Sie sind auf Seite 1von 10

Noname manuscript No.

(will be inserted by the editor)

A Survey of Energy Theft Detection Approaches in Smart


Meters
Divam Lehri1 · Arjun Choudhary1

Received: date / Accepted: date

Abstract Stealing of electricity through meter tam- 1 Introduction


pering has always been a major cause not only for loss of
revenue to the governments but also for irregular elec- Since last decade numerous efforts have been made by
tricity supply. Advanced Metering Infrastructure (A- the governments & distribution companies to counter
MI) has replaced traditional analog devices with the electricity theft but it still remains a challenge. The
digital ones like smart meters thereby enabling bidi- entire loss suffered by the power sector is known as
rectional flow of information between the utility & con- Transmission & Distribution Losses (TD Losses) which
sumers via communication network. This two way com- comprises of an aggregate of Technical Losses (TL) &
munication has the potential to flat the demand & sup- Non Technical Losses (NTL).
ply curve between the utility companies & consumers. TD losses represent the difference between the electric-
However with the adoption of new technology such as ity generated and the electricity consumed. Technical
smart grid new security challenges have emerged. Al- Losses are those losses which are internal to the sys-
though smart meters may have provided an edge over tem such as energy dissipation by the electrical equip-
traditional methods of stealing electricity, they have ments used in distribution lines, transformers, transmis-
opened doors for next generation of hackers. In this sion lines and iron losses in transformers. On the oth-
paper we have provided an overview of various energy er hand, NTL constitute losses arising due to defective
theft detection techniques in Smart Meters along with meters, errors in billing, flaws in supply, unmetered con-
their implementation challenges with context to Indian nections and malicious activities by the consumer such
Power Sector. A comprehensive performance compari- as tampering of meter. Table 1 provides an overview of
son between different available approaches is attributed different types of electricity losses caused by different
& a distinguished attack technique at the hardware lev- components of power sector.
el is also being proposed.

Table 1 Classification of Methods of Electricity Theft


Keywords Energy Theft, Tampering, Cyber Security,
Smart Grid, Smart Meter, Advanced Metering Elements Methods of Theft
Meters Bypassing the meter
Infrastructure (AMI) Deliberately damaging the
meter seals or removing of
the meter
Divam Lehri Wires/ Cables Illegal tapping to bare wires
lehridivam@gmail.com or underground cables
Transformers Illegal tapping of trans-
Arjun Choudhary former terminals and junc-
a.choudhary@policeuniversity.ac.in tion boxes of overhead lines
1 Billing Irregularities Errors made by meter read-
Department of Computer Science & Engineering
Sardar Patel University of Police ers
Security and Criminal Justice Unpaid Bills Unpaid bills by individuals
Jodhpur, India or institutions
2 Divam Lehri1 , Arjun Choudhary1

The easiest way to determine the amount of non- theft resistant but they are capable of minimizing the
technical losses (NTL) is by merely calculating the tech- number of theft cases due to their immunity against
nical losses (TL) in the system & subtracting it from traditional electricity theft methods as well as the real
total losses (TD). time monitoring of data between the utility companies
We can evaluate it as follows: and the consumers.
Due to the complex architecture and large attack
NTL = Total Energy Losses (TD) - TL (1) surface of Advanced Metering Infrastructure (AMI), S-
mart Meters are vulnerable to tampering thereby re-
Total Energy Losses = Energy Supplied - Bills paid quiring effective theft prevention & detection techniques.
(2) In this paper, we present a survey of available energy
theft detection techniques.
Some of the losses such as TL are unavoidable. The
energy theft in India is majorly due to unmetered usage
of electricity. The concept of Transmission and Distri-
bution (TD) losses has been extended further to Aggre-
gate Technical & Commercial losses (AT&C). 2 Meter Tampering Methodologies
AT &C Losses = 1 − (BE × CE) × 100 (3)
There are various mechanisms through which an ad-
T &D Losses = 1 − (BE) × 100 (4) versary can tamper Smart Meters. Methods of meter
Where tampering can be divided into four classes:
Billing efficiency (BE)=
– Current related tampering methods
Total unit Billed / Total unit Inputs (5)
– Voltage related tampering methods
Collection efficiency (CE)= – Mechanical tampering methods
– Tampering by hacking and altering the memory
Revenue collected / Amount Billed (6)

