Efficient detection of electricity theft cyber attacks in AMI networks

Muhammad Ismail, Mostafa Shahin, Mostafa F. Shaaban, Erchin Serpedin, Khalid Qaraqe

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

50 Citations (Scopus)

Abstract

Advanced metering infrastructure (AMI) networks are vulnerable against electricity theft cyber attacks. Different from the existing research that exploits shallow machine learning architectures for electricity theft detection, this paper proposes a deep neural network (DNN)-based customer-specific detector that can efficiently thwart such cyber attacks. The proposed DNN-based detector implements a sequential grid search analysis in its learning stage to appropriately fine tune its hyper-parameters, hence, improving the detection performance. Extensive test studies are carried out based on publicly available real energy consumption data of 5000 customers and the detector's performance is investigated against a mixture of different types of electricity theft cyber attacks. Simulation results demonstrate a significant performance improvement compared with state-of-the-art shallow detectors.

Original languageEnglish
Title of host publication2018 IEEE Wireless Communications and Networking Conference, WCNC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538617342
DOIs
Publication statusPublished - 8 Jun 2018
Externally publishedYes
Event2018 IEEE Wireless Communications and Networking Conference, WCNC 2018 - Barcelona, Spain
Duration: 15 Apr 201818 Apr 2018

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
Volume2018-April
ISSN (Print)1525-3511

Conference

Conference2018 IEEE Wireless Communications and Networking Conference, WCNC 2018
Country/TerritorySpain
CityBarcelona
Period15/04/1818/04/18

Keywords

  • AMI networks
  • Cyber attacks
  • Deep machine learning
  • Electricity theft detection

Fingerprint

Dive into the research topics of 'Efficient detection of electricity theft cyber attacks in AMI networks'. Together they form a unique fingerprint.

Cite this