Skip to main content
Top
Published in:

01-07-2024 | Original Paper

Real-time implementation of IoT-enabled cyberattack detection system in advanced metering infrastructure using machine learning technique

Authors: K. Naveeda, S. M. H. Sithi Shameem Fathima

Published in: Electrical Engineering | Issue 1/2025

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The article explores the real-time implementation of an IoT-enabled cyberattack detection system in advanced metering infrastructure (AMI) using machine learning techniques. It discusses the integration of smart meters with cloud-based cybersecurity systems, focusing on anomaly detection and false data injection attacks. The system is implemented in a commercial building and utilizes algorithms like Isolation Forest and XGBoost for real-time monitoring and threat detection. The article also covers the hardware setup, communication protocols, and security measures to safeguard the system against potential cyberthreats. Additionally, it provides insights into the challenges and vulnerabilities associated with smart meters and proposes a comprehensive solution to enhance the resilience of the energy infrastructure against cyberattacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Business + Economics & Engineering + Technology"

Online-Abonnement

Springer Professional "Business + Economics & Engineering + Technology" gives you access to:

  • more than 102.000 books
  • more than 537 journals

from the following subject areas:

  • Automotive
  • Construction + Real Estate
  • Business IT + Informatics
  • Electrical Engineering + Electronics
  • Energy + Sustainability
  • Finance + Banking
  • Management + Leadership
  • Marketing + Sales
  • Mechanical Engineering + Materials
  • Insurance + Risk


Secure your knowledge advantage now!

Springer Professional "Engineering + Technology"

Online-Abonnement

Springer Professional "Engineering + Technology" gives you access to:

  • more than 67.000 books
  • more than 390 journals

from the following specialised fileds:

  • Automotive
  • Business IT + Informatics
  • Construction + Real Estate
  • Electrical Engineering + Electronics
  • Energy + Sustainability
  • Mechanical Engineering + Materials





 

Secure your knowledge advantage now!

Springer Professional "Business + Economics"

Online-Abonnement

Springer Professional "Business + Economics" gives you access to:

  • more than 67.000 books
  • more than 340 journals

from the following specialised fileds:

  • Construction + Real Estate
  • Business IT + Informatics
  • Finance + Banking
  • Management + Leadership
  • Marketing + Sales
  • Insurance + Risk



Secure your knowledge advantage now!