TD loss is the difference in input energy and energy A summary of mechanisms that are generally used to
billed. There is no account for the losses arising due to tamper smart meters is presented in this section.
low collection. AT&C loss is the difference in input en-
ergy and energy for which revenue has been collected.
Simply stated AT& C Loss can be aggregated as:

AT&C Losses = TL + CL (7) 2.1 Swapping of Phase & Neutral Lines


In India, about 10–12% of AT&C losses are attributable
to technical reasons, while remaining 18–20% is due In this method of tampering the adversary interchanges
to commercial reasons [14] known as commercial losses the phase and neutral lines. The phase line from the u-
(CL). According to U.S Energy Information Adminis- tility is connected to the neutral connector at the input
tration (EIA)[32] in the countries with low rate of theft of the smart meter and the neutral line from the utility
and optimal technical efficiency TD losses generally s- is connected to the phase line connector at the input
pan between 6% to 8%. Fig.1 shows graphical repre- of the smart meter. This swapping of phase and neu-
sentation of AT&C loss percentage of different Indian tral lines reverses the energy flow thereby effecting the
states. billing calculation.
In such scenarios adoption of smart meters by the
government of India could prove as a game changer to
curb electricity theft. There is also a grave need to de-
velop a common framework in the country where gov-
ernments, manufacturers, research institutions, Distri-
bution system operators (DSOs) and academia work
with mutual cooperation to ensure resiliency,privacy
and security of smart grid. A paradigm of one such
framework is SEGRID Project [33] for European Dig-
ital Grid. While smart meters may not be completely Fig. 2 Actual connection
A Survey of Energy Theft Detection Approaches in Smart Meters 3

Fig. 1 A Visual Representation of State-wise AT&C Losses (%) for the period Apr’14-Mar’15, According to catalog available
on Open Government Data Platform (OGD),India.[15]

2.3 Neutral Missing

In this method of meter tampering the neutral line is


completely cut-off from the meter thereby resulting in
zero input voltage. Hence the power computed by the
Fig. 3 Swapping of Phase & Neutral Lines meter is zero.(Since P= V * I and for given condition
V = 0, therefore P = 0 ). This condition is also called
single wire operation [11].
2.2 Double Feeding

Double Feeding as the name suggests is a meter bypass-


ing technique where an additional feeder is connected
to the meter in such a manner that meter gets bypassed
& the energy consumption is not accounted for. Under
such scenario the meter will not record the consumption
for the load affixed to the supplementary feeder even if
the connection is legitimate. This type of tampering is Fig. 5 Actual Condition
generally done to connect any heavy electric appliance
so that it’s consumption remain unnoticed.

Fig. 4 Double Feeding Fig. 6 Neutral Missing


4 Divam Lehri1 , Arjun Choudhary1

2.4 Neutral Disturbance

In this method of tampering some noise (High Frequen-


cy voltage signals) is added to the neutral line of the
meter by connecting it through diode/variable resis-
tance/capacitor. The neutral of the meter gets deviated
from its original point and becomes unbalanced leading
less voltage recording by the meter and thus less energy
is recorded by the meter.

Fig. 9 Partial fault connection

2.7 Tampering using high Frequency/Voltage

In this type of meter tampering a remote controlled


device is placed in close proximity to the meter. The
device is capable of generating high electrostatic dis-
Fig. 7 Neutral Disturbance
charge. The discharge so generated causes a spark in
the meter thereby thwarting the meter from recording
2.5 Current Reversal by Connecting Input & Output the electricity consumption. Such method of theft is a
in Reverse concern as it does not leave any trace or evidence.

In this tampering event,the adversary connect the phase


and neutral wires to the wrong inputs. This causes the 2.8 Mechanical Tampering
current to change direction from it’s original path in
which it was intended to flow.The intention of this kind Mechanical tampering includes methods where the me-
of tampering is to reverse the route of current flow in ter is physically damaged in order to record less or no
order to hoodwink the billing calculation [2]. energy usage. In such type of tampering the electrical
characteristics of the components of the meter are al-
tered.Some of the conducts that amount to such type
of tampering are:
– Opening of the meter covers by breaking the meter
seals.
– Chemical injections inside meter body.
– Subjecting meter to external magnetic field.
– Burning the meter.
– Using jammer devices.

Fig. 8 Current reversal 3 Countermeasure Approaches Against


Energy Theft

2.6 Partial Earth Fault Condition Along with the adoption of new technologies such as
smart grid, a new era of attacks are expected to e-
It is a tampering method in which the load is connected merge. The government and the utilities are now be-
to the earth due to which the return current going back coming aware of these scenarios and are taking steps
to the meter is reduced. This generates a difference in towards mitigating next generation of threats. Rapid
the current flow in the neutral wire & phase wire leading developments in the AMI has attracted the attention of
to current in neutral wire become less than the current researchers from various organisations across the globe
in the phase wire. Under normal conditions, the current and a variety of approaches have been proposed to curb
in the phase wire and the neutral wire is equal. the menace of electricity theft. In this section we will
A Survey of Energy Theft Detection Approaches in Smart Meters 5

Fig. 10 Classification tree for Energy Theft Methods

provide a survey of the available approaches for energy such as consumption, profile, and external information
theft detection. along with other parameters is used to design the pro-
file. In general, fraud identification is formulated as a
classification problem which utilizes supervised learning
3.1 Game Theory Based Detection Technique approach over the historical dataset of fraud cases that
occurred in the past [1]. The main criterion for evalu-
In this technique the stealing of electricity is represent- ation is the (Odds Ratio) OR. OR may be computed
ed as a game sandwiched between the electricity thief between the falsified clients and the non-falsified clients
and distribution utility. It is a model projected on the known as ORPN, or between the falsified clients against
concept of game theory where the main objective of the all the clients not incorporated in any campaign, called
electricity thief is to whip a predetermined quantity of as ORPG. The ratios based on some of the features ob-
electricity and at the same time minimizing the possi- tained from the campaign are mentioned in Table I in
bility of being identified, whereas the electricity utility [1]. Based on probability a fraud score is computed for
desires to maximize the chance of detection and the each customer according to which the customer can be
level of operational cost it will sustain in administer- summarized as Fraudulent, Non-fraudulent and Absent.
ing this anomaly recognition operation [5]. However it However this methodology has performance challenges
still remains a challenge to construct a potential game in scenarios where rate of campaigns is excessively high
plan and all players that includes regulators, thieves, or the size of campaigns is on a large scale.
and distributors. Moreover, game theory is based on
assumption that the number of players participating in
the game are finite. In country like India which is one of 3.3 Linear Error Correction Block Codes
the largest in terms of population, equipping smart me-
ter in every household simply means a drastic increase Linear error-correcting block codes have a linear de-
in number of players which makes game theory difficult pendency between the bits of input message and the
to implement. parity bits. In other words the resultant of sum of any
two codewords is also a codeword. At the receiving end
these bits are utilized to detect and correct errors in
3.2 Supervised Learning Approach the transmission. A computation the total amount of
power in distinct combinations of the cables is comput-
In this approach load profiles for each customer is de- ed repetitively and then these readings are utilized to
veloped based upon the historical data which is used detect and correct errors in the meter readings [2]. In
as a classifier dataset. A pre-selection is made on the this approach the concept of syndrome decoding is ap-
subset of smart meters which are straightforwardly con- plied where a generator matrix (G) is used by sender to
firmed by the technicians within a specified region & generate the codeword and decoding matrix, also called
time. This process is carried out by the utility com- parity check matrix (H) is used by the receiver to detec-
pany and is referred to as campaign [1]. Information t and correct the errors. If G.H = 0, then the received
6 Divam Lehri1 , Arjun Choudhary1

