Skip to main content

PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure

  • Conference paper
  • First Online:
Quantitative Evaluation of Systems (QEST 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9259))

Included in the following conference series:

Abstract

Electric utilities are in the process of installing millions of smart meters around the world, to help improve their power delivery service. Although many of these meters come equipped with encrypted communications, they may potentially be vulnerable to cyber intrusion attempts. These attempts may be aimed at stealing electricity, or destabilizing the electricity market system. Therefore, there is a need for an additional layer of verification to detect these intrusion attempts. In this paper, we propose an anomaly detection method that uniquely combines Principal Component Analysis (PCA) and Density-Based Spatial Clustering of Applications with Noise (DBSCAN) to verify the integrity of the smart meter measurements. Anomalies are deviations from the normal electricity consumption behavior. This behavior is modeled using a large, open database of smart meter readings obtained from a real deployment. We provide quantitative arguments that describe design choices for this method and use false-data injections to quantitatively compare this method with another method described in related work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ankerst, M., Breunig, M.M., Kriegel, H.P., Sander, J.: OPTICS: ordering points to identify the clustering structure. ACM SIGMOD Rec. 28(2), 49–60 (1999)

    Article  Google Scholar 

  2. Hydro, B.C.: Smart metering program (2014). https://www.bchydro.com/energy-in-bc/projects/smart_metering_infrastructure_program.html

  3. Berthier, R., Sanders, W.H., Khurana, H.: Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: Proceedings of IEEE SmartGridComm 2010, pp. 350–355. IEEE (2010)

    Google Scholar 

  4. Brauckhoff, D., Salamatian, K., May, M.: Applying PCA for traffic anomaly detection: problems and solutions. In: Proceedings of IEEE INFOCOMM 2009 (2009)

    Google Scholar 

  5. ComEd: Smart meter (2015). https://www.comed.com/technology/smart-meter-smart-grid/Pages/smart-meter.aspx

  6. Cyber Intelligence Section: Smart grid electric meters altered to steal electricity, May 2010. http://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/

  7. Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of KDD 1996. vol. 96, pp. 226–231 (1996)

    Google Scholar 

  8. HP Security Research: Cyber Risk Report 2015 (2015)

    Google Scholar 

  9. Jiang, R., Lu, R., Wang, L., Luo, J., Changxiang, S., Xuemin, S.: Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Sci. Technol. 19(2), 105–120 (2014)

    Article  Google Scholar 

  10. Jung, D., Badrinath Krishna, V., Temple, W.G., Yau, D.K.: Data-driven evaluation of building demand response capacity. In: Proceedings of IEEE SmartGridComm 2014, pp. 547–553. IEEE (2014)

    Google Scholar 

  11. Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: Proceedings of ACM SIGCOMM 2004. ACM, New York (2004)

    Google Scholar 

  12. Mashima, D., Cárdenas, A.A.: Evaluating electricity theft detectors in smart grid networks. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 210–229. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  13. McLaughlin, S., Holbert, B., Zonouz, S., Berthier, R.: AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures. In: Proceedings of SmartGridComm 2012. pp. 354–359, November 2012

    Google Scholar 

  14. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of ACSAC 2010, pp. 107–116. ACM, New York (2010)

    Google Scholar 

  15. Pearson, K.: LIII. on lines and planes of closest fit to systems of points in space. Philos. Mag. 2(11), 559–572 (1901). Series 6

    Article  Google Scholar 

  16. Rousseeuw, P.J., Croux, C.: Alternatives to the median absolute deviation. J. Am. Stat. Assoc. 88(424), 1273–1283 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  17. Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Incremental singular value decomposition algorithms for highly scalable recommender systems. In: Fifth International Conference on Computer and Information Science. Citeseer (2002)

    Google Scholar 

  18. Shyu, M.L., Chen, S.C., Sarinnapakorn, K., Chang, L.: A Novel Anomaly Detection Scheme Based on Principal Component Classifier, DTIC (ADA465712) (2003)

    Google Scholar 

  19. Shyu, M.L., Chen, S.C., Sarinnapakorn, K., Chang, L.: Principal component-based anomaly detection scheme (2006)

    Google Scholar 

  20. Tan, R., Badrinath Krishna, V., Yau, D.K., Kalbarczyk, Z.: Impact of integrity attacks on real-time pricing in smart grids. In: Proceedings of ACM CCS 2013, pp. 439–450. ACM, New York (2013)

    Google Scholar 

  21. Vellaithurai, C., Srivastava, A., Zonouz, S., Berthier, R.: CPIndex: cyber-physical vulnerability assessment for power-grid infrastructures. IEEE Trans. Smart Grid 6(2), 566–575 (2015). doi:10.1109/TSG.2014.2372315

    Article  Google Scholar 

Download references

Acknowledgements

This material is based upon work supported by the Department of Energy under Award Number DE-OE0000097. The smart meter data used in this paper is accessed via the Irish Social Science Data Archive - www.ucd.ie/issda. The providers of this data, the Commission for Energy Regulation, bear no responsibility for the further analysis or interpretation of it. We thank Shweta Ramdas, Jeremy Jones and Tim Yardley for their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gabriel A. Weaver .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Badrinath Krishna, V., Weaver, G.A., Sanders, W.H. (2015). PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure. In: Campos, J., Haverkort, B. (eds) Quantitative Evaluation of Systems. QEST 2015. Lecture Notes in Computer Science(), vol 9259. Springer, Cham. https://doi.org/10.1007/978-3-319-22264-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22264-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22263-9

  • Online ISBN: 978-3-319-22264-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics