Skip to main content

A GAN-Based Real-Time Covert Energy Theft Attack Against Data-Driven Detectors

  • Conference paper
  • First Online:
Tools for Design, Implementation and Verification of Emerging Information Technologies (TridentCom 2022)

Abstract

The advanced metering infrastructure (AMI) system has been rapidly established around the world, effectively improving the communication capability of the power system. Problematically, it turns out malicious users can easily commit energy theft by tampering with smart meters. Thus, many data-driven methods have been proposed to detect energy theft in AMI. However, existing detection schemes lack consideration for well-planned covert attacks, making them vulnerable. This paper proposes a real-time covert attack model based on conditional generative adversarial network (CGAN). In particular, based on the transferability of adversarial samples, we first extract the data features that the malicious detection model focuses on during the detection process. Then, we utilize these extracted features and a generator to generate adversarial perturbations that can mislead malicious detection models. Finally, to make the generated perturbations more stealthy, a discriminator is used to simulate malicious detection models to correct them. Extensive experiments demonstrate that our proposed attack method can evade most current detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yao, D., Wen, M., Liang, X., et al.: Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J. 6(5), 7659–7669 (2019)

    Article  Google Scholar 

  2. Cui, L., Guo, L., Gao, L., et al.: A covert electricity-theft cyber-attack against machine learning-based detection models. IEEE Trans. Ind. Inform. 18(11), 7824–7833 (2021)

    Article  Google Scholar 

  3. Zhao, Y., Qu, Y., Xiang, Y., et al.: A comprehensive survey on edge data integrity verification: fundamentals and future trends. arXiv preprint arXiv:2210.10978 (2022)

  4. Ilyas, A., Santurkar, S., Tsipras, D., et al.: Adversarial examples are not bugs, they are features. In: Advances in Neural Information Processing Systems, vol. 32 (2019)

    Google Scholar 

  5. Szegedy, C., Zaremba, W., Sutskever, I., et al.: Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)

  6. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)

  7. Zheng, Z., Yang, Y., Niu, X., et al.: Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans. Industr. Inf. 14(4), 1606–1615 (2017)

    Article  Google Scholar 

  8. He, Y., Mendis, G.J., Wei, J.: Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)

    Article  Google Scholar 

  9. Lu, X., Zhou, Y., Wang, Z., et al.: Knowledge embedded semi-supervised deep learning for detecting non-technical losses in the smart grid. Energies 12(18), 3452 (2019)

    Article  Google Scholar 

  10. Goodfellow, I., Pouget-Abadie, J., Mirza, M., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27 (2014)

    Google Scholar 

  11. Mirza, M., Osindero, S.: Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 (2014)

  12. Liu, X., Hsieh, C.J.: Rob-GAN: generator, discriminator, and adversarial attacker. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 11234–11243 (2019)

    Google Scholar 

  13. Jandial, S., Mangla, P., Varshney, S., et al.: AdvGAN++: harnessing latent layers for adversary generation. In: Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops (2019)

    Google Scholar 

  14. Ying, H., Ouyang, X., Miao, S., et al.: Power message generation in smart grid via generative adversarial network. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 790–793. IEEE (2019)

    Google Scholar 

  15. Bai, T., Zhao, J., Zhu, J., et al.: Toward efficiently evaluating the robustness of deep neural networks in IoT systems: a GAN-based method. IEEE Internet Things J. 9(3), 1875–1884 (2021)

    Article  Google Scholar 

  16. Chen, R., Chen, J., Zheng, H., et al.: Salient feature extractor for adversarial defense on deep neural networks. Inf. Sci. 600, 118–143 (2022)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the Scientific and Technologial Innovation Programs of Higher Education Institutions in Shanxi, China (No. 2020L0338) and the Shanxi Key Research and Development Program (No. 202102020101002 and 202102020101005) and the Fundamental Research Funds for the Central Universities (No. 2042022kf0021).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ding, Z., Wu, F., Cui, L., Hu, X., Xie, G. (2023). A GAN-Based Real-Time Covert Energy Theft Attack Against Data-Driven Detectors. In: Yu, S., Gu, B., Qu, Y., Wang, X. (eds) Tools for Design, Implementation and Verification of Emerging Information Technologies. TridentCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 489. Springer, Cham. https://doi.org/10.1007/978-3-031-33458-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-33458-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-33457-3

  • Online ISBN: 978-3-031-33458-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics