Skip to main content
Erschienen in: Electrical Engineering 1/2022

03.09.2021 | Original Paper

Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection

verfasst von: Harshit Jain, Mukul Kumar, Amit M. Joshi

Erschienen in: Electrical Engineering | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT)-based advanced metering infrastructure (AMI) provides real-time information from smart meters to both grid operators and customers. The meter data is collected and stored digitally and is transmitted through wireless networks. With the remarkably increasing usage of smart grid systems over conventional utility grid networks, it becomes imperative to ensure that such a system is secured from potential threats. Energy theft by meter tampering and false data injection (FDI) attacks are the most common forms of attacks that attempt to compromise the security of a smart grid system. In this paper, we introduce a new machine learning-based multi-model prediction system known as intelligent energy cyber physical systems (iECPS) for smart energy theft detection and verification. Furthermore, the system has more robustness since a verification from the users themselves (through e-mail) is considered as final validation to decide further course of action. In addition, to successfully detect and prevent FDI attack during transmission of data from sub-meters or meters to smart grids, a watermarking and de-watermarking system is also proposed. It involves encryption and decryption of meter data by means of a PN-sequence available at both ends. The proposed scheme detects electricity theft performed by tapping on the user’s smart meter with high accuracy. Also, the watermarking scheme discerns FDI attacks while maintaining data consistency, with a significant similarity factor and low channel SNR. The proposed system has accuracy of 99.77%, precision 0.998, recall 1.0, F1 score 0.999 and FPR 0.999 which has better results than similar previous works.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Mohanty SP (2020) Advances in transportation cyber-physical system (t-cps). IEEE Consumer Electron Mag 9(4):4–6CrossRef Mohanty SP (2020) Advances in transportation cyber-physical system (t-cps). IEEE Consumer Electron Mag 9(4):4–6CrossRef
3.
Zurück zum Zitat Jain A, Joshi AM (2019) Device authentication in iot using reconfigurable puf, In: 2019 2nd IEEE middle east and North Africa communications conference (MENACOMM). IEEE 1–4 Jain A, Joshi AM (2019) Device authentication in iot using reconfigurable puf, In: 2019 2nd IEEE middle east and North Africa communications conference (MENACOMM). IEEE 1–4
4.
Zurück zum Zitat Gunduz MZ, Das R (2020) Cyber-security on smart grid: threats and potential solutions. Comput Netw 169:107094CrossRef Gunduz MZ, Das R (2020) Cyber-security on smart grid: threats and potential solutions. Comput Netw 169:107094CrossRef
5.
Zurück zum Zitat Abdollahy S, Mammoli A, Cheng F, Ellis A, Johnson J (2013) Distributed compensation of a large intermittent energy resource in a distribution feeder, In: 2013 IEEE PES innovative smart grid technologies conference (ISGT) pp 1–6 Abdollahy S, Mammoli A, Cheng F, Ellis A, Johnson J (2013) Distributed compensation of a large intermittent energy resource in a distribution feeder, In: 2013 IEEE PES innovative smart grid technologies conference (ISGT) pp 1–6
6.
Zurück zum Zitat Hossain E, Khan I, Un-Noor F, Sikander SS (2018) Application of big data and machine learning in smart grid, and associated security concerns: A review. IEEE 7:13 960-13 988 Hossain E, Khan I, Un-Noor F, Sikander SS (2018) Application of big data and machine learning in smart grid, and associated security concerns: A review. IEEE 7:13 960-13 988
7.
Zurück zum Zitat Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Sec Privacy 9(3):49–51CrossRef Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Sec Privacy 9(3):49–51CrossRef
8.
Zurück zum Zitat Miller B, Rowe DC (2012) A survey scada of and critical infrastructure incidents, In: RIIT ’12 Miller B, Rowe DC (2012) A survey scada of and critical infrastructure incidents, In: RIIT ’12
9.
Zurück zum Zitat Bronk C, Tikk-Ringas E (2013) The cyber attack on saudi aramco. Survival 55(2):81–96CrossRef Bronk C, Tikk-Ringas E (2013) The cyber attack on saudi aramco. Survival 55(2):81–96CrossRef
10.
