SIA OpenIR  > 工业控制网络与系统研究室
GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids
Xia XF(夏小芳)1,2,3; Xiao Y(肖杨)3; Liang W(梁炜)1; Zheng M(郑萌)1
Department工业控制网络与系统研究室
Source PublicationIEEE Transactions on Network Science and Engineering
ISSN2327-4697
2020
Volume7Issue:2Pages:805-816
Indexed BySCI ; EI
EI Accession number20182905558716
WOS IDWOS:000543044200018
Contribution Rank1
Funding OrganizationNational Key Research and Development Program of China (2017YFE0101300), US National Science Foundation (NSF) with the grant # CNS-1059265, the National Natural Science Foundation of China under grant #v61374200, #v61673371, and # 71661147005, and the Youth Innovation Promotion Association Chinese Academy of Sciences under grant #v2015157.
KeywordElectricity theft smart grid smart meters cyber attacks security
Abstract

With many countries trying to establish their own smart grids, smart meters are massively deployed throughout the world. Although smart meters are manufactured with low tamper-resistant components, malicious users with just a moderate level of computer knowledge are able to launch cyber attacks. By manipulating electricity consumption readings to smaller values, malicious users can steal electricity from utility companies. To reduce the losses incurred by electricity theft, utility companies must provide preventative and detective methods to identify fraudulent behaviors. Our goal is to identify all malicious users in a neighborhood area network within the shortest detection time. To achieve this goal, we propose Group Testing based Heuristic Inspection (GTHI) algorithm, which can estimate the ratio of malicious users on-line, mainly by collecting the information that how many malicious users have been identified during the inspection process. Based upon the ratio of malicious users, the GTHI algorithm adaptively adjusts inspection strategies between an individual inspection strategy and a group testing strategy. This helps shorten the detection time. Furthermore, when applying the group testing strategy, the GTHI algorithm also determines the group size of users to be probed in line with the estimated malicious user ratio. Experiment results show that compared to existing methods, the GTHI algorithm has advantages of conducting fewer inspection steps or being more practical.

Language英语
WOS SubjectEngineering, Multidisciplinary ; Mathematics, Interdisciplinary Applications
WOS KeywordNONTECHNICAL LOSS FRAUD ; NEIGHBORHOOD AREA NETWORKS ; METER INSPECTION ; SCHEME
WOS Research AreaEngineering ; Mathematics
Funding ProjectNational Key Research and Development Program of China[2017YFE0101300] ; US National Science Foundation (NSF)[CNS-1059265] ; National Natural Science Foundation of China[61374200] ; National Natural Science Foundation of China[61673371] ; National Natural Science Foundation of China[71661147005] ; Youth Innovation Promotion Association Chinese Academy of Sciences[2015157]
Citation statistics
Cited Times:1[WOS]   [WOS Record]     [Related Records in WOS]
Document Type期刊论文
Identifierhttp://ir.sia.cn/handle/173321/22149
Collection工业控制网络与系统研究室
Corresponding AuthorXiao Y(肖杨); Liang W(梁炜)
Affiliation1.The University of alabama, tuscaloosa, Tuscaloosa, Alabama United States
2.Computer Science, The University of alabama, Tuscaloosa, Alabama United States
3.EE, Shenyang Institute of Automation, 66327 Shenyang, Liaoning China
Recommended Citation
GB/T 7714
Xia XF,Xiao Y,Liang W,et al. GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids[J]. IEEE Transactions on Network Science and Engineering,2020,7(2):805-816.
APA Xia XF,Xiao Y,Liang W,&Zheng M.(2020).GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids.IEEE Transactions on Network Science and Engineering,7(2),805-816.
MLA Xia XF,et al."GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids".IEEE Transactions on Network Science and Engineering 7.2(2020):805-816.
Files in This Item:
File Name/Size DocType Version Access License
GTHI_ A Heuristic Al(1545KB)期刊论文作者接受稿开放获取CC BY-NC-SAView Application Full Text
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Xia XF(夏小芳)]'s Articles
[Xiao Y(肖杨)]'s Articles
[Liang W(梁炜)]'s Articles
Baidu academic
Similar articles in Baidu academic
[Xia XF(夏小芳)]'s Articles
[Xiao Y(肖杨)]'s Articles
[Liang W(梁炜)]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Xia XF(夏小芳)]'s Articles
[Xiao Y(肖杨)]'s Articles
[Liang W(梁炜)]'s Articles
Terms of Use
No data!
Social Bookmark/Share
File name: GTHI_ A Heuristic Algorithm to Detect Malicious Users in Smart Grids.pdf
Format: Adobe PDF
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.