Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks

نویسندگان

چکیده

In advanced metering infrastructure (AMI), smart meters (SMs) are installed at the consumer side to send fine-grained power consumption readings periodically system operator (SO) for load monitoring, energy management, and billing. However, fraudulent consumers launch electricity theft cyber attacks by reporting false reduce their bills illegally. These do not only cause financial losses but may also degrade grid performance because used management. To identify these attackers, existing schemes employ machine-learning models using consumers' readings, which violates privacy revealing lifestyle. this article, we propose an efficient scheme that enables SO detect theft, compute bills, monitor while preserving privacy. The idea is SMs encrypt functional encryption (FE), uses ciphertexts to: 1) following dynamic pricing approach; 2) load; 3) evaluate a model consumers, without being able learn individual preserve We adapted FE so encrypted aggregated billing monitoring value revealed SO. Also, exploited inner-product operations on consumers. real data set our scheme, evaluations indicate secure can accurately with low communication computation overhead.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Entropy - based electricity theft detection in AMI network

Advanced metering infrastructure (AMI), one of the prime components of the smart grid, has many benefits like demand response and load management. Electricity theft, a key concern in AMI security since smart meters used in AMI are vulnerable to cyber attacks, causes millions of dollar in financial losses to utilities every year. In light of this problem, the authors propose an entropy-based ele...

متن کامل

A centralized privacy-preserving framework for online social networks

There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...

متن کامل

Efficient Short-Term Electricity Load Forecasting Using Recurrent Neural Networks

Short term load forecasting (STLF) plays an important role in the economic and reliable operation ofpower systems. Electric load demand has a complex profile with many multivariable and nonlineardependencies. In this study, recurrent neural network (RNN) architecture is presented for STLF. Theproposed model is capable of forecasting next 24-hour load profile. The main feature in this networkis ...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Efficient Methods for Privacy Preserving Face Detection

Bob offers a face-detection web service where clients can submit their images for analysis. Alice would very much like to use the service, but is reluctant to reveal the content of her images to Bob. Bob, for his part, is reluctant to release his face detector, as he spent a lot of time, energy and money constructing it. Secure MultiParty computations use cryptographic tools to solve this probl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2021

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2020.3026692