Zurück zum Zitat Case DU (2016) Analysis of the cyber-attack on the Ukrainian power grid. Electr Inf Shar Anal Cent 21:388 Case DU (2016) Analysis of the cyber-attack on the Ukrainian power grid. Electr Inf Shar Anal Cent 21:388
11.
Zurück zum Zitat Lee R, Assante M, Conway T (2016) Analysis of the cyber attack on the ukrainian power grid, In: SANS industrial control systems Lee R, Assante M, Conway T (2016) Analysis of the cyber attack on the ukrainian power grid, In: SANS industrial control systems
12.
Zurück zum Zitat Pandey RK, Misra M (2016) Cyber security threats - smart grid infrastructure, In: 2016 national power systems conference (NPSC), pp 1–6 Pandey RK, Misra M (2016) Cyber security threats - smart grid infrastructure, In: 2016 national power systems conference (NPSC), pp 1–6
13.
Zurück zum Zitat Huang X, Qin Z, Liu H (2018) A survey on power grid cyber security: from component-wise vulnerability assessment to system-wide impact analysis. IEEE Access 6:69 023-69 035CrossRef Huang X, Qin Z, Liu H (2018) A survey on power grid cyber security: from component-wise vulnerability assessment to system-wide impact analysis. IEEE Access 6:69 023-69 035CrossRef
14.
Zurück zum Zitat Lighari SN, Jensen BB, Hussain DMA, Shaikh AA (2014) Attacks and their defenses for advanced metering infrastructure. In: 2014 6th international congress on ultra modern telecommunications and control systems and workshops (ICUMT), pp 148–151 Lighari SN, Jensen BB, Hussain DMA, Shaikh AA (2014) Attacks and their defenses for advanced metering infrastructure. In: 2014 6th international congress on ultra modern telecommunications and control systems and workshops (ICUMT), pp 148–151
15.
Zurück zum Zitat Rao NSV, Poole SW, Ma CYT, He F, Zhuang J, Yau DKY (2016) Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal Official Publ Soc Risk Anal 36(4):694–710CrossRef Rao NSV, Poole SW, Ma CYT, He F, Zhuang J, Yau DKY (2016) Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal Official Publ Soc Risk Anal 36(4):694–710CrossRef
16.
Zurück zum Zitat Gholami A, Shekari T, Amirioun MH, Aminifar F, Amini MH, Sargolzaei A (2018) Toward a consensus on the definition and taxonomy of power system resilience. IEEE Access 6:32 035-32 053CrossRef Gholami A, Shekari T, Amirioun MH, Aminifar F, Amini MH, Sargolzaei A (2018) Toward a consensus on the definition and taxonomy of power system resilience. IEEE Access 6:32 035-32 053CrossRef
17.
Zurück zum Zitat Zhu B, Joseph A, Sastry S (2011) A taxonomy of cyber attacks on scada systems, In: Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing, ser. ITHINGSCPSCOM ’11. USA: IEEE Computer Society, pp 380–388. [Online]. Available: https://doi.org/10.1109/iThings/CPSCom.2011.34 Zhu B, Joseph A, Sastry S (2011) A taxonomy of cyber attacks on scada systems, In: Proceedings of the 2011 international conference on internet of things and 4th international conference on cyber, physical and social computing, ser. ITHINGSCPSCOM ’11. USA: IEEE Computer Society, pp 380–388. [Online]. Available: https://​doi.​org/​10.​1109/​iThings/​CPSCom.​2011.​34
18.
Zurück zum Zitat Camarinha-Matos L (2016) Collaborative smart grids - a survey on trends. Renew Sustain Energy Rev 65:283–294, 11CrossRef Camarinha-Matos L (2016) Collaborative smart grids - a survey on trends. Renew Sustain Energy Rev 65:283–294, 11CrossRef
19.
Zurück zum Zitat Zhou Y, Chen X, Zomaya AY, Wang L, Hu S (2015) A dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home. IEEE Trans Emerg Top Comput 3(4):502–513CrossRef Zhou Y, Chen X, Zomaya AY, Wang L, Hu S (2015) A dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home. IEEE Trans Emerg Top Comput 3(4):502–513CrossRef
20.
Zurück zum Zitat Costa B, Alberto B, Portela A, W M, Eler E. O. (2013) Fraud detection in electric power distribution networks using an ann-based knowledge-discovery process. Int J Artif Intell Appl 4:17–23, 11 Costa B, Alberto B, Portela A, W M, Eler E. O. (2013) Fraud detection in electric power distribution networks using an ann-based knowledge-discovery process. Int J Artif Intell Appl 4:17–23, 11
21.