codeword is correct. In case G.H 6= 0, we can determine in . The power consumption values along with other
the error using the position of non zero bit and correct instantaneous measurements are aggregated and sent
it. Additional meters, called check meters are used to back to the utility repeatedly after a fixed interval of
detect and correct single bit errors in meter readings. 30 minutes for calculation of NTL. Based on the thresh-
It is assumed that there are M check meters , which old value of NTL cases are classified as theft and non
are capable of computing the sum of energies of desired theft. Whenever NTL estimate is more than the thresh-
cable combinations [2]. However this Linear block code old value, it is assumed that there is a power theft in
detection mechanism is prone to magnetic interference the user group. Data from the first two days (no theft)
and can only detect that there is an error but could not is used to train the predictive model.
identify the actual meter on which the error exist.

3.6 Current Bypass anti-Tampering Algorithm


3.4 Dynamic Programming Algorithm Based on
Probabilistic Detection A single chip solution has been developed where an anti
tampering algorithm has been implemented on an ”AR-
A novel algorithm based on dynamic programming which M Coretext-M3 (STM32L152VB)” microcontroller. It
utilizes the tree structure of the distribution network is a low power micro controller operating at 32MHz us-
has been proposed. It makes use of Feeder Remote Ter- ing ”ADE7953 (Single Phase Smart Meter)” and ”ADE7878
minal Unit (FRTU), which is capable of measuring ana- (Three Phase Smart Meter)” Analog Devices [7]. The
log & digital signals and transmitting energy usage da- unbalance current difference ( Irr ) is calculated by ex-
ta back to the control unit wirelessly. It is possible to tracting data values from IRMSA (Ia ) and IRMSB (Ib )
track down the power consumption of the downstream registers of ADE7953, where current in phase line is de-
network commencing from FRTU by means of the infor- noted as Ia is the & current in neutral line is denoted as
mation gathered from FRTU. If the power consumption Ib . The unbalance current difference ( Irr ) is expressed
varies notably from the summation of the readings of in eq (1) of [7] as:
smart meters in the downstream network than at least
|Irr| = |I a − I b | ÷ (I a + I b ) (8)
one of the meters have been compromised [3]. The al-
gorithm aims to install minimum number of FRTUs in Verification of current bypass tampering event by the
power distribution networks due to cyber security con- smart meter is done by comparing the calculated Irr
cerns. Moreover the algorithm is optimized to increase value in (4) against the pre-defined threshold values
efficiency by utilizing solution pruning techniques. The which is 1% for the single-phase meter and 2.5% for
main parameters that the algorithm uses to determine the three-phase meter [7] . In case of any uneven event,
theft are the Attacking Probability and the Anomaly an interrupt is sent to the MCU. The MCU verifies the
Score which are defined in [3]. Based on the anomaly s- tampering event by examining the status bits in the
core it is decided whether a meter is anomalous or not. registers of ADE7953 and ADE7878.
The proposed algorithm works under the supposition
that the adversary can only attack the smart meter e-
quipped in her/his own apartment. It may not provide 3.7 Microprocessor Based Theft Control System
a fruitful solution in situations where adversary uses
advanced techniques such as remotely attacking me- The theft control system based on ARM-Cortex M3
ter in Neighbourhood Area Network (NAN). Another processor has been implemented to prevent the energy
probabilistic approach has been proposed in [20] which meter from tampering attacks such as disconnection of
provides an estimate of Technical and Non-Technical neutral line, disconnection of phase line, entire meter
Losses in a segregated manner. bypassing and meter tampering. This approach utilizes
the current difference in phase line and neutral line to
detect tampering event. Two current transformers, one
3.5 Temprature Dependent Predictive Model in each phase line and neutral line are inducted. In case
of any disconnected of either of the lines from the me-
”Temperature Dependent Technical Loss Model (TDTLM)”ter, there will be a significant drop in current measured
is the advancement of the ”Constant Resistance Techni- by the each current transformer [6]. This difference is
cal Loss Model(CRTLM)” [4] by making the resistance computed by the Micro controller by measuring curren-
temperature dependent. To estimate NTL, TDTLM u- t through ADC. In case of any irregular difference an
tilizes the property that there is a linear dependency SMS is sent to the electricity utility by the micro con-
between the resistance of material and its temperature troller. It can be integrated into exiting meters as well
A Survey of Energy Theft Detection Approaches in Smart Meters 7

