Electricity Theft Detection in AMI Using Customers' Consumption Patterns

被引:537
作者
Jokar, Paria [1 ]
Arianpoo, Nasim [1 ]
Leung, Victor C. M. [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Advanced metering infrastructure (AMI); energy theft; smart grid; SMART; NETWORKS;
D O I
10.1109/TSG.2015.2425222
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As one of the key components of the smart grid, advanced metering infrastructure brings many potential advantages such as load management and demand response. However, computerizing the metering system also introduces numerous new vectors for energy theft. In this paper, we present a novel consumption pattern-based energy theft detector, which leverages the predictability property of customers' normal and malicious consumption patterns. Using distribution transformer meters, areas with a high probability of energy theft are short listed, and by monitoring abnormalities in consumption patterns, suspicious customers are identified. Application of appropriate classification and clustering techniques, as well as concurrent use of transformer meters and anomaly detectors, make the algorithm robust against nonmalicious changes in usage pattern, and provide a high and adjustable performance with a low-sampling rate. Therefore, the proposed method does not invade customers' privacy. Extensive experiments on a real dataset of 5000 customers show a high performance for the proposed method.
引用
收藏
页码:216 / 226
页数:11
相关论文
共 28 条
  • [1] Amin S., 2012, INT C DEC GAM THEOR, P264
  • [2] [Anonymous], 2001, IEEE 16 INT C EXH EL
  • [3] [Anonymous], 2012, P INT C INF KNOWL EN
  • [4] [Anonymous], 2009, P IET C EXH EL DISTR
  • [5] [Anonymous], 2011, P IEEE WIR TEL S NEW
  • [6] Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
  • [7] A tutorial on Support Vector Machines for pattern recognition
    Burges, CJC
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) : 121 - 167
  • [8] Cárdenas AA, 2012, ANN ALLERTON CONF, P1830, DOI 10.1109/Allerton.2012.6483444
  • [9] Cavoukian A., 2009, INF PRIVACY COMM
  • [10] Culwell J. J., 2001, RES STUDY QUANTIFIES