PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
<p>In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every few minutes) to the system operator for billing, real-time load monitoring, and energy management. On the other hand, the AMI networks...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , , , |
| منشور في: |
2019
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513562690453504 |
|---|---|
| author | Mahmoud Nabil (16855464) |
| author2 | Muhammad Ismail (3176079) Mohamed M. E. A. Mahmoud (16855467) Waleed Alasmary (11741768) Erchin Serpedin (3706543) |
| author2_role | author author author author |
| author_facet | Mahmoud Nabil (16855464) Muhammad Ismail (3176079) Mohamed M. E. A. Mahmoud (16855467) Waleed Alasmary (11741768) Erchin Serpedin (3706543) |
| author_role | author |
| dc.creator.none.fl_str_mv | Mahmoud Nabil (16855464) Muhammad Ismail (3176079) Mohamed M. E. A. Mahmoud (16855467) Waleed Alasmary (11741768) Erchin Serpedin (3706543) |
| dc.date.none.fl_str_mv | 2019-06-26T00:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1109/access.2019.2925322 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/PPETD_Privacy-Preserving_Electricity_Theft_Detection_Scheme_With_Load_Monitoring_and_Billing_for_AMI_Networks/23994870 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Data management and data science Distributed computing and systems software Machine learning Computational modeling Dynamic billing Energy consumption Electricity theft detection Monitoring Machine learning Power grids Power demand Privacy Privacy preservation Secure multi-party computation |
| dc.title.none.fl_str_mv | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p>In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every few minutes) to the system operator for billing, real-time load monitoring, and energy management. On the other hand, the AMI networks are vulnerable to cyber-attacks where malicious consumers report false (low) electricity consumption to reduce their bills in an illegal way. Therefore, it is imperative to develop schemes to accurately identify the consumers that steal electricity by reporting false electricity usage. Most of the existing schemes rely on machine learning for electricity theft detection using the consumers' fine-grained power consumption meter readings. However, this fine-grained data that is used for electricity theft detection, load monitoring, and billing can also be misused to infer sensitive information regarding the consumers such as whether they are on travel, the appliances they use, and so on. In this paper, we propose an efficient and privacy-preserving electricity theft detection scheme for the AMI network and we refer to it as PPETD. Our scheme allows system operators to identify the electricity thefts, monitor the loads, and compute electricity bills efficiently using masked fine-grained meter readings without violating the consumers' privacy. The PPETD uses secret sharing to allow the consumers to send masked readings to the system operator such that these readings can be aggregated for the purpose of monitoring and billing. In addition, secure two-party protocols using arithmetic and binary circuits are executed by the system operator and each consumer to evaluate a generalized convolutional-neural network model on the reported masked fine-grained power consumption readings for the purpose of electricity theft detection. An extensive analysis of real datasets is performed to evaluate the security and the performance of the PPETD. Our results confirm that our scheme is accurate in detecting fraudulent consumers with privacy preservation and acceptable communication and computation overhead.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2019.2925322" target="_blank">https://dx.doi.org/10.1109/access.2019.2925322</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_06f52bb8b040fbe6dc478fd54063856c |
| identifier_str_mv | 10.1109/access.2019.2925322 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/23994870 |
| publishDate | 2019 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI NetworksMahmoud Nabil (16855464)Muhammad Ismail (3176079)Mohamed M. E. A. Mahmoud (16855467)Waleed Alasmary (11741768)Erchin Serpedin (3706543)Information and computing sciencesCybersecurity and privacyData management and data scienceDistributed computing and systems softwareMachine learningComputational modelingDynamic billingEnergy consumptionElectricity theft detectionMonitoringMachine learningPower gridsPower demandPrivacyPrivacy preservationSecure multi-party computation<p>In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every few minutes) to the system operator for billing, real-time load monitoring, and energy management. On the other hand, the AMI networks are vulnerable to cyber-attacks where malicious consumers report false (low) electricity consumption to reduce their bills in an illegal way. Therefore, it is imperative to develop schemes to accurately identify the consumers that steal electricity by reporting false electricity usage. Most of the existing schemes rely on machine learning for electricity theft detection using the consumers' fine-grained power consumption meter readings. However, this fine-grained data that is used for electricity theft detection, load monitoring, and billing can also be misused to infer sensitive information regarding the consumers such as whether they are on travel, the appliances they use, and so on. In this paper, we propose an efficient and privacy-preserving electricity theft detection scheme for the AMI network and we refer to it as PPETD. Our scheme allows system operators to identify the electricity thefts, monitor the loads, and compute electricity bills efficiently using masked fine-grained meter readings without violating the consumers' privacy. The PPETD uses secret sharing to allow the consumers to send masked readings to the system operator such that these readings can be aggregated for the purpose of monitoring and billing. In addition, secure two-party protocols using arithmetic and binary circuits are executed by the system operator and each consumer to evaluate a generalized convolutional-neural network model on the reported masked fine-grained power consumption readings for the purpose of electricity theft detection. An extensive analysis of real datasets is performed to evaluate the security and the performance of the PPETD. Our results confirm that our scheme is accurate in detecting fraudulent consumers with privacy preservation and acceptable communication and computation overhead.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2019.2925322" target="_blank">https://dx.doi.org/10.1109/access.2019.2925322</a></p>2019-06-26T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2019.2925322https://figshare.com/articles/journal_contribution/PPETD_Privacy-Preserving_Electricity_Theft_Detection_Scheme_With_Load_Monitoring_and_Billing_for_AMI_Networks/23994870CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/239948702019-06-26T00:00:00Z |
| spellingShingle | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks Mahmoud Nabil (16855464) Information and computing sciences Cybersecurity and privacy Data management and data science Distributed computing and systems software Machine learning Computational modeling Dynamic billing Energy consumption Electricity theft detection Monitoring Machine learning Power grids Power demand Privacy Privacy preservation Secure multi-party computation |
| status_str | publishedVersion |
| title | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks |
| title_full | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks |
| title_fullStr | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks |
| title_full_unstemmed | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks |
| title_short | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks |
| title_sort | PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks |
| topic | Information and computing sciences Cybersecurity and privacy Data management and data science Distributed computing and systems software Machine learning Computational modeling Dynamic billing Energy consumption Electricity theft detection Monitoring Machine learning Power grids Power demand Privacy Privacy preservation Secure multi-party computation |