as manufactured along with new meters. The module is different from other approaches as it classifies not
uses GSM network for communication which is already only suspected users but also classifies users without
well established in India. technical losses. Data mining is performed for fault &
theft sensing and to analyse load profiles of individual
customers. The neural network is trained with multiple
3.8 AMIDS Framework methods. Different neural network topologies are de-
veloped and at end of training the root mean square
Advanced Metering Infrastructure Intrusion Detection (RMS) value for each model is computed. The model
System (AMIDS) is a framework developed using an a- with minimum RMS value is presented as final neural
malgamation of variety of approaches for detection and network.
reporting of energy theft in smart meters. An attack
graph-based data fusion algorithm is used by AMIDS
to merge artefacts of ongoing attacks from numerous 3.11 Measuring Voltage Drop Between Smart Meters
sources [8]. The attack graph so composed is a directed
graph based on state which consists of different stages This approach shows that size of the voltage drop be-
from initial to final. To achieve information fusion on- tween two smart meters can be of great use to re-
line, the attack graph is considered as a Hidden Markov duce and identify unauthorized consumption.The con-
model (HMM). AMIDS make use of both a supervised cept is to seize data from the meter (voltage and power).
methodology that can compute individual application The condition is that transformer should be powered
usage and an unsupervised methodology that learns by by more than two consumers, because detection of u-
clustering load events. AMIDS takes into account nu- nauthorized spending is done by comparing the fall of
merous information sources to collect adequate amount voltage of each measuring point to the transformer. If
of evidence regarding an on-going attack prior to iden- the consumer is illegally connected to the front of the
tifying an action as a malicious energy theft. counter (meter) a drop of voltage will occur. [24]

3.9 Model Based on Harmonic Generators


3.12 EnergyLens
A model has been proposed in [17] which uses harmon-
ic sensors to determine the uncertanity in smart meter EnergyLens system intelligently integrates electricity
readings. The proposed model consists of energy meter, meter data with sensors on smartphones. It is expected
circuit breaker, ICS, harmonic sensor and com munica- that users using energy lens posses an android phone
tion system. Instant values from end user are commu- with the capability to sample microphone audio and
nicated to external control station (ECS) situated at WiFi signal strength. During initial phase users are re-
the utility company. ECS computes the non-technical quired to turn on electricity appliances which they wan-
loss and in case of loss being more than 5% it would t to get recognized by the energy lens. Users wait for
break the supply to the meter by indicating the con- some time for its power consumption to reach a steady
trol system to disconnect the customer. The core of state and then turn it off. Based on this data acquired,
the model is the harmonic sensor which compute the it is identified that when, where and by whom the ac-
uncertanity in meter reading based on total harmonic tivity is performed upon the execution of algorithm on
distortion (THD). In [18] this approach based on the the server [25]. However EnergyLens faces several chal-
harmonic generators is extended by placing two smart lenges such as acquisition of ground truth statistics for
meters with harmonic sensors and generators one at the building up the precision, the affect of phoneś direction
consumer end and one at the utility end which makes it & privacy of the customer.
possible to keep track of the generated power as well as
the consumed power. The difference in generated and
consumed power is calculated to determine the theft. 3.13 FNFD (FAST NTL FRAUD DETECTION AND
VERIFICATION)

3.10 MIDAS Framework FNFD is a mathematical method based on Recursive


Least Square (RLS) to model adversary behavior. FNFD
A novel framework MIDAS [21] is developed which is is capable of detecting NTL fraud in Smart Grid in re-
integration of several techniques such as statistical anal- al time. FNFD can verify a fraud even within one sin-
ysis, data mining and neural network. This framework gle measurement if accurate historical data is supplied
8 Divam Lehri1 , Arjun Choudhary1

