Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure

Published: 21 January 2021 Publication History

Abstract

Spurious power consumption data reported from compromised meters controlled by organized adversaries in the Advanced Metering Infrastructure (AMI) may have drastic consequences on a smart grid’s operations. While existing research on data falsification in smart grids mostly defends against isolated electricity theft, we introduce a taxonomy of various data falsification attack types, when smart meters are compromised by organized or strategic rivals. To counter these attacks, we first propose a coarse-grained and a fine-grained anomaly-based security event detection technique that uses indicators such as deviation and directional change in the time series of the proposed anomaly detection metrics to indicate: (i) occurrence, (ii) type of attack, and (iii) attack strategy used, collectively known asattack context. Leveraging the attack context information, we propose three attack response metrics to the inferred attack context: (a) an unbiased mean indicating a robust location parameter; (b) a median absolute deviation indicating a robust scale parameter; and (c) an attack probability time ratio metric indicating the active time horizon of attacks. Subsequently, we propose a trust scoring model based on Kullback-Leibler (KL) divergence, that embeds the appropriate unbiased mean, the median absolute deviation, and the attack probability ratio metric at runtime to produce trust scores for each smart meter. These trust scores help classify compromised smart meters from the non-compromised ones. The embedding of the attack context, into the trust scoring model, facilitates accurate and rapid classification of compromised meters, even under large fractions of compromised meters, generalize across various attack strategies and margins of false data. Using real datasets collected from two different AMIs, experimental results show that our proposed framework has a high true positive detection rate, while the average false alarm and missed detection rates are much lesser than 10% for most attack combinations for two different real AMI micro-grid datasets. Finally, we also establish fundamental theoretical limits of the proposed method, which will help assess the applicability of our method to other domains.

