Professional Documents
Culture Documents
not exist in Malaysia because smart grid is not fully implemented.
Therefore, we design and construct a small-scaled advanced
metering infrastructure test rig in the laboratory to evaluate
the performance and reliability of our previously proposed linear
regression-based detection schemes for energy theft and defective
are conducted and the results show that the proposed algorithms
can successfully detect all the fraudulent consumers and discover
faulty smart meters in smart grids.
Keywords— Energy theft detection; Defective meter detec- Fig. 1. The design of a small-scaled AMI test rig.
tion; Smart Grid; Linear regression; AMI;
978-1-5386-3917-7/17/$31.00
c 2017 IEEE
TABLE I
D ESCRIPTION OF an
Scenario Description
an = 0 Consumer n is honest in energy consumption reporting
an > 0 Consumer n reports less than what was consumed
an < 0 The n-th SM reports more than what was consumed
1 energy thief and 1 defective SM found 2 energy thieves and 0 defective SM found
1.6
1.6 off-peak
1.4 on-peak
1 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2
0.2
0
0 1 2 3 0
-0.2 0 1 2 3
Consumer ID
-0.2 Consumer ID
-0.4
Fig. 4. Value of ãn obtained by LR-ETDM. Fig. 5. Value of ãn and (ãn + β̃n ) obtained by CVLR-ETDM.
8 energy thieves and 1 defective SM found 1 (i.e. not significant at a 1% significance level, β̃n = 0).
1 off-peak In other words, the cheating/malfunctioning behavior of these
on-peak
consumers remain unchanged all the time. Meanwhile, it can
Anomaly Coefficient, a & (a+β)
0.8
be seen from Fig. 6 that consumer 3, 14 and 25 only under-
0.6 report their energy consumption during on-peak hours (i.e.,
only white bar appears, ãn = 0, (ãn + β̃n ) > 0). Consumer
0.4
10 and 20 report fraction of their energy consumption only
0.2 during off-peak hours (i.e., only black bar appears, ãn > 0,
(ãn + β̃n ) = 0). Results in Table V show that the p-
0
0 1 2 3 4 5 6 7 8 9 101112131415161718192021222324252627282930 values of β̃3 , β̃10 , β̃14 , β̃20 and β̃25 are significant at a 1%
-0.2 Consumer ID significant level, which implies that β̃n = 0, indicating that
these consumers have different cheating patterns throughout
the period of observations. Besides, we can also easily identify
the other honest consumers in the service area who have
Fig. 6. Value of ãn and (ãn + β̃n ) obtained by CVLR-ETDM (size of 30
consumers). ãn = 0 and (ãn + β̃n ) = 0. Based on these results, the
collector can effectively detect all the energy thieves as well
as the defective SMs, then computes how much less or more
shown in Table V. Fig. 6 depicts the values of ãn and (ãn + β̃n ) they have paid in their monthly bills.
obtained by CVLR-ETDM for the size of 30 consumers.
Results in Fig. 6 suggest that there are eight fraudulent
consumers and a defective SM. Specifically, consumer 1, 16
and 29 pilfer energy consumption all the time (i.e., white and In addition, the simulation results of our previous work
black bars co-appear, ãn > 0, (ãn + β̃n ) > 0) while the in [2] also show that the proposed algorithms can be extended
7-th SM is always out of order (i.e., white and black bars quite straight-forwardly to accommodate more consumers (i.e.,
co-appear, ã7 < 0, (ã7 + β̃7 ) < 0). It can be observed sizes of 15 and 45 consumers) and successfully detect all the
from Table V that the p-values of β̃1 , β̃7 , β̃16 and β̃29 are fraudulent consumers and/or faulty SMs.
V. C ONCLUSION
In this work, we have designed and constructed an AMI
test rig to evaluate the performance of the proposed linear-
regression-based energy theft detection algorithms in smart
grid environment. The results show that the proposed algo-
rithms are capable in identifying the energy thieves as well as
locating the faulty equipment, regardless of whether they steal
energy at a constant and/or variable rate. The proposed models
vary from other work done because regression analysis is:
1) Not restricted by the dimension of consumers’ power
consumption data;
2) Able to reveal the amount of energy theft/loss based on
a small volume of reported consumers’ power consump-
tion data regardless of technical losses/noise.
These additional features lead to greater flexibility and im-
proved realism in residential/commercial energy theft detec-
tion. Moreover, the proposed model can be extended quite
straight-forwardly to accommodate more consumers for non-
technical losses detection within the service area as discussed
in [2]. As further work, we shall design algorithms to pre-
serve consumers’ privacy while still being able to reveal the
locations of meter tampering and defects.
R EFERENCES
[1] Energy Commission Malaysia, “The National Grid - Strengthening
Malaysia’s Framework,” vol. 6, 2015.
[2] S.-C. Yip, K. Wong, W.-P. Hew, M.-T. Gan, R. C.-W. Phan, and S.-W.
Tan, “Detection of Energy Theft and Defective Smart Meters in Smart
Grids using Linear Regression,” International Journal of Electrical
Power and Energy Systems, (In Press).
[3] R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. Shen, “Energy-
theft detection issues for advanced metering infrastructure in smart grid,”
Tsinghua Science and Technology, vol. 19, no. 2, pp. 105–120, 2014.
[4] J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, and M. Mohamad,
“Nontechnical loss detection for metered customers in power utility
using support vector machines,” IEEE Transactions on Power Delivery,
vol. 25, no. 2, pp. 1162–1171, 2010.
[5] J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, and a. M. Mohammad,
“Detection of Abnormalities and Electricity Theft using Genetic Support
Vector Machines,” IEEE Region 10 Annual International Conference,
Proceedings/TENCON, pp. 1–6, 2008.
[6] P. Jokar, N. Arianpoo, and V. C. M. Leung, “Electricity Theft Detection
in AMI Using Customers’ Consumption Patterns,” IEEE Transactions
on Smart Grid, vol. 7, no. 1, pp. 216–226, 2016.
[7] S. Salinas, M. Li, and P. Li, “Privacy-Preserving Energy Theft Detection
in Smart Grids: A P2P Computing Approach,” IEEE Journal On Selected
Area In Communications/Supplement, vol. 31, no. 9, pp. 257–267, 2013.
[8] “Machine automation controller nj/nx-series,” 2017 (accessed March 20,
2017). https://www.ia.omron.com/data pdf/cat/nj nx-series ds e 3 6
csm1042737.pdf?id=3438.
[9] G. Rodriguez, “Linear Models for Continuous Data,” Princeton Statis-
tics, no. September 2007, 2013.
[10] “Electricity user load profiles by profile class,” June 1997 (accessed
March 24, 2017). Available: http://data.ukedc.rl.ac.uk/simplebrowse/edc/
efficiency/residential/LoadProfile.