[26] . FNFD utilizes linear functions to simulate the be- and UART are the most common debug ports and we
haviour of adversary. The main advantage of FNFD as can easily identify them by monitoring the voltage lev-
compared to other schemes are that it requires much els using a multimeter or with the help of oscilloscope.
less data and supports NTL fraud verification,a unique Once debug ports are identified we will start interact-
feature that is not available in other schemes & it is ing with the device by making connections between the
much faster than the other similar frameworks. debug ports and any USB bridge. USB bridge will pro-
vide us with the capability to interact with the device
through console and finally we will begin the process
4 Proposed Work of extracting data\firmware from the device. We will
modify the data dump that we acquired and rewrite
All the existing works available on energy theft detec- it to the device such that we can manipulate the de-
tion in smart meters are dealing only with types of vice. In continuation to this paper we will be showcas-
thefts where by some means either phase or neutral ing this kind of meter tampering using the these men-
wires were swapped or removed which led to significant tioned method alongwith the experimental results. We
change in the voltage or current values or due to billing will also propose mitigation measures for such type of
irregularities. Our work extends the existing approach- chip level energy theft approach such as assembly code
es to a new threat scenario where theft detection in obfuscation.
smart meter occurs due to tampering of the hardware
chip of the meter itself. Our approach is mainly con-
cerned with the chip level tampering of smart meter-
s. An adversary could Reverse engineer the meter and
obtain the low level assembly instructions of the me-
ter. Further Disassembling of the smart meter could be 5 Conclusion
done,thereby attempting to read the firmware direct-
ly from the chip. Obtaining of the low level assembly Curbing the energy theft menace is a huge concern for
instructions would reveal the hardcoded cryptograph- the governments and utilities. The scope of tampering
ic keys among other sensitive information that can be comprises of straightforward techniques like controlling
used in later attacks. Moreover, by exploiting the low live or neutral wires to more grave ones like retriev-
level assembly code the adversary could alter the con- ing device firmware. Appliances like smart meters are
sumption readings. The common methods of exploiting part of critical infrastructure and any compromise to it
the hardware chip includes: would be causing chaos in the power sector and huge
loss of revenue to the government. Most of the critical
– Logical Analyzer
infrastructure devices are procured from global sources
– Circuit Bending
and may come pre installed with hardware backdoors.
– JTAG Method
Adversary can also intrude through the weakest point
– Hacking Over UART
in the supply chain and compromise the device by in-
The Logical Analyzer is an instrument which sniffs the stalling hardware backdoor. This shows that attackers
signals when placed on different test points on the cir- are now moving down the stack from application lay-
cuit board thereby revealing potential information that er attacks to embedded hardware of the devices.The
could be interpreted into something useful, adding or tools required to carry out physical attacks are also
removing circuit components such that the functionali- proliferating and becoming inexpensive. Such scenarios
ty of the circuit is effected,also known as Circuit Bend- call for importance to hardware level security which is
ing and using Joint Test Action Group (JTAG) method not usually considered as important as application lev-
to read full memory hex dump. el security. Organisations need to reshape their security
We will begin with exploring the embedded hardware approach from the viewpoint of an attackers and con-
of the smart meter, examining individual components duct red team assessments to enhance security of the
present on the circuit board. To get a better under- assets. In recent years, the advancement of smart grid
standing of the working of each component we will and adoption of smart meters has called for proposals
probe the datasheets associated with each component. from industry, Universities and governments to tackle
Extending our approach further we will examine the in- the vulnerabilities existing in the AMI. In this paper we
terconnections between different components using mul- have classified various ways of energy theft and detec-
timeter. This will provide us insight of how data & sig- tion techniques along with there challenges. However it
nal transmission is taking place on the device. Now we still remains a fresh topic and has a lot of room to be
will hunt for debug ports present on the device. JTAG worked upon in future.
A Survey of Energy Theft Detection Approaches in Smart Meters 9

References 15. Aggregate Technical Commercial (ATC)