References

[1]
V. Agate, A. Khamesi, S. Gaglio, and S. Silvestri. 2020. Enabling peer-to-peer user-preference-aware energy sharing through reinforcement learning. IEEE International Conference on Communications (ICC).
[2]
S. Bhattacharjee, A. Thakur, S. Silvestri, and S. K. Das. 2017. Statistical security incident forensics against data falsification in smart grid advanced metering infrastructure. ACM Conference on Data and Application Security (ACM CODASPY). 35--45.
[3]
S. Bhattacharjee and S. K. Das. 2018. Detection and forensics under stealthy data falsification in smart metering infrastructure. IEEE Trans. on Dependable and Secure Computing, Vol. 16.
[4]
S. Bhattacharjee, A. Thakur, and S. K. Das. 2018. Towards fast and semi-supervised identification of smart meters launching data falsification attacks. ACM Asia Conference on Computer and Communications Security (ACM ASIACCS). 173--185.
[5]
P. Box and D. Cox. 1964. An analysis of transformations. Journal of the Royal Statistical Society, Series B. 26, 2 (1964), 211--252.
[6]
A. Cardenas, R. Berthier, R. Bobba, J. Huh, J. Jetcheva, D. Grochocki, and W. Sanders. 2014. A framework for evaluating intrusion detection architectures in advanced metering infrastructures. IEEE Trans. on Smart Grid 5, 2 (2014), 906--915.
[7]
V. Chandola, A. Banerjee, and V. Kumar. 2009. Anomaly detection: A survey. ACM Computing Surveys 41, 15 (2009), 15--58.
[8]
S. Ciavarella, J. Y. Joo, and S. Silvestri. 2016. Managing contingencies in smart grids via the internet of things. IEEE Trans. on Smart Grid 7, 4 (2016), 2134--2141.
[9]
V. Dolce, C. Jackson, S. Silvestri, D. Baker, and A. De Paola. 2018. Social-behavioral aware optimization of energy consumption in smart homes. IEEE International Conf. on Distributed Computing in Sensor Systems (DCOSS), 2018.
[10]
Y. Ishimaki, S. Bhattacharjee, H. Yamana, and S. K. Das. 2020. Towards privacy-preserving anomaly-based attack detection against data falsification in smart grid. IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SMARTGRIDCOMM), Nov. 2020.
[11]
R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. Shen. 2014. Energy-Theft detection issues for advanced metering infrastructure in smart grids. Tsinghua Science and Technology 19, 2 (2014), 105--120.
[12]
P. Jokar, N. Arianpoo, and V. Leung. 2016. Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans. on Smart Grid 7, 1 (2016), 216--226.
[13]
A. Khamesi, S. Silvestri, D. Baker, and A. De Paola. 2020. Perceived-value driven optimization of energy consumption in smart homes. ACM Transactions on Internet of Things 1, 2 (2020).
[14]
A. R. Khamesi and S. Silvestri. 2020. Reverse auction-based demand response program: A truthful mutually beneficial mechanism. IEEE Mobile Ad Hoc Sensor and Smart Systems (IEEE MASS) (2020).
[15]
T. Koppel. 2015. Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath. Crown Publishers, New York.
[16]
V. B. Krishna, K. Lee, G. A. Weaver, R. K. Iyer, and W. H. Sanders. 2016. F-DETA: A framework for detecting electricity theft attacks in smart grids. IEEE/IFIP on Dependable Systems and Networks (IEEE DSN). 407--418.
[17]
S. McLaughlin, D. Podkuiko, and P. McDaniel. 2009. Energy theft in the advanced metering infrastructure. Proc. of Critical Information Infrastructures Security. Springer-Verlag, 176--187.
[18]
S. McLaughlin, B. Holbert, S. Zonouz, and R. Berthier. 2012. AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures. IEEE Conf. on Communications, Control, and Computing Technologies for Smart Grid Communications (SMARTGRIDCOMM). 354--359.
[19]
D. Mashima and A. Alvaro. 2012. Evaluating electricity theft detectors in smart grid networks. Springer Intl. Workshop on Recent Advances in Intrusion Detection. 210--229, Sept. 2012.
[20]
R. Mohassel, A. Fung, F. Mohammadi, and K. Raahemifar. 2014. A survey on advanced metering infrastructure. Elsevier Journal of Electrical Power 8 Energy Systems 63 (2014), 473--484.
[21]
B. Meyer. 1984. Some inequalities for elementary mean values. AMS Mathematics of Computation 42, 165 (1984), 193--194.
[22]
A. Rad and A.L. Garcia. 2011. Distributed internet-based load altering attacks against smart power grids. IEEE Trans. on Smart Grids 2, 4 (2011), 667--674.
[23]
E. Shin, A. R. Khamesi, Z. Bahr, S. Silvestri, and D. A. Baker. 2020. A user-centered active learning approach for appliance recognition. IEEE International Conference on Smart Computing (SMARTCOMP), 2020.
[24]
Y. L. Sun, W. Yu, Z. Han, and K. J. Ray Liu. 2006. Information theoretic framework of trust model and evaluation for ad hoc networks. IEEE Journal on Sel. Areas in Communications 24, 2 (2006), 305--317.
[25]
S. H. Tung. 1975. On lower and upper bounds of the difference between the arithmetic and the geometric mean. AMS Mathematics of Computation 29, 131 (1975), 834--836.
[26]
J. P. Talusan, F. Tiasus, K. Yasumoto, M. Wilbur, A. Dubey, and S. Bhattacharjee. 2019. Smart transportation delay and resiliency testbed based on information flow of things middleware. IEEE International Conference on Smart Computing (SMARTCOMP), USA, 2019.
[27]
E. Werley, S. Angelos, O. Saavedra, O. Cortes, and A. Souza. 2011. Detection and identification of abnormalities in customer consumptions in power distribution systems. IEEE Trans. on Power Delivery 26, 4 (2011), 2436--2442.
[28]
M. Wilbur, A. Dubey, B. Leao, and S. Bhattacharjee. 2020. A decentralized approach for real time anomaly detection in transportation networks. IEEE Conference on Smart Computing, 2020.
[29]
W. Xia and Y. Chu. 2011. The schur convexity of gini mean values in the sense of harmonic mean. Mathematica Scientia 31, 3 (2011), 1103--1112.
[30]
W. Yu, D. Griffith, L. Ge, S. Bhattarai, and N. Golmie. 2015. An integrated detection system against false data injection attacks in the Smart Grid. Security and Commun. Networks 8, 2 (2015), 91--109.
[31]
[Online] Available at: https://skyvisionsolutions.files.wordpress.com/2014/08/utility-smart-meters-invade-privacy-22-aug-2014.pdf.
[32]
NY Times, Last Accessed Oct. 2020, [Online] Available at: http://www.nytimes.com/2009/12/14/us/14meters.html?ref=energy-environment8_r=0.
[33]
[Online] Last Accessed Oct. 2020, Available at: http://www.telegraph.co.uk/news/2017/03/06/smart-energy-meters-giving-readings-seven-times-high-study-finds/.
[34]
[Online] Last Accessed Oct. 2020, Available at: https://www.maximintegrated.com/content/dam/files/design/technical-documents/white-papers/smart-grid-security-recent-history-demonstrates.pdf.
[35]
[Online] Last Accessed Oct. 2020, Available at: https://energy-solution.com/2015/01/29/enabling-automated-demand-response-pge-dras/.
[36]
[Online] Last Accessed Oct. 2020, Available at: https://www.smartgrid.gov/files/The_Smart_Grid_Promise_DemandSide_Management_201003.pdf.
[37]
[Online] Last Accessed Oct. 2020, Available at: https://www.smartgrid.gov/project/pecan_street_project_inc_energy_internet_demonstration.html.
[38]
[Online] Last Accessed Oct. 2020, Available at: http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/14-AMI_System_Security_Requirements_updated.pdf.
[39]
[Online] Last Accessed Oct. 2020, Available at: Irish Social Science Data Archives, Available at: http://www.ucd.ie/issda/data/.

