论文标题
通过动态计费和AMI网络的动态计费和负载监控,有效保存隐私盗窃检测
Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks
论文作者
论文摘要
在高级计量基础架构(AMI)中,智能电表(SMS)安装在消费者端,以定期向系统操作员(SO)发送细粒度的功耗读数(SO),以进行负载监控,能源管理,计费等。但是,欺诈性的消费者通过报告虚假的账单来降低其账单,以降低其账单,以降低票据。这些攻击不仅会造成财务损失,而且可能会降低网格性能,因为读数用于电网管理。为了识别这些攻击者,现有计划使用消费者的精细读数采用机器学习模型,这通过揭示其生活方式侵犯了消费者的隐私。在本文中,我们提出了一个有效的计划,使SO能够在保留消费者的隐私的同时检测到电力盗窃,计算账单和监控负载。这个想法是,SMS使用功能加密对其读取进行加密,而SO使用密文来(i)在动态定价方法下计算账单,(ii)监视网格负载,(iii)评估机器学习模型来检测欺诈性消费者,而无需学习个人阅读以保留消费者的自私。我们对功能加密方案进行了调整,以便将加密的读数汇总用于计费和负载监控,并且只揭示了汇总值。此外,我们在加密读数上利用了内部产品操作,以评估机器学习模型以检测欺诈性消费者。真实数据集用于评估我们的方案,我们的评估表明我们的方案是安全的,并且可以通过低沟通和计算开销来准确地检测欺诈性消费者。
In advanced metering infrastructure (AMI), smart meters (SMs) are installed at the consumer side to send fine-grained power consumption readings periodically to the system operator (SO) for load monitoring, energy management, billing, etc. However, fraudulent consumers launch electricity theft cyber-attacks by reporting false readings to reduce their bills illegally. These attacks do not only cause financial losses but may also degrade the grid performance because the readings are used for grid management. To identify these attackers, the existing schemes employ machine-learning models using the consumers' fine-grained readings, which violates the consumers' privacy by revealing their lifestyle. In this paper, we propose an efficient scheme that enables the SO to detect electricity theft, compute bills, and monitor load while preserving the consumers' privacy. The idea is that SMs encrypt their readings using functional encryption, and the SO uses the ciphertexts to (i) compute the bills following dynamic pricing approach, (ii) monitor the grid load, and (iii) evaluate a machine-learning model to detect fraudulent consumers, without being able to learn the individual readings to preserve consumers' privacy. We adapted a functional encryption scheme so that the encrypted readings are aggregated for billing and load monitoring and only the aggregated value is revealed to the SO. Also, we exploited the inner-product operations on encrypted readings to evaluate a machine-learning model to detect fraudulent consumers. Real dataset is used to evaluate our scheme, and our evaluations indicate that our scheme is secure and can detect fraudulent consumers accurately with low communication and computation overhead.