: Advances in Neural Information Processing Systems, pp 4788–4798Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Mahmoud Nabil
    • 1
    Email author
  • Muhammad Ismail
    • 2
  • Mohamed Mahmoud
    • 1
  • Mostafa Shahin
    • 3
  • Khalid Qaraqe
    • 2
  • Erchin Serpedin
    • 2
  1. 1.Department of Electrical and Computer EngineeringTennessee Technical UniversityCookevilleUSA
  2. 2.Electrical and Computer Engineering DepartmentTexas A&M University at QatarDohaQatar
  3. 3.School of Electrical Engineering and TelecommunicationsUniversity of New South WalesSydneyAustralia

Personalised recommendations