Losses in power sector, saumitra.cea@nic.in -
1. Coma-Puig, B., Carmona, J., Gavalda, R., Alcoverro, S., https://data.gov.in/catalog/aggregate-technical-
& Martin, V. (2016, October). Fraud Detection in Ener- commercial-atc-losses-power-sector (As Accessed in
gy Consumption: A Supervised Approach. In Data Science Dec’17)
and Advanced Analytics (DSAA), 2016 IEEE International 16. MINISTRY OF POWER: TWELFTH REPORT
Conference on (pp. 120-129). IEEE STANDING COMMITTEE ON ENERGY (2015-
2. Mesbah, W. (2016, October). Detection and correction of 2016),MEASURES TO CHECK COMMERCIAL LOSSES,
tampering attempts of smart electricity meters. In PES available at 164.100.47.193/lsscommittee/Energy/16_
Innovative Smart Grid Technologies Conference Europe Energy_12.pdf
(ISGT-Europe), 2016 IEEE (pp. 1-6). IEEE. 17. Depuru, S. S. S. R., Wang, L., Devabhaktuni, V. (2011).
3. Zhou, Y., Chen, X., Zomaya, A. Y., Wang, L., Hu, S. Electricity theft: Overview, issues, prevention and a smart
(2015). A dynamic programming algorithm for leveraging meter based approach to control theft. Energy Policy, 39(2),
probabilistic detection of energy theft in smart home. IEEE 1007-1015.
Transactions on Emerging Topics in Computing, 3(4), 502- 18. Prasad, J., Samikannu, R. (2017). Overview, issues and
513. prevention of energy theft in smart grids and virtual power
4. Sahoo, S., Nikovski, D., Muso, T., Tsuru, K. (2015, Febru- plants in Indian context. Energy Policy, 110, 365-374.
ary). Electricity theft detection using smart meter data. 19. Ahmad, T. (2017). Non-technical loss analysis and pre-
In Innovative Smart Grid Technologies Conference (ISGT), vention using smart meters. Renewable and Sustainable En-
2015 IEEE Power Energy Society (pp. 1-5). IEEE. ergy Reviews, 72, 573-589.
5. Crdenas, A. A., Amin, S., Schwartz, G., Dong, R., Sas- 20. Neto, E. A. A., Coelho, J. (2013). Probabilistic method-
try, S. (2012, October). A game theory model for electricity ology for Technical and Non-Technical Losses estimation in
theft detection and privacy-aware control in AMI system- distribution system. Electric Power Systems Research, 97,
s. In Communication, Control, and Computing (Allerton), 93-99.
21. Guerrero, J. I., Monedero, ., Biscarri, F., Biscarri, J.,
2012 50th Annual Allerton Conference on (pp. 1830-1837).
Milln, R., Len, C. (2014). Detection of non-technical losses:
IEEE.
The project MIDAS. Advances in secure computing, Inter-
6. Dineshkumar, K., Ramanathan, P., Ramasamy, S. (2015,
net services, and applications, 140-164.
March). Development of ARM processor based electricity
22. Depuru, S. S. S. R., Wang, L., Devabhaktuni, V., Green,
theft control system using GSM network. In Circuit, Power
R. C. (2013). High performance computing for detection of
and Computing Technologies (ICCPCT), 2015 Internation-
electricity theft. International Journal of Electrical Power
al Conference on (pp. 1-6). IEEE.
Energy Systems, 47, 21-30.
7. Tangsunantham, N., Ngamchuen, S., Nontaboot, V., 23. Ahmad, T., Chen, H., Wang, J., Guo, Y. (2017). Re-
Thepphaeng, S., Pirak, C. (2013, November). Experimen- view of various modeling techniques for the detection of
tal performance analysis of current bypass anti-tampering electricity theft in smart grid environment. Renewable and
in smart energy meters. In Telecommunication Networks Sustainable Energy Reviews.
and Applications Conference (ATNAC), 2013 Australasian 24. Bula, I., Hoxha, V., Shala, M., Hajrizi, E. (2016).
(pp. 124-129). IEEE. Minimizing non-technical losses with point-to-point mea-
8. McLaughlin, S., Holbert, B., Zonouz, S., Berthier, R. surement of voltage drop between SMART meters. IFAC-
