2019
DOI: 10.1109/access.2019.2925322
|View full text |Cite
|
Sign up to set email alerts
|

PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks

Abstract: In advanced metering infrastructure (AMI) networks, smart meters installed at the consumer side should report fine-grained power consumption readings (every few minutes) to the system operator for billing, real-time load monitoring, and energy management. On the other hand, the AMI networks are vulnerable to cyber-attacks where malicious consumers report false (low) electricity consumption to reduce their bills in an illegal way. Therefore, it is imperative to develop schemes to accurately identify the consume… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
55
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 80 publications
(58 citation statements)
references
References 35 publications
2
55
1
Order By: Relevance
“…partial reduction attack and two versions of a selective time filtering attack [28]. The SoC of EV i at time t on day d is denoted by S i (d, t), and the SoC reported by EV i to the CC is denoted by RS i (d, t).…”
Section: Volume X 2020mentioning
confidence: 99%
“…partial reduction attack and two versions of a selective time filtering attack [28]. The SoC of EV i at time t on day d is denoted by S i (d, t), and the SoC reported by EV i to the CC is denoted by RS i (d, t).…”
Section: Volume X 2020mentioning
confidence: 99%
“…As Pham et al outline, wealth, religion, health and behaviour are all extractable from an aggregated smart meter data stream [28]. However, as a digital product, the smart metering infrastructure is also susceptible to attempted cyber-attacks [29]. This has led to a multitude of investigations into smart meter data security applications and the cyber-security of the wider smart grid.…”
Section: Data Privacymentioning
confidence: 99%
“…Simulation models are adopted for assessing the impact of the attack types. Whilst the research is somewhat constrained by the use of simulation for the experimentation, the investigation found three dimensions of possible impacts based on the attack types: (1) monetary impacts, (2) interruption of smart meter communication and 3 Nabil et al outline their privacy-preserving scheme for the detection of energy theft [29]. The aim of the work is to allow utility providers to detect electrical theft, provide billing and monitor load usage without consumers' privacy being violated.…”
Section: Data Privacymentioning
confidence: 99%
“…Technical loss is an unavoidable loss in the process of power transmission, which is determined by power loads and parameters of power supply equipment. Non-technical loss is caused by wrong measurement, electricity theft, and non-payment by consumers [1]. In recent years, the U.S. has lost USD 6 billion every year due to electricity theft, according to a report by Forbes magazine [2].…”
Section: Introductionmentioning
confidence: 99%