Zurück zum Zitat Jokar P, Arianpoo N, Leung VCM (2016) Electricity theft detection in ami using customers’ consumption patterns. IEEE Trans Smart Grid 7(1):216–226 Jokar P, Arianpoo N, Leung VCM (2016) Electricity theft detection in ami using customers’ consumption patterns. IEEE Trans Smart Grid 7(1):216–226
22.
Zurück zum Zitat McLaughlin S, Holbert B, Fawaz A, Berthier R, Zonouz S (2013) A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J Sel Areas Commun 31(7):1319–1330CrossRef McLaughlin S, Holbert B, Fawaz A, Berthier R, Zonouz S (2013) A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE J Sel Areas Commun 31(7):1319–1330CrossRef
23.
Zurück zum Zitat Yu W, Bhattarai S, Ge L (2012) A novel architecture against false data injection attacks in smart grid. In: Communication and information systems security symposium, pp 907–911 Yu W, Bhattarai S, Ge L (2012) A novel architecture against false data injection attacks in smart grid. In: Communication and information systems security symposium, pp 907–911
24.
Zurück zum Zitat Joshi AM (2019) Hardware implementation of audio watermarking based on dwt transform, In: Ethics, laws, and policies for privacy, security, and liability. IntechOpen, Joshi AM (2019) Hardware implementation of audio watermarking based on dwt transform, In: Ethics, laws, and policies for privacy, security, and liability. IntechOpen,
25.
Zurück zum Zitat Joshi A, Mishra V, Patrikar R (2012) Real time implementation of digital watermarking algorithm for image and video application. Watermarking 2:65 Joshi A, Mishra V, Patrikar R (2012) Real time implementation of digital watermarking algorithm for image and video application. Watermarking 2:65
26.
Zurück zum Zitat Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2011) Smart grid data integrity attacks: characterizations and countermeasures, In: IEEE international conference on smart grid communications (SmartGridComm) 2011:232–237 Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K (2011) Smart grid data integrity attacks: characterizations and countermeasures, In: IEEE international conference on smart grid communications (SmartGridComm) 2011:232–237
27.
Zurück zum Zitat Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet Things J 4(6):1844–1852CrossRef Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet Things J 4(6):1844–1852CrossRef
28.
Zurück zum Zitat Joshi AM, Jain P, Mohanty SP, Agrawal N (2020) iglu 2.0: A new wearable for accurate non-invasive continuous serum glucose measurement in iomt framework. IEEE Trans Consum Electron 66(4):327–335CrossRef Joshi AM, Jain P, Mohanty SP, Agrawal N (2020) iglu 2.0: A new wearable for accurate non-invasive continuous serum glucose measurement in iomt framework. IEEE Trans Consum Electron 66(4):327–335CrossRef
30.
Zurück zum Zitat Sharma G, Parashar A, Joshi AM (2021) Dephnn: a novel hybrid neural network for electroencephalogram (eeg)-based screening of depression. Biomed Signal Process Control 66:102393CrossRef Sharma G, Parashar A, Joshi AM (2021) Dephnn: a novel hybrid neural network for electroencephalogram (eeg)-based screening of depression. Biomed Signal Process Control 66:102393CrossRef
31.
Zurück zum Zitat Chung J, Gülçehre Ç, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling, In: CoRR, vol. [Online]. Available: arXiv:1412.3555 Chung J, Gülçehre Ç, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling, In: CoRR, vol. [Online]. Available: arXiv:​1412.​3555
32.
Zurück zum Zitat Arghandeh R, Mili L, Mehrmanesh L (2016) On the definition of cyber-physical resilience in power systems. Renew Sustain Energy Rev 58:1060–1069CrossRef Arghandeh R, Mili L, Mehrmanesh L (2016) On the definition of cyber-physical resilience in power systems. Renew Sustain Energy Rev 58:1060–1069CrossRef
33.
Zurück zum Zitat Huang X, Qin Z, Liu H (2018) A survey on power grid cyber security: from component-wise vulnerability assessment to system-wide impact analysis. IEEE Access PP:1–1, 11 Huang X, Qin Z, Liu H (2018) A survey on power grid cyber security: from component-wise vulnerability assessment to system-wide impact analysis. IEEE Access PP:1–1, 11
34.