(2012, November). AMIDS: A multi-sensor energy theft de- PapersOnLine, 49(29), 206-211.
tection framework for advanced metering infrastructures. 25. Saha, M., Thakur, S., Singh, A., Agarwal, Y. (2014,
In Smart Grid Communications (SmartGridComm), 2012 June). EnergyLens: combining smartphones with electric-
IEEE Third International Conference on (pp. 354-359). ity meter for accurate activity detection and user annota-
IEEE. tion. In Proceedings of the 5th international conference on
9. Anas, M., Nadeem Javaid, Anzar Mahmood, S. M. Raza, Future energy systems (pp. 289-300). ACM.
Umar Qasim and Zahoor Ali Khan. Minimizing Electric- 26. Han, W., Xiao, Y. (2016, May). FNFD: a fast scheme
ity Theft Using Smart Meters in AMI. 2012 Seventh In- to detect and verify non-technical loss fraud in smart grid.
ternational Conference on P2P, Parallel, Grid, Cloud and In Proceedings of the 2016 ACM International on Work-
Internet Computing (2012): 176-182. shop on Traffic Measurements for Cybersecurity (pp. 24-
10. Ngamchuen, S., & Pirak, C. (2013, May). Smart anti- 34). ACM.
tampering algorithm design for single phase smart me- 27. Bhattacharjee, S., Thakur, A., Silvestri, S., Das, S. K.
ter applied to AMI systems. In Electrical Engineer- (2017, March). Statistical Security Incident Forensics a-
ing/Electronics, Computer, Telecommunications and Infor- gainst Data Falsification in Smart Grid Advanced Metering
mation Technology (ECTI-CON), 2013 10th International Infrastructure. In Proceedings of the Seventh ACM on Con-
Conference on (pp. 1-6). IEEE. ference on Data and Application Security and Privacy (pp.
11. Deepa Warudkar,Priyamvada Chandel,B.A.Salwe ”Anti- 35-45). ACM.
Tamper Features in energy Meters”,International Journal 28. McHenry, M. P. (2013). Technical and governance con-
of Electrical, Electronics and Data Communication, ISSN: siderations for advanced metering infrastructure/smart me-
2320-2084 Volume-2, Issue-5, May-2014. ters: Technology, security, uncertainty, costs, benefits, and
12. Arora, M., & Semiconductor, F. (2011). Prevent tamper- risks. Energy Policy, 59, 834-842.
ing in energy meters. EE Times-India. eeindia. com. 29. Viegas, J. L., Esteves, P. R., Melcio, R., Mendes, V. M.
13. Jiang, R., Lu, R., Wang, Y., Luo, J., Shen, C., Shen, X. F., Vieira, S. M. (2017). Solutions for detection of non-
S. (2014). Energy-theft detection issues for advanced me- technical losses in the electricity grid: A review. Renewable
tering infrastructure in smart grid. Tsinghua Science and and Sustainable Energy Reviews, 80, 1256-1268.
Technology, 19(2), 105-120. Chicago. 30. Winther, T. (2012). Electricity theft as a relational issue:
14. Sharma, T., Pandey, K. K., Punia, D. K., Rao, J. (2016). a comparative look at Zanzibar, Tanzania, and the Sunder-
Of pilferers and poachers: Combating electricity theft in ban Islands, India. Energy for Sustainable Development,
India. Energy Research Social Science, 11, 40-52. 16(1), 111-119.
10 Divam Lehri1 , Arjun Choudhary1

31. Yip, S. C., Wong, K., Hew, W. P., Gan, M. T., Phan,
R. C. W., Tan, S. W. (2017). Detection of energy theft
and defective smart meters in smart grids using linear re-
gression. International Journal of Electrical Power Energy
Systems, 91, 230-240.
32. U.S. Energy Information Administration - Eia - In-
dependent Statistics and Analysis, available at http-
s://www.eia.gov/todayinenergy/detail.php?id=23452
33. Securing the smart grid of tomorrow, https://segrid.eu/
34. Glossary of terms- National Power Portal, http-
s://npp.gov.in/glossary

Das könnte Ihnen auch gefallen