Skip to main content
Log in

Edge computing enabled non-technical loss fraud detection for big data security analytic in Smart Grid

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With the fast development of Smart Grid globally, the security issues arise sharply and Non-Technical Loss (NTL) fraud is one of the major security issues. There are some existing NTL fraud detectors, however, when big data security challenges emerge in Smart Grid, none of them can detect NTL fraud for big data in Smart Grid. In this paper, we propose ENFD, an NTL detection scheme enabled by Edge Computing and big data analytic tools to address big data NTL fraud detection problem in Smart Grid. The research work provides us with experience of developing big data security solutions in Smart Grid. The experimental results show that ENFD can efficiently detect big data NTL frauds which cannot be detected by the state-of-the-art detectors. ENFD can detect small data NTL frauds as well and the average detection speed is about six to seven times that of the fastest detector exists in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Berthier R, Sanders WH (2013) Monitoring advanced metering infrastructures with amilyzer. In: Cyber-security of SCADA & industrial control systems

  • Biscarri F, Monedero I, León C, Guerrero J, Biscarri J, Millán R (2009) A mining framework to detect non-technical losses in power utilities. In: Proceedings of the 11th international conference on enterprise information systems - artificial intelligence and decision support systems (ICEIS’09), pp 97–102

  • Cavdarl IH (2004) A solution to remote detection of illegal electricity usage via power line communications. IEEE Trans Power Deliv 19:1663–1667

    Article  Google Scholar 

  • Costa BC, Alberto BLA, Portela AM, Maduro W, Eler EO (2013) Fraud detection in electric power distribution networks using an ann-based knowledge-discover process. Int Artif Intell Appl (IJAIA) 4(6):11–23

    Google Scholar 

  • Depuru S, Wang L, Devabhaktuni V (2011) Support vector machine based data classification for detection of electricity theft. In: Proceedings of IEEE/PES power systems conference and exposition (PSCE), pp 1–8

  • dos Angelos EWS, Saavedra OR, Cortés OAC, de Souza AN (2011) Detection and identification of abnormalities in customer consumptions in power distribution systems. IEEE Trans Power Deliv 26(4):2436–2442

    Article  Google Scholar 

  • Edison SC (2019) Southern california edison service territory. https://www.sce.com/about-us/who-we-are/leadership/our-service-territory. Accessed 14 Jan 2019

  • Fang R, Wang J, Sun W (2018) Cross-layer control of wireless sensor network for smart distribution grid. Int J Sens Netw 27(2):71–84

    Article  Google Scholar 

  • Gas M, Company E (2010) Managing energy costs in office buildings. https://www.mge.com/images/PDF/Brochures/business/ManagingEnergyCostsInOfficeBuildings.pdf. Accessed 14 Jan 2019

  • Gaushell D, Darlington H (2005) Supervisory control and data acquisition. Proc IEEE 75(3):1645–1658

    Google Scholar 

  • Han W, Xiao Y (2014) NFD: a practical scheme to detect non-technical loss fraud in smart grid. In: Proceedings of the 2014 international conference on communications (ICC’14), pp 605–609

  • Han W, Xiao Y (2016a) Big data security analytic for smart grid with fog nodes. In: In Proceedings of the 9th international conference on security, privacy and anonymity in computation, communication and storage (SpaCCS 2016), pp 59–69

  • Han W, Xiao Y (2016b) Combating TNTL: Non-technical loss fraud targeting time-based pricing in smart grid. In: The 2nd international conference on cloud computing and security (ICCCS 2016)

  • Han W, Xiao Y (2016c) Design a fast non-technical loss fraud detector in smart grid. (Wiley J) Secur Commun Netw 9(18):5116–5132

    Article  Google Scholar 

  • Han W, Xiao Y (2016d) FNFD: a fast scheme to detect and verify non-technical loss fraud in smart grid. In: International workshop on traffic measurements for cybersecurity (WTMC’16), pp 24–34. https://doi.org/10.1145/2903185.2903188

  • Han W, Xiao Y (2016e) Non-technical loss fraud in advanced metering infrastructure in smart grid. In: The 2nd International conference on cloud computing and security (ICCCS 2016)

  • Han W, Xiao Y (2016f) Privacy preserving for v2g networks in smart grid: a survey. Comput Commun 91–92:17–28

    Article  Google Scholar 

  • Han W, Xiao Y (2017a) Cybersecurity in internet of things—big data analytics. In: Savas O, Deng J (eds) Big data analytics for cybersecurity, chap 10. Taylor & Francis Group, UK

    Google Scholar 

  • Han W, Xiao Y (2017b) NFD: Non-technical loss fraud detection in smart grid. Comput Secur 65(18):187–201

    Article  Google Scholar 

  • Han W, Xiong W, Xiao Y, Ellabidy M, Vasilakos AV, Xiong N (2012) A class of non-statistical traffic anomaly detection in complex network systems. In: Proceedings of the 32nd international conference on distributed computing systems workshops (ICDCSW’12), pp 640–646

  • Hayes MH (1996) Recursive least squares. In: Statistical digital signal processing and modeling, chap 9.4. Wiley, NY, p 570

    Google Scholar 

  • Hosni I, Hamdi N (2017) Distributed cooperative spectrum sensing with wireless sensor networkcluster architecture for smart grid communications. Int J Sens Netw 24(2):118–124

    Article  Google Scholar 

  • Huang SC, Lo YL, Lu CN (2013) Non-technical loss detection using state estimation and analysis of variance. IEEE Trans Power Syst 28(3):2959–2966