Literature
1.
go back to reference SANS and Electricity Information Sharing and Analysis Center (E-ISAC), Analysis of the Cyber Attack on the Ukrainian Power Grid, (2016) SANS and Electricity Information Sharing and Analysis Center (E-ISAC), Analysis of the Cyber Attack on the Ukrainian Power Grid, (2016)
3.
go back to reference Sun CC, Hahn A, Liu CC (2018) Cyber security of a power grid: state-of-the-art. Int J Electr Power Energy Syst 99:45–56CrossRefMATH Sun CC, Hahn A, Liu CC (2018) Cyber security of a power grid: state-of-the-art. Int J Electr Power Energy Syst 99:45–56CrossRefMATH
4.
go back to reference Sun Q, Li H, Ma Z, Wang C, Campillo J, Zhang Q, Wallin F, Guo J (2016) A comprehensive review of smart energy meters in intelligent energy networks. IEEE Internet Things J 3(4):464–479CrossRef Sun Q, Li H, Ma Z, Wang C, Campillo J, Zhang Q, Wallin F, Guo J (2016) A comprehensive review of smart energy meters in intelligent energy networks. IEEE Internet Things J 3(4):464–479CrossRef
5.
go back to reference Liu Y, Hu S, Zomaya AY (2016) The hierarchical smart home cyberattack detection considering power overloading and frequency disturbance. IEEE Trans Ind Inform 12(5):1973–1983CrossRefMATH Liu Y, Hu S, Zomaya AY (2016) The hierarchical smart home cyberattack detection considering power overloading and frequency disturbance. IEEE Trans Ind Inform 12(5):1973–1983CrossRefMATH
6.
go back to reference Sgouras KI, Kyriakidis AN, Labridis DP (2017) Short-term risk assessment of botnet attacks on advanced metering infrastructure. IET Cyber Phys Syst Theory Appl 2(3):143–151CrossRef Sgouras KI, Kyriakidis AN, Labridis DP (2017) Short-term risk assessment of botnet attacks on advanced metering infrastructure. IET Cyber Phys Syst Theory Appl 2(3):143–151CrossRef
7.
go back to reference Finster S, Baumgart I (2015) Privacy-aware smart metering: a survey. IEEE Commun Surv Tutor 17(2):1088–1101CrossRefMATH Finster S, Baumgart I (2015) Privacy-aware smart metering: a survey. IEEE Commun Surv Tutor 17(2):1088–1101CrossRefMATH
8.
go back to reference Yan Y, Hu RQ, Das SK, Sharif H, Qian Y (2013) An efficient security protocol for advanced metering infrastructure in smart grid. IEEE Netw 27(4):64–71CrossRef Yan Y, Hu RQ, Das SK, Sharif H, Qian Y (2013) An efficient security protocol for advanced metering infrastructure in smart grid. IEEE Netw 27(4):64–71CrossRef
9.
go back to reference Alsharif A, Nabil M, Mahmoud MMEA, Abdallah M (2019) EPDA: efficient and privacy-preserving data collection and access control scheme for multi-recipient AMI networks. IEEE Access 7:27829–27845CrossRef Alsharif A, Nabil M, Mahmoud MMEA, Abdallah M (2019) EPDA: efficient and privacy-preserving data collection and access control scheme for multi-recipient AMI networks. IEEE Access 7:27829–27845CrossRef
10.
go back to reference Jokar P, Arianpoo N, Leung VCM (2016) Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans Smart Grid 7(1):216–226CrossRef Jokar P, Arianpoo N, Leung VCM (2016) Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans Smart Grid 7(1):216–226CrossRef
11.
go back to reference Liu Y, Hu S (2015) Cyberthreat analysis and detection for energy theft in social networking of smart homes. IEEE Trans Comput Soc Syst 2(4):148–158CrossRefMATH Liu Y, Hu S (2015) Cyberthreat analysis and detection for energy theft in social networking of smart homes. IEEE Trans Comput Soc Syst 2(4):148–158CrossRefMATH
12.
go back to reference McLaughlin S, Holbert B, Fawaz A, Berthier R, Zonouz S (2013) A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J Sel Areas Commun 31(7):1319–1330CrossRef McLaughlin S, Holbert B, Fawaz A, Berthier R, Zonouz S (2013) A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J Sel Areas Commun 31(7):1319–1330CrossRef
13.
go back to reference Liu Y, Hu S, Ho T (2016) Leveraging strategic detection techniques for smart home pricing cyberattacks. IEEE Trans Dependable Secure Comput 13(2):220–235CrossRefMATH Liu Y, Hu S, Ho T (2016) Leveraging strategic detection techniques for smart home pricing cyberattacks. IEEE Trans Dependable Secure Comput 13(2):220–235CrossRefMATH
14.
go back to reference Liu X, Zhu P, Zhang Y, Chen K (2015) A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure. IEEE Trans Smart Grid 6(5):2435–2443CrossRefMATH Liu X, Zhu P, Zhang Y, Chen K (2015) A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure. IEEE Trans Smart Grid 6(5):2435–2443CrossRefMATH
15.
go back to reference Berthier R, Sanders WH (2011) Specification-based intrusion detection for advanced metering infrastructures. In: IEEE pacific rim international symposium on dependable computing (PRDC), Pasadena, CA, USA, pp 184–193 Berthier R, Sanders WH (2011) Specification-based intrusion detection for advanced metering infrastructures. In: IEEE pacific rim international symposium on dependable computing (PRDC), Pasadena, CA, USA, pp 184–193
