PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks

<p>In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every few minutes) to the system operator for billing, real-time load monitoring, and energy management. On the other hand, the AMI networks...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Mahmoud Nabil (16855464) (author)
مؤلفون آخرون: Muhammad Ismail (3176079) (author), Mohamed M. E. A. Mahmoud (16855467) (author), Waleed Alasmary (11741768) (author), Erchin Serpedin (3706543) (author)
منشور في: 2019
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513562690453504
author Mahmoud Nabil (16855464)
author2 Muhammad Ismail (3176079)
Mohamed M. E. A. Mahmoud (16855467)
Waleed Alasmary (11741768)
Erchin Serpedin (3706543)
author2_role author
author
author
author
author_facet Mahmoud Nabil (16855464)
Muhammad Ismail (3176079)
Mohamed M. E. A. Mahmoud (16855467)
Waleed Alasmary (11741768)
Erchin Serpedin (3706543)
author_role author
dc.creator.none.fl_str_mv Mahmoud Nabil (16855464)
Muhammad Ismail (3176079)
Mohamed M. E. A. Mahmoud (16855467)
Waleed Alasmary (11741768)
Erchin Serpedin (3706543)
dc.date.none.fl_str_mv 2019-06-26T00:00:00Z
dc.identifier.none.fl_str_mv 10.1109/access.2019.2925322
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/PPETD_Privacy-Preserving_Electricity_Theft_Detection_Scheme_With_Load_Monitoring_and_Billing_for_AMI_Networks/23994870
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Data management and data science
Distributed computing and systems software
Machine learning
Computational modeling
Dynamic billing
Energy consumption
Electricity theft detection
Monitoring
Machine learning
Power grids
Power demand
Privacy
Privacy preservation
Secure multi-party computation
dc.title.none.fl_str_mv PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p>In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every few minutes) to the system operator for billing, real-time load monitoring, and energy management. On the other hand, the AMI networks are vulnerable to cyber-attacks where malicious consumers report false (low) electricity consumption to reduce their bills in an illegal way. Therefore, it is imperative to develop schemes to accurately identify the consumers that steal electricity by reporting false electricity usage. Most of the existing schemes rely on machine learning for electricity theft detection using the consumers' fine-grained power consumption meter readings. However, this fine-grained data that is used for electricity theft detection, load monitoring, and billing can also be misused to infer sensitive information regarding the consumers such as whether they are on travel, the appliances they use, and so on. In this paper, we propose an efficient and privacy-preserving electricity theft detection scheme for the AMI network and we refer to it as PPETD. Our scheme allows system operators to identify the electricity thefts, monitor the loads, and compute electricity bills efficiently using masked fine-grained meter readings without violating the consumers' privacy. The PPETD uses secret sharing to allow the consumers to send masked readings to the system operator such that these readings can be aggregated for the purpose of monitoring and billing. In addition, secure two-party protocols using arithmetic and binary circuits are executed by the system operator and each consumer to evaluate a generalized convolutional-neural network model on the reported masked fine-grained power consumption readings for the purpose of electricity theft detection. An extensive analysis of real datasets is performed to evaluate the security and the performance of the PPETD. Our results confirm that our scheme is accurate in detecting fraudulent consumers with privacy preservation and acceptable communication and computation overhead.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2019.2925322" target="_blank">https://dx.doi.org/10.1109/access.2019.2925322</a></p>
eu_rights_str_mv openAccess
id Manara2_06f52bb8b040fbe6dc478fd54063856c
identifier_str_mv 10.1109/access.2019.2925322
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/23994870
publishDate 2019
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI NetworksMahmoud Nabil (16855464)Muhammad Ismail (3176079)Mohamed M. E. A. Mahmoud (16855467)Waleed Alasmary (11741768)Erchin Serpedin (3706543)Information and computing sciencesCybersecurity and privacyData management and data scienceDistributed computing and systems softwareMachine learningComputational modelingDynamic billingEnergy consumptionElectricity theft detectionMonitoringMachine learningPower gridsPower demandPrivacyPrivacy preservationSecure multi-party computation<p>In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every few minutes) to the system operator for billing, real-time load monitoring, and energy management. On the other hand, the AMI networks are vulnerable to cyber-attacks where malicious consumers report false (low) electricity consumption to reduce their bills in an illegal way. Therefore, it is imperative to develop schemes to accurately identify the consumers that steal electricity by reporting false electricity usage. Most of the existing schemes rely on machine learning for electricity theft detection using the consumers' fine-grained power consumption meter readings. However, this fine-grained data that is used for electricity theft detection, load monitoring, and billing can also be misused to infer sensitive information regarding the consumers such as whether they are on travel, the appliances they use, and so on. In this paper, we propose an efficient and privacy-preserving electricity theft detection scheme for the AMI network and we refer to it as PPETD. Our scheme allows system operators to identify the electricity thefts, monitor the loads, and compute electricity bills efficiently using masked fine-grained meter readings without violating the consumers' privacy. The PPETD uses secret sharing to allow the consumers to send masked readings to the system operator such that these readings can be aggregated for the purpose of monitoring and billing. In addition, secure two-party protocols using arithmetic and binary circuits are executed by the system operator and each consumer to evaluate a generalized convolutional-neural network model on the reported masked fine-grained power consumption readings for the purpose of electricity theft detection. An extensive analysis of real datasets is performed to evaluate the security and the performance of the PPETD. Our results confirm that our scheme is accurate in detecting fraudulent consumers with privacy preservation and acceptable communication and computation overhead.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2019.2925322" target="_blank">https://dx.doi.org/10.1109/access.2019.2925322</a></p>2019-06-26T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2019.2925322https://figshare.com/articles/journal_contribution/PPETD_Privacy-Preserving_Electricity_Theft_Detection_Scheme_With_Load_Monitoring_and_Billing_for_AMI_Networks/23994870CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/239948702019-06-26T00:00:00Z
spellingShingle PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
Mahmoud Nabil (16855464)
Information and computing sciences
Cybersecurity and privacy
Data management and data science
Distributed computing and systems software
Machine learning
Computational modeling
Dynamic billing
Energy consumption
Electricity theft detection
Monitoring
Machine learning
Power grids
Power demand
Privacy
Privacy preservation
Secure multi-party computation
status_str publishedVersion
title PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
title_full PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
title_fullStr PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
title_full_unstemmed PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
title_short PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
title_sort PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks
topic Information and computing sciences
Cybersecurity and privacy
Data management and data science
Distributed computing and systems software
Machine learning
Computational modeling
Dynamic billing
Energy consumption
Electricity theft detection
Monitoring
Machine learning
Power grids
Power demand
Privacy
Privacy preservation
Secure multi-party computation