    Article  Google Scholar 

  • IBM (2015) Managing big data for smart grids and smart meters. http://www-935.ibm.com/services/multimedia/Managing_big_data_for_smart_grids_and_smart_meters.pdf. Accessed 14 Jan 2019

  • Jow J, Xiao Y, Han W (2017) A survey of intrusion detection systems in smart grid. Int J Sens Netw 23(3):170–186

    Article  Google Scholar 

  • Kong H, Hong M, Kim T (2018) Security risk assessment framework for smart car using the attack tree analysis. J Ambient Intell Hum Comput 9(3):531–551

    Article  Google Scholar 

  • Laboratory NRE (2019a) Households consumption data set. https://catalog.data.gov/dataset/impact-of-uncoordinated-plug-in-electric-vehicle-charging-on-residential-power-demand-supp-31006. Accessed 14 Jan 2019

  • Laboratory NRE (2019b) Pevs consumption data set. https://catalog.data.gov/dataset/impact-of-uncoordinated-plug-in-electric-vehicle-charging-on-residential-power-demand-supp-31006. Accessed 14 Jan 2019

  • Lin CH, Chen SJ, Kuo CL, Chen JL (2014) Non-cooperative game model applied to an advanced metering infrastructure for non-technical loss screening in micro-distribution systems. IEEE Trans Smart Grid 5(5):2468–2469

    Article  Google Scholar 

  • Liu J, Xiao Y, Li S, Liang W, Chen CLP (2012) Cyber security and privacy issues in smart grids. IEEE Commun Surv Tutor 14(4):981–997

    Article  Google Scholar 

  • Liu C, Ghosal S, Jiang Z, Sarkar S (2017) An unsupervised anomaly detection approach using energy-based spatiotemporal graphical modeling. Cyber-Phys Syst 3(1–4):66–102

    Article  Google Scholar 

  • McCary E, Xiao Y (2017) Malicious device inspection home area network in smart grids. Int J Sens Netw 25(1):45–62

    Article  Google Scholar 

  • McLaughlin S, Holbert B, Zonouz S, Berthier R (2012) AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures. In: Proceedings of the 2012 IEEE third international conference on smart grid communications (SmartGridComm’12), pp 354–359

  • Mohammad N, Baru A, Arafat M (2013) A smart prepaid energy metering system to control electricity theft. In: Proceedings of the Int’l Conf. on power, energy and control, pp 562–565

  • Pasdar A, Mirzakuchaki S (2007) A solution to remote detecting of illegal electricity usage based on smart metering. In: Proceedings of the 2nd Int’l workshop on soft computing applications, pp 163–167

  • Rassam MA, Maarof M, Zainal A (2018) A distributed anomaly detection model for wireless sensor networks based on the one-class principal component classifier. Int J Sens Netw 27(3):200–214

    Article  Google Scholar 

  • Ray PD, Reed C, Gray J, Agarwal A, Seth S (2012) Improving roi on big data through formal security and efficiency risk management for interoperating ot and it systems. http://www.gridwiseac.org/pdfs/forum_papers12/ray_reed_gray_agarwal_seth_paper_gi12.pdf. Accessed 14 Jan 2019

  • Renaut RA (1998) A parallel multisplitting solution of the least squares problem. Numer Linear Algeba Appl 5:11–31

    Article  MathSciNet  Google Scholar 

  • Rengaraju P, Pandian SR, Lung CH (2014) Communication networks and non-technical energy loss control system for smart grid networks. In: Proceedings of the 2014 IEEE innovative smart grid technologies—Asia (ISGT ASIA), pp 418–423

  • Repository TUT (2017) Umass smart* apartment dataset. http://traces.cs.umass.edu/index.php/Smart/Smart. Accessed 14 Jan 2019

  • Repository UML (2019) Individual household electric power consumption data set. https://archive.ics.uci.edu/ml/datasets/individual+household+electric+power+consumption. Accessed 14 Jan 2019

  • Sun L, He J (2019) An extensibleframework for ecg anomaly detection in wireless body sensor monitoring systems. Int J Sens Netw 29(2):101–110

    Article  Google Scholar 

  • Venticinque S, Amato A (2019) A methodology for deployment of iot application in fog. J Ambient Intell Hum Comput 10(5):1955–1976

    Article  Google Scholar 

  • Wijayakulasooriya J, Dasanayake D, Muthukumarana P, Kumara H, Thelisinghe L (2006) Remotely accessible single phase energy measuring system. In: Proceedings of the 1st Int’l Conf. on industrial and information systems, pp 304–309

  • Xia X, Liang W, Xiao Y, Zheng M (2015a) BCGI: A fast approach to detect malicious meters in neighborhood area smart grid. In: Proceedings of the 50th international conference on communications (ICC’15), pp 7228–7233

  • Xia X, Liang W, Xiao Y, Zheng M, Xiao Z (2015b) Difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids. In: Proceedings of the 50th international conference on communications (ICC’15), pp 802–807

  • Xiao Z, Xiao Y, Du D (2013) Exploring malicious meter inspection in neighborhood area smart grids. IEEE Trans Smart Grid 4(1):214–226

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xiao.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, W., Xiao, Y. Edge computing enabled non-technical loss fraud detection for big data security analytic in Smart Grid. J Ambient Intell Human Comput 11, 1697–1708 (2020). https://doi.org/10.1007/s12652-019-01381-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01381-4

Keywords

Navigation