Cited By

View all
  • (2024)A Human-Centered Power Conservation Framework Based on Reverse Auction Theory and Machine LearningACM Transactions on Cyber-Physical Systems10.1145/36563488:3(1-26)Online publication date: 5-Apr-2024
  • (2024)Unsafe Events Detection in Smart Water Meter Infrastructure via Noise-Resilient Learning2024 ACM/IEEE 15th International Conference on Cyber-Physical Systems (ICCPS)10.1109/ICCPS61052.2024.00030(259-270)Online publication date: 13-May-2024
  • (2023)A detection model of scaling attacks considering consumption pattern diversity in AMIFrontiers in Energy Research10.3389/fenrg.2022.104675610Online publication date: 13-Jan-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Privacy and Security
ACM Transactions on Privacy and Security  Volume 24, Issue 2
May 2021
242 pages
ISSN:2471-2566
EISSN:2471-2574
DOI:10.1145/3446639
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 January 2021
Accepted: 01 September 2020
Revised: 01 March 2020
Received: 01 June 2018
Published in TOPS Volume 24, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Advanced metering infrastructure
  2. anomaly detection
  3. artificial-intelligence-based security
  4. data falsification attacks
  5. data integrity
  6. smart metering
  7. smart-grid security
  8. trust

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)1
Reflects downloads up to 12 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Human-Centered Power Conservation Framework Based on Reverse Auction Theory and Machine LearningACM Transactions on Cyber-Physical Systems10.1145/36563488:3(1-26)Online publication date: 5-Apr-2024
  • (2024)Unsafe Events Detection in Smart Water Meter Infrastructure via Noise-Resilient Learning2024 ACM/IEEE 15th International Conference on Cyber-Physical Systems (ICCPS)10.1109/ICCPS61052.2024.00030(259-270)Online publication date: 13-May-2024
  • (2023)A detection model of scaling attacks considering consumption pattern diversity in AMIFrontiers in Energy Research10.3389/fenrg.2022.104675610Online publication date: 13-Jan-2023
  • (2023)Understanding Concurrent Transmissions: The Impact of Carrier Frequency Offset and RF Interference on Physical Layer PerformanceACM Transactions on Sensor Networks10.1145/360443020:1(1-39)Online publication date: 18-Oct-2023
  • (2023)Toward Data Center Digital Twins via Knowledge-based Model Calibration and ReductionACM Transactions on Modeling and Computer Simulation10.1145/360428333:4(1-24)Online publication date: 26-Oct-2023
  • (2023)The Method of Moving Frames for Surface Global ParametrizationACM Transactions on Graphics10.1145/360428242:5(1-18)Online publication date: 20-Sep-2023
  • (2023)Program Analysis and Machine Learning–based Approach to Predict Power Consumption of CUDA KernelACM Transactions on Modeling and Performance Evaluation of Computing Systems10.1145/36035338:4(1-24)Online publication date: 24-Jul-2023
  • (2023)Exploring the Lived Experience of Behavior Change Technologies: Towards an Existential Model of Behavior Change for HCIACM Transactions on Computer-Human Interaction10.1145/360349730:6(1-50)Online publication date: 25-Sep-2023
  • (2023)Scalable Pythagorean Mean-based Incident Detection in Smart Transportation SystemsACM Transactions on Cyber-Physical Systems10.1145/36033818:2(1-25)Online publication date: 5-Jun-2023
  • (2023)Algorithms for Parallel Generic hp-Adaptive Finite Element SoftwareACM Transactions on Mathematical Software10.1145/360337249:3(1-26)Online publication date: 19-Sep-2023
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media