16.
go back to reference Faisal MA, Aung Z, Williams JR, Sanchez A (2015) Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9(1):31–44CrossRef Faisal MA, Aung Z, Williams JR, Sanchez A (2015) Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9(1):31–44CrossRef
17.
go back to reference Ullah R, Faheem Y, Kim B (2017) Energy and congestion-aware routing metric for smart grid AMI networks in smart city. IEEE Access 5:13799–13810CrossRefMATH Ullah R, Faheem Y, Kim B (2017) Energy and congestion-aware routing metric for smart grid AMI networks in smart city. IEEE Access 5:13799–13810CrossRefMATH
18.
go back to reference Stallings W, Brown L (2012) Computer security concepts. In: Computer security principles and practice, 2nd ed. Pearson, London, ch 1, sec 1, pp 10–17 Stallings W, Brown L (2012) Computer security concepts. In: Computer security principles and practice, 2nd ed. Pearson, London, ch 1, sec 1, pp 10–17
19.
go back to reference Liang L, Wang Q, Chen Y (2011) Application of support vector machine in online monitoring of wastewater treatment based on combined kernel functions. In: 2011 International conference on electrical and control engineering, Yichang, pp 3840–3843 Liang L, Wang Q, Chen Y (2011) Application of support vector machine in online monitoring of wastewater treatment based on combined kernel functions. In: 2011 International conference on electrical and control engineering, Yichang, pp 3840–3843
20.
go back to reference Zhang J (2015) A complete list of kernels used in support vector machines. Biochem Pharmacol Open Access 4(5):195MATH Zhang J (2015) A complete list of kernels used in support vector machines. Biochem Pharmacol Open Access 4(5):195MATH
21.
go back to reference Brailovsky VL, Barzilay O, Shahave R (1999) On global, local, mixed and neighborhood kernels for support vector machines. Pattern Recogn Lett 20(11–13):1183–1190CrossRefMATH Brailovsky VL, Barzilay O, Shahave R (1999) On global, local, mixed and neighborhood kernels for support vector machines. Pattern Recogn Lett 20(11–13):1183–1190CrossRefMATH
22.
go back to reference Abdelwahed S, Karsai G, Mahadevan N, Ofsthun SC (2008) Practical implementation of diagnosis systems using timed failure propagation graph models. IEEE Trans Instrum Meas 58(2):240–247CrossRefMATH Abdelwahed S, Karsai G, Mahadevan N, Ofsthun SC (2008) Practical implementation of diagnosis systems using timed failure propagation graph models. IEEE Trans Instrum Meas 58(2):240–247CrossRefMATH
23.
go back to reference Laha SR, Pattanayak BK, Pattnaik S, Hosenkhan MR. Challenges associated with cybersecurity for smart grids based on IoT. In: Intelligent security solutions for cyber-physical systems. Chapman and Hall/CRC, pp 191–202 Laha SR, Pattanayak BK, Pattnaik S, Hosenkhan MR. Challenges associated with cybersecurity for smart grids based on IoT. In: Intelligent security solutions for cyber-physical systems. Chapman and Hall/CRC, pp 191–202
24.
go back to reference Tyagi P, Manju Bargavi SK (2023) Using federated artificial intelligence system of intrusion detection for IoT healthcare system based on blockchain. Int J Data Inform Intell Comput 2(1):1–10MATH Tyagi P, Manju Bargavi SK (2023) Using federated artificial intelligence system of intrusion detection for IoT healthcare system based on blockchain. Int J Data Inform Intell Comput 2(1):1–10MATH
25.
go back to reference Chaturvedi S (2023) IoT-based secure healthcare framework using blockchain technology with a novel simplified swarm-optimized Bayesian normalized neural networks. Int J Data Inform Intell Comput 2(2):63–71MATH Chaturvedi S (2023) IoT-based secure healthcare framework using blockchain technology with a novel simplified swarm-optimized Bayesian normalized neural networks. Int J Data Inform Intell Comput 2(2):63–71MATH
26.
go back to reference Rajan P (2024) Integrating IoT analytics into marketing decision making: a smart data-driven approach. Int J Data Inform Intell Comput 3(1):12–22MATH Rajan P (2024) Integrating IoT analytics into marketing decision making: a smart data-driven approach. Int J Data Inform Intell Comput 3(1):12–22MATH
Metadata
Title
Real-time implementation of IoT-enabled cyberattack detection system in advanced metering infrastructure using machine learning technique
Authors
K. Naveeda
S. M. H. Sithi Shameem Fathima
Publication date
01-07-2024
Publisher
Springer Berlin Heidelberg
Published in
Electrical Engineering / Issue 1/2025
Print ISSN: 0948-7921
Electronic ISSN: 1432-0487
DOI
https://doi.org/10.1007/s00202-024-02552-z