Skip to main content

CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9798))

Abstract

We newly discovered a potential fraud in Smart Grid, called colluded non-technical loss fraud. Different from the traditional non-technical loss frauds where there is only one independent adversary, a colluded non-technical loss fraud happens when a smart meter is tampered by one or more co-existing or collaborating adversaries. The behavior of one adversary may be covered by others and cannot be detected easily by the traditional detection methods. We propose Colluded Non-Technical Loss Fraud Detection (CNFD), a scheme to detect colluded non-technical loss frauds in Smart Gird. CNFD adopts recursive least squares to identify a tampered meter and then to differentiate adversaries based on their mathematical features. Experimental results show that CNFD can detect colluded non-technical loss frauds and can differentiate different adversaries on the same meter.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Han, W., Xiao, Y.: IP\(^2\)DM for V2G networks in smart grid. In: Proceedings of the 50th International Conference on Communications (ICC 2015), pp. 782–787, June 2015

    Google Scholar 

  2. Northeast, Group, and LLC: Emerging markets smart grid: outlook 2015, December 2014. http://www.northeast-group.com/reports/Brochure-Emerging%20Markets%20Smart%20Grid-Outlook%202015-Northeast%20Group.pdf

  3. Xiao, Z., Xiao, Y., Du, D.: Non-repudiation in neighborhood area networks for smart grid. IEEE Commun. Mag. 51(1), 18–26 (2013)

    Article  Google Scholar 

  4. Xiao, Z., Xiao, Y., Du, D.: Exploring malicious meter inspection in neighborhood area smart grids. IEEE Trans. Smart Grid 4(1), 214–226 (2013)

    Article  Google Scholar 

  5. Xia, X., Liang, W., Xiao, Y., Zheng, M., Xiao, Z.: Difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids. In: Proceedings of the 50th International Conference on Communications (ICC 2015), pp. 802–807, June 2015

    Google Scholar 

  6. Xia, X., Liang, W., Xiao, Y., Zheng, M.: BCGI: a fast approach to detect malicious meters in neighborhood area smart grid. In: Proceedings of the 50th International Conference on Communications (ICC 2015), pp. 7228–7233, June 2015

    Google Scholar 

  7. Han, W., Xiao, Y.: NFD: a practical scheme to detect non-technical loss fraud in smart grid. In: Proceedings of the 50th International Conference on Communications (ICC 2014), pp. 605–609, June 2014

    Google Scholar 

  8. Han, W., Xiao, Y.: FNFD: a fast scheme to detect and verify non-technical loss fraud in smart grid. International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016) (2016). doi:10.1145/2903185.2903188

  9. Hayes, M.H.: Recursive least squares. In: Hayes, M.H. (ed.) Statistical Digital Signal Processing and Modeling, p. 154. Wiley, New York (1996). Chapter 9.4

    Google Scholar 

  10. Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.L.P.: Cyber security, privacy issues in smart grids. IEEE Commun. Surv. Tutorials 14(4), 981–997 (2012)

    Article  Google Scholar 

  11. Wijayakulasooriya, J.V., Dasanayake, D., Muthukumarana, P.I., Kumara, H., Thelisinghe, L.: Remotely accessible single phase energy measuring system. In: Proceedings of the 1st International Conference on Industrial and Information Systems, pp. 304–309, August 2006

    Google Scholar 

  12. Pasdar, A., Mirzakuchaki, S.: A solution to remote detecting of illegal electricity usage based on smart metering. In: Proceedings of the 2nd International Workshop on Soft Computing Applications, pp. 163–167, August 2007

    Google Scholar 

  13. Han, W., Xiong, W., Xiao, Y., Ellabidy, M., Vasilakos, A.V., Xiong, N.: A class of non-statistical traffic anomaly detection in complex network systems. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW 2012), pp. 640–646, June 2012

    Google Scholar 

  14. Gaushell, D.J., Darlington, H.T.: Supervisory control and data acquisition. Proc. IEEE 75(3), 1645–1658 (2005)

    Google Scholar 

  15. Berthier, R., Sanders, W.H.: Monitoring advanced metering infrastructures with amilyzer. Cyber-security of SCADA & Industrial Control Systems (2013)

    Google Scholar 

  16. Depuru, S.S.S.R., Wang, L., Devabhaktuni, V.: Support vector machine based data classification for detection of electricity theft. In: Proceedings of IEEE/PES Power Systems Conference and Exposition (PSCE), pp. 1–8, March 2011

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under the grant 61374200, and the National Science Foundation (NSF) under grant CNS-1059265.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Han, W., Xiao, Y. (2016). CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid. In: Yang, Q., Yu, W., Challal, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2016. Lecture Notes in Computer Science(), vol 9798. Springer, Cham. https://doi.org/10.1007/978-3-319-42836-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42836-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42835-2

  • Online ISBN: 978-3-319-42836-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics