Skip to main content

Big Data Security Analytic for Smart Grid with Fog Nodes

  • Conference paper
  • First Online:
Book cover Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

Abstract

Big data throws big security challenges in Smart Grid. Fog computing emerges as a novel technology to bring the ability of Cloud and big data analytic (BDA) to the edge of the networks. However, we lack practice on how to utilize Fog, Cloud, and BDA to address big data security challenges in Smart Grid. In this paper, we propose a Mapreduce-style algorithm, named Mapreduce-style Fast Non-Technical Loss Fraud Detection scheme (Mapreduce-style FNFD), to detect Non-Technical Loss fraud in Smart Grid. Compared to its original version, FNFD, Mapreduce-style FNFD can utilize the ability of Cloud, Fog, and BDA, and thus can solve big data security issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.L.P.: Cyber security, privacy issues in smart grids. IEEE Commun. Surv. Tutorials 14(4), 981–997 (2012)

    Article  Google Scholar 

  2. Kundur, D., Feng, X., Mashayekh, S., Liu, S., Zourntosand, T., Butler-Purry, K.L.: Towards modelling the impact of cyber attacks on a smart grid. Int. J. Secur. Netw. 6, 2–13 (2011)

    Article  Google Scholar 

  3. Han, W., Xiong, W., Xiao, Y., Ellabidy, M., Vasilakos, A.V., Xiong, N.: A class of non-statistical traffic anomaly detection in complex network systems. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW 2012), pp. 640–646, June 2012

    Google Scholar 

  4. Kalogridis, G., Denic, S.Z., Lewis, T., Cepeda, R.: Privacy protection system and metrics for hiding electrical events. Int. J. Secur. Netw. 6, 14–27 (2011)

    Article  Google Scholar 

  5. Gao, J., Liu, J., Rajan, B., Nori, R., Fu, B., Xiao, Y., Liang, W., Chen, C.L.P.: SCADA communication and security issues. Secur. Commun. Netw. 7(1), 175–194 (2014)

    Article  Google Scholar 

  6. Berthier, R., Sanders, W.H.: Monitoring advanced metering infrastructures with amilyzer. In: Proceedings of C&ESAR: The Computer & Electronics Security Applications Rendez-vous, Cyber-security of SCADA & Industrial Control Systems, Rennes, France, 19-21 Nov. 2013, pp. 130–142 (2013)

    Google Scholar 

  7. Han, W., Xiao, Y., Combating, T.: Non-technical loss fraud targeting time-based pricing in smart grid. In: The 2nd International Conference on Cloud Computing and Security (ICCCS 2016), July 2016

    Google Scholar 

  8. Han, W., Xiao, Y.: NFD: a practical scheme to detect non-technical loss fraud in smart grid. In: Proceedings of the 2014 International Conference on Communications (ICC 2014), pp. 605–609, June 2014

    Google Scholar 

  9. Han, W., Xiao, Y.: CNFD: a novel scheme to detect colluded non-technical loss fraud in smart grid. In: Yang, Q., Yu, W., Challal, Y. (eds.) WASA 2016. LNCS, vol. 9798, pp. 47–55. Springer, Heidelberg (2016). doi:10.1007/978-3-319-42836-9_5

    Chapter  Google Scholar 

  10. Zhang, J., Gunter, C.A.: Application-aware secure multicast for power grid communications. Int. J. Secur. Netw. 6, 40–52 (2011)

    Article  Google Scholar 

  11. IBM: Managing big data for smart grids and smart meters (2015). http://www-935.ibm.com/services/multimedia/Managing__big_data_for_smart_grids_and_smart_meters.pdf

  12. Ray, P., Reed C., Gray, J., Agarwal, A., Seth, S.: Improving roi on big data through formal security and efficiency risk management for interoperating ot and it systems (2012). http://www.gridwiseac.org/pdfs/forum_papers12/ray_reed_gray_agarwal_seth_paper_gi12.pdf

  13. Li, F., Luo, B., Liu, P.: Secure and privacy-preserving information aggregation for smart grids. Int. J. Secur. Netw. 6, 28–39 (2011)

    Article  Google Scholar 

  14. Han, W., Xiao, Y.: Non-technical loss fraud in advanced metering infrastructure in smart grid. In: The 2nd International Conference on Cloud Computing and Security (ICCCS 2016), July 2016

    Google Scholar 

  15. Han, W., Xiao, Y.: FNFD: a fast scheme to detect and verify non-technical loss fraud in smart grid. In: Proceedings of the International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), May–June 2016

    Google Scholar 

  16. Hayes, M.H.: Recursive least squares. In: Statistical Digital Signal Processing and Modeling, chap. 9.4, p. 154. Wiley (1996)

    Google Scholar 

  17. Mu, J., Song, W., Wang, W., Zhang, B.: Self-healing hierarchical architecture for ZigBee network in smart grid application. Int. J. Sens. Netw. 17, 130–137 (2015)

    Article  Google Scholar 

  18. Gao, J., Xiao, Y., Liu