Computational Management Science

, Volume 16, Issue 1–2, pp 329–343 | Cite as

Big data analytics: an aid to detection of non-technical losses in power utilities

  • Giovanni MicheliEmail author
  • Emiliano Soda
  • Maria Teresa Vespucci
  • Marco Gobbi
  • Alessandro Bertani
Original Paper


The great amount of data collected by the Advanced Metering Infrastructure can help electric utilities to detect energy theft, a phenomenon that globally costs over 25 billions of dollars per year. To address this challenge, this paper describes a new approach to non-technical loss analysis in power utilities using a variant of the P2P computing that allows identifying frauds in the absence of total reachability of smart meters. Specifically, the proposed approach compares data recorded by the smart meters and by the collector in the same neighborhood area and detects the fraudulent customers through the application of a Multiple Linear Regression model. Using real utility data, the regression model has been compared with other data mining techniques such as SVM, neural networks and logistic regression, in order to validate the proposed approach. The empirical results show that the Multiple Linear Regression model can efficiently identify the energy thieves even in areas with problems of meters reachability.


Energy theft detection Meters reachability Multiple linear regression Data mining 


  1. Alahakoon D, Yu X (2013, November 14) Advanced Analytics for Harnessing the Power of Smart Meter Big Data. In: Proceedings of the 2013 IEEE International Workshop on Inteligent Energy Systems (IWIES), Vienna, pp 40–45Google Scholar
  2. Alejandro L, Blair C, Bloodgood L, Khan M, Lawless M, Meehan D, … Tsuji K (2014) Global market for smart electricity meters: government policies driving strong growth. In: U.S. International trade commission, office of industries working paper. Washington DCGoogle Scholar
  3. Depuru S, Wang L, Devabhaktuni V (2011) Support vector machine based data classification for detection of electricity theft. In: 2011 IEEE/PES power systems conference, pp 1–8Google Scholar
  4. Depuru S, Wang L, Devabhaktuni V (2012) Enhanced encoding technique for identifying abnormal energy usage pattern. In: IEEE North American power symposium, pp 1–6Google Scholar
  5. Depuru S, Wang L, Devabhaktuni V, Green RC (2013) High performance computing for detection of electricity theft. Int J Electr Power Energy Syst 47:21–30Google Scholar
  6. dos Angelos E, Saavedra O, Cortes O, de Souza A (2011) Detection and identification of abnormalities in customer consumptions in power distribution systems. IEEE Trans Power 26(4):2436–2442Google Scholar
  7. El-Dereny M, Rashwan NI (2011) Solving multicollinearity problem using ridge regression models. Int J Contemp Math Sci 6(12):585–600Google Scholar
  8. Federal Court of Audit (2007) Operational audit report held in national agency of electrical energy. Tech. Rep., No. TC 025.619/2007-2. BrazilGoogle Scholar
  9. Fehrenbacher K (2013, January 21) A startup emerges to use wireless mesh and the cloud to fight energy theft. Gigaom: the industry leader in emerging technology research: Accessed 15 Nov 2016
  10. IBM (2012, May) Managing big data for smart grids. Accessed 15 Nov 2016
  11. Jang R, Lu R, Wang Y, Luo J, Shen C, Shen XS (2014) Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Sci Technol 19(2):105–120Google Scholar
  12. Mashima D, Cardenas A (2012, Springer) Evaluating electricity theft detectors in smart grid networks. In: Research in attacks, intrusions, and defenses, pp 210–229Google Scholar
  13. McDaniel P, McLaughlin S (2009) Security and privacy. IEEE Secur Priv 7(3):75–77Google Scholar
  14. Micheli G (2016) Big data analytics: individuazione delle perdite non tecniche nelle reti elettriche. Master’s thesis. Università degli Studi di Bergamo. BergamoGoogle Scholar
  15. Ministry of Power (2013) Overview of power distribution. India. Accessed 15 Nov 2016
  16. Muniz C, Figueiredo K, Vellasco M, Chavez G, Pacheco M (2009) Irregularity detection on low tension electric installations by neural network ensembles. In: IEEE international joint conference on neural networks, pp 2176–2182Google Scholar
  17. Nagi J, Yap K, Tiong S, Ahmed S, Mohammad A (2008) Detection of abnormalities and electricity theft using genetic support vector machines. In: TENCON 2008-2008 IEEE region 10 conference, pp 1–6Google Scholar
  18. Nagi J, Yap KS, Tiong SK, Ahmed S, Nagi F (2011) Improving SVM-based nontechnical loss detection in power utility using the fuzzy inference system. IEEE Trans Power Deliv 26(2):1284–1285Google Scholar
  19. Salinas S, Li M, Li P (2012) Privacy-preserving energy theft detection in smart grids. In: 9th Annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON), pp 605–613Google Scholar
  20. Salinas S, Li M, Li P (2013) Privacy-preserving energy theft detection in smart grids: a P2P computing approach. J Sel Areas Commun 31(9):257–267Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Management, Information and Production EngineeringUniversity of BergamoBergamoItaly
  2. 2.CESIMilanItaly

Personalised recommendations