Skip to main content

Non-Technical Loss Fraud in Advanced Metering Infrastructure in Smart Grid

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10040))

Included in the following conference series:

Abstract

Smart Grid employs Advanced Metering Infrastructure (AMI) to automatically manage metering and billing processes supporting various advanced features. Electricity theft is not limited to the traditional methods, such as bypassing power lines. In Smart Grid, adversaries could gain illegal benefit from the utility via various new ways, and we call this class of behavior as Non-Technical Loss (NTL) fraud. In this paper, we study various security issues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiao, Z., Xiao, Y., Du, D.: Building accountable smart grids in neighborhood area networks. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5, December 2011

    Google Scholar 

  2. Xiao, Z., Xiao, Y., Du, D.: Non-repudiation in neighborhood area networks for smart grid. IEEE Commun. Mag. 51(1), 18–26 (2013)

    Article  Google Scholar 

  3. Han, W., Xiao, Y.: IP\(^2\)DM for V2G networks in smart grid. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 782–787, June 2015

    Google Scholar 

  4. Han, W., Xiao, Y.: FNFD: a fast scheme to detect and verify non-technical loss fraud in smart grid. In: International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), Xi’an, China, pp. 24–34, 30 May 2016. doi:10.1145/2903185.2903188

  5. Han, W., Xiong, W., Xiao, Y., Ellabidy, M., Vasilakos, A.V., Xiong, N.: A class of non-statistical traffic anomaly detection in complex network systems. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW 2012), pp. 640–646, June 2012

    Google Scholar 

  6. Gao, J., Liu, J., Rajan, B., Nori, R., Fu, B., Xiao, Y., Liang, W., Chen, C.L.P.: Scada communication and security issues. J. Secur. Commun. Netw. 7(1), 175–194 (2014)

    Article  Google Scholar 

  7. McLaughlin, S., Holbert, B., Zonouz, S., Berthier, R.: AMIDS: a multi-sensor energy theft detection framework for advanced metering infrastructures. In: Proceedings of the 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm 2012), pp. 354–359, November 2012

    Google Scholar 

  8. Han, W., Xiao, Y.: NFD: a practical scheme to detect non-technical loss fraud in smart grid. In: Proceedings of the 2014 International Conference on Communications (ICC 2014), pp. 605–609, June 2014

    Google Scholar 

  9. Xia, X., Liang, W., Xiao, Y., Zheng, M.: BCGI: a fast approach to detect malicious meters in neighborhood area smart grid. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 7228–7233, June 2015

    Google Scholar 

  10. Xia, X., Liang, W., Xiao, Y., Zheng, M., Xiao, Z.: Difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 802–807, June 2015

    Google Scholar 

  11. Han, W., Xiao, Y.: CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid. In: Yang, Q., Yu, W., Challal, Y. (eds.) WASA 2016. LNCS, vol. 9798, pp. 47–55. Springer, Heidelberg (2016). doi:10.1007/978-3-319-42836-9_5

    Chapter  Google Scholar 

  12. Liu, J., Xiao, Y., Gao, J.: Achieving accountability in smart grids. IEEE Syst. J. 8(2), 493–508 (2014)

    Article  MathSciNet  Google Scholar 

  13. Han, W., Xiao, Y.: Non-technical loss fraud in advanced metering infrastructure in smart grid. In: The 2nd International Conference on Cloud Computing and Security (ICCCS 2016), Part II. LNCS, vol. 10040, Nanjing, China (2016). doi:10.1007/978-3-319-48674-1_15

    Google Scholar 

  14. Skopik, F., Ma, Z., Bleier, T., Grneis, H.: A survey on threats and vulnerabilities in smart metering infrastructures. Int. J. Smart Grid Clean Energ. 1(1), 22–28 (2012)

    Article  Google Scholar 

  15. McLaughlin, S., Podkuiko, D., Delozier, A., Miadzvezhanka, S., McDaniel, P.: Embedded firmware diversity for smart electric meters. In: Proceedings of the 5th USENIX Conference on Hot Topics in Security (HotSec 2010), pp. 1–6, August 2010

    Google Scholar 

  16. Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart grid security issues. IEEE Secur. Priv. 1(8), 71–85 (2010)

    Google Scholar 

  17. Utility-scale smart meter deployments: building block of the evolving power grid (2014). http://www.edisonfoundation.net/iei/Documents/IEI_SmartMeterUpdate_0914.pdf. Accessed 7 Jan 2016

  18. Smartgrid, aeic ami interoperability standard guidelines for ansi c12.19, ieee 1377, mc12.19 end device communications, supporting enterprise devices, networks, related accessories (2013). http://aeic.org/wp-content/uploads/2013/07/AEIC-Guidelines-v2.1-2012-07-26clean.pdf

  19. Moise, A., Beroset, E., Phinney, T., Burns, M.: EAX’ cipher mode (2011). http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/eax-prime/eax-prime-spec.pdf. Accessed May 2011

  20. Minematsu, K., Lucks, S., Morita, H., Iwata, T.: Attacks and security proofs of eax-prime. In: Proceedings of the 20th International Workshop on Fast Software Encryption, pp. 327–347, March 2013

    Google Scholar 

  21. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2003), pp. 452–473, December 2003

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by the National Nature Science Foundation of China under the Grant 61374200, and the National Science Foundation (NSF) under Grant CNS-1059265.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Han, W., Xiao, Y. (2016). Non-Technical Loss Fraud in Advanced Metering Infrastructure in Smart Grid. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10040. Springer, Cham. https://doi.org/10.1007/978-3-319-48674-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48674-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48673-4

  • Online ISBN: 978-3-319-48674-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics