Abstract
Smart Grid employs Advanced Metering Infrastructure (AMI) to automatically manage metering and billing processes supporting various advanced features. Electricity theft is not limited to the traditional methods, such as bypassing power lines. In Smart Grid, adversaries could gain illegal benefit from the utility via various new ways, and we call this class of behavior as Non-Technical Loss (NTL) fraud. In this paper, we study various security issues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xiao, Z., Xiao, Y., Du, D.: Building accountable smart grids in neighborhood area networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5, December 2011
Xiao, Z., Xiao, Y., Du, D.: Non-repudiation in neighborhood area networks for smart grid. IEEE Commun. Mag. 51(1), 18–26 (2013)
Han, W., Xiao, Y.: IP\(^2\)DM for V2G networks in smart grid. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 782–787, June 2015
Han, W., Xiao, Y.: FNFD: a fast scheme to detect and verify non-technical loss fraud in smart grid. In: International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), Xi’an, China, pp. 24–34, 30 May 2016. doi:10.1145/2903185.2903188
Han, W., Xiong, W., Xiao, Y., Ellabidy, M., Vasilakos, A.V., Xiong, N.: A class of non-statistical traffic anomaly detection in complex network systems. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW 2012), pp. 640–646, June 2012
Gao, J., Liu, J., Rajan, B., Nori, R., Fu, B., Xiao, Y., Liang, W., Chen, C.L.P.: Scada communication and security issues. J. Secur. Commun. Netw. 7(1), 175–194 (2014)
McLaughlin, S., Holbert, B., Zonouz, S., Berthier, R.: AMIDS: a multi-sensor energy theft detection framework for advanced metering infrastructures. In: Proceedings of the 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm 2012), pp. 354–359, November 2012
Han, W., Xiao, Y.: NFD: a practical scheme to detect non-technical loss fraud in smart grid. In: Proceedings of the 2014 International Conference on Communications (ICC 2014), pp. 605–609, June 2014
Xia, X., Liang, W., Xiao, Y., Zheng, M.: BCGI: a fast approach to detect malicious meters in neighborhood area smart grid. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 7228–7233, June 2015
Xia, X., Liang, W., Xiao, Y., Zheng, M., Xiao, Z.: Difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 802–807, June 2015
Han, W., Xiao, Y.: CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid. In: Yang, Q., Yu, W., Challal, Y. (eds.) WASA 2016. LNCS, vol. 9798, pp. 47–55. Springer, Heidelberg (2016). doi:10.1007/978-3-319-42836-9_5
Liu, J., Xiao, Y., Gao, J.: Achieving accountability in smart grids. IEEE Syst. J. 8(2), 493–508 (2014)
Han, W., Xiao, Y.: Non-technical loss fraud in advanced metering infrastructure in smart grid. In: The 2nd International Conference on Cloud Computing and Security (ICCCS 2016), Part II. LNCS, vol. 10040, Nanjing, China (2016). doi:10.1007/978-3-319-48674-1_15
Skopik, F., Ma, Z., Bleier, T., Grneis, H.: A survey on threats and vulnerabilities in smart metering infrastructures. Int. J. Smart Grid Clean Energ. 1(1), 22–28 (2012)
McLaughlin, S., Podkuiko, D., Delozier, A., Miadzvezhanka, S., McDaniel, P.: Embedded firmware diversity for smart electric meters. In: Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec 2010), pp. 1–6, August 2010
Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart grid security issues. IEEE Secur. Priv. 1(8), 71–85 (2010)
Utility-scale smart meter deployments: building block of the evolving power grid (2014). http://www.edisonfoundation.net/iei/Documents/IEI_SmartMeterUpdate_0914.pdf. Accessed 7 Jan 2016
Smartgrid, aeic ami interoperability standard guidelines for ansi c12.19, ieee 1377, mc12.19 end device communications, supporting enterprise devices, networks, related accessories (2013). http://aeic.org/wp-content/uploads/2013/07/AEIC-Guidelines-v2.1-2012-07-26clean.pdf
Moise, A., Beroset, E., Phinney, T., Burns, M.: EAX’ cipher mode (2011). http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/eax-prime/eax-prime-spec.pdf. Accessed May 2011
Minematsu, K., Lucks, S., Morita, H., Iwata, T.: Attacks and security proofs of eax-prime. In: Proceedings of the 20th International Workshop on Fast Software Encryption, pp. 327–347, March 2013
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2003), pp. 452–473, December 2003
Acknowledgement
This work was supported in part by the National Nature Science Foundation of China under the Grant 61374200, and the National Science Foundation (NSF) under Grant CNS-1059265.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Han, W., Xiao, Y. (2016). Non-Technical Loss Fraud in Advanced Metering Infrastructure in Smart Grid. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-48674-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48673-4
Online ISBN: 978-3-319-48674-1
eBook Packages: Computer ScienceComputer Science (R0)