Zurück zum Zitat Kappagantu R, Daniel SA (2018) Challenges and issues of smart grid implementation: a case of indian scenario. J Elect Syst Inf Technol 5:453–467CrossRef Kappagantu R, Daniel SA (2018) Challenges and issues of smart grid implementation: a case of indian scenario. J Elect Syst Inf Technol 5:453–467CrossRef
35.
Zurück zum Zitat Joshi AM, Mishra V, Patrikar RM (2016) Fpga prototyping of video watermarking for ownership verification based on h. 264/avc. Multimed Tools Appl 75(6):3121–3144CrossRef Joshi AM, Mishra V, Patrikar RM (2016) Fpga prototyping of video watermarking for ownership verification based on h. 264/avc. Multimed Tools Appl 75(6):3121–3144CrossRef
36.
Zurück zum Zitat Vyas DG, Trivedi N, Pandya V, Bhatt P, Pujara A (2019) Future challenges and issues in evolution of the smart grid and recommended possible solutions. In: 2019 IEEE 16th India council international conference (INDICON), pp 1–4 Vyas DG, Trivedi N, Pandya V, Bhatt P, Pujara A (2019) Future challenges and issues in evolution of the smart grid and recommended possible solutions. In: 2019 IEEE 16th India council international conference (INDICON), pp 1–4
37.
Zurück zum Zitat Ganguly P, Nasipuri M, Dutta S (2019) Challenges of the existing security measures deployed in the smart grid framework. In: 2019 IEEE 7th international conference on smart energy grid engineering (SEGE), pp 1–5 Ganguly P, Nasipuri M, Dutta S (2019) Challenges of the existing security measures deployed in the smart grid framework. In: 2019 IEEE 7th international conference on smart energy grid engineering (SEGE), pp 1–5
38.
Zurück zum Zitat Li W, Logenthiran T, Phan V-T, Woo WL (2019) A novel smart energy theft system (sets) for iot-based smart home. IEEE Internet Things J 6(3):5531–5539CrossRef Li W, Logenthiran T, Phan V-T, Woo WL (2019) A novel smart energy theft system (sets) for iot-based smart home. IEEE Internet Things J 6(3):5531–5539CrossRef
39.
Zurück zum Zitat Bhattarai S, Ge L, Yu W (2012) A novel architecture against false data injection attacks in smart grid, In: 2012 IEEE international conference on communications (ICC). IEEE, pp 907–911 Bhattarai S, Ge L, Yu W (2012) A novel architecture against false data injection attacks in smart grid, In: 2012 IEEE international conference on communications (ICC). IEEE, pp 907–911
41.
Zurück zum Zitat Liu Y, Zhou Y, Hu S (2018) Combating coordinated pricing cyberattack and energy theft in smart home cyber-physical systems. IEEE Trans Comput Aided Des Integr Circuits Syst 37(3):573–586CrossRef Liu Y, Zhou Y, Hu S (2018) Combating coordinated pricing cyberattack and energy theft in smart home cyber-physical systems. IEEE Trans Comput Aided Des Integr Circuits Syst 37(3):573–586CrossRef
42.
Zurück zum Zitat Mahapatra K, Chaudhuri NR (2019) Online robust pca for malicious attack-resilience in wide-area mode metering application. IEEE Trans Power Syst 34(4):2598–2610CrossRef Mahapatra K, Chaudhuri NR (2019) Online robust pca for malicious attack-resilience in wide-area mode metering application. IEEE Trans Power Syst 34(4):2598–2610CrossRef
43.
Zurück zum Zitat Anwar A, Mahmood AN (2016) Stealthy and blind false injection attacks on scada ems in the presence of gross errors, In: 2016 IEEE power and energy society general meeting (PESGM). IEEE pp 1–5 Anwar A, Mahmood AN (2016) Stealthy and blind false injection attacks on scada ems in the presence of gross errors, In: 2016 IEEE power and energy society general meeting (PESGM). IEEE pp 1–5
44.
