期刊
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
卷 15, 期 -, 页码 361-374出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2019.2921232
关键词
Smart grid; electricity theft; suspicion assessment; malicious meter inspection; security
资金
- National Key Research and Development Program of China [2017YFE0101300]
- U.S. National Science Foundation [CNS-1059265]
- National Natural Science Foundation of China [61374200, 71661147005, 61702403]
- Key Research and Development Plan of Jiangxi Province [20181ACE50029]
- National Natural Science Foundation of Shaanxi Province [2019ZDLGY13-09, 2019CGXNG-023]
Integrated with cutting-edge equipment and technologies, smart grid takes prominent advantages over traditional power systems. However, hardware and software techniques also bring smart grid numerous security concerns, especially various cyberattacks. Malicious users can launch cyberattacks to tamper with smart meters anytime and anywhere, mainly for the purpose of stealing electricity. This makes electricity theft much easier to commit and more difficult to detect. Researchers have devised many approaches to identify malicious users. However, these approaches suffer from either poor accuracy or expensive cost of deploying monitoring devices. This paper aims to locate malicious users using a limited number of monitoring devices (called inspectors) within the shortest detection time. Before inspectors conduct any inspection, suspicions that users steal electricity are comprehensively assessed, mainly through analyzing prior records of electricity theft as well as deviations between the reported and predicted normal consumptions. On the basis of these suspicions, we further propose a suspicion assessment-based inspection (SAI) algorithm, in which the users with the highest suspicions will be first probed individually. Then, the other users will be probed by a binary tree-based inspection strategy. The binary tree is built according to users' suspicions. The inspection order of the nodes on the binary tree is also determined by the suspicions. The experiment results show that the SAI algorithm outperforms the existing methods.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据