Zurück zum Zitat Joshi AM et al (2016) Dwt-dct based blind audio watermarking using arnold scrambling and cyclic codes, In: 2016 3rd international conference on signal processing and integrated networks (SPIN). IEEE, pp 79–84 Joshi AM et al (2016) Dwt-dct based blind audio watermarking using arnold scrambling and cyclic codes, In: 2016 3rd international conference on signal processing and integrated networks (SPIN). IEEE, pp 79–84
45.
Zurück zum Zitat Joshi A, Mishra V, Patrikar R (2015) Real time implementation of integer DCT based video watermarking architecture. Int Arab J Inf Technol 12:741–747 Joshi A, Mishra V, Patrikar R (2015) Real time implementation of integer DCT based video watermarking architecture. Int Arab J Inf Technol 12:741–747
46.
Zurück zum Zitat A. Amara korba and N. El Islem karabadji, (2019) Smart grid energy fraud detection using svm. In: 2019 international conference on networking and advanced systems (ICNAS), pp 1–6 A. Amara korba and N. El Islem karabadji, (2019) Smart grid energy fraud detection using svm. In: 2019 international conference on networking and advanced systems (ICNAS), pp 1–6
48.
Zurück zum Zitat Manocha S, Bansal V, Kaushal I, Bhat A (2020) Efficient power theft detection using smart meter data in advanced metering infrastructure. In: 2020 4th international conference on intelligent computing and control systems (ICICCS), pp 765–770 Manocha S, Bansal V, Kaushal I, Bhat A (2020) Efficient power theft detection using smart meter data in advanced metering infrastructure. In: 2020 4th international conference on intelligent computing and control systems (ICICCS), pp 765–770
50.
Zurück zum Zitat de Souza MA, Pereira JL, Alves GD, de Oliveira BC, Melo ID, Garcia PA (2020) Detection and identification of energy theft in advanced metering infrastructures. Elect Power Syst Res 182:May de Souza MA, Pereira JL, Alves GD, de Oliveira BC, Melo ID, Garcia PA (2020) Detection and identification of energy theft in advanced metering infrastructures. Elect Power Syst Res 182:May
51.
Zurück zum Zitat Hasan MN, Toma RN, Nahid A-A, Islam MMM, Kim J-M (2019) Electricity theft detection in smart grid systems: a cnn-lstm based approach. Energies 12(17):3310CrossRef Hasan MN, Toma RN, Nahid A-A, Islam MMM, Kim J-M (2019) Electricity theft detection in smart grid systems: a cnn-lstm based approach. Energies 12(17):3310CrossRef
52.
Zurück zum Zitat DataFountain. [Online]. Available, Dec, (2016) Online. Available: https://www.datafountain.cn./competitions/241/details DataFountain. [Online]. Available, Dec, (2016) Online. Available: https://​www.​datafountain.​cn.​/​competitions/​241/​details
53.
Zurück zum Zitat Jindal A, Dua A, Kaur K, Singh M, Kumar N, Mishra S (2016) Decision tree and svm-based data analytics for theft detection in smart grid. IEEE Trans Industr Inf 12(3):1005–1016CrossRef Jindal A, Dua A, Kaur K, Singh M, Kumar N, Mishra S (2016) Decision tree and svm-based data analytics for theft detection in smart grid. IEEE Trans Industr Inf 12(3):1005–1016CrossRef
54.
Zurück zum Zitat Yao D, Wen M, Liang X, Fu Z, Zhang K, Yang B (2019) Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J 6(5):7659–7669CrossRef Yao D, Wen M, Liang X, Fu Z, Zhang K, Yang B (2019) Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J 6(5):7659–7669CrossRef
55.
Zurück zum Zitat Yu Z-H, Chin W-L (2015) Blind false data injection attack using pca approximation method in smart grid. IEEE Trans Smart Grid 6(3):1219–1226CrossRef Yu Z-H, Chin W-L (2015) Blind false data injection attack using pca approximation method in smart grid. IEEE Trans Smart Grid 6(3):1219–1226CrossRef
Metadaten
Titel
Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection
verfasst von
Harshit Jain
Mukul Kumar
Amit M. Joshi
Publikationsdatum
03.09.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Electrical Engineering / Ausgabe 1/2022
Print ISSN: 0948-7921
Elektronische ISSN: 1432-0487
DOI
https://doi.org/10.1007/s00202-021-01380-9

Weitere Artikel der Ausgabe 1/2022

Electrical Engineering 1/2022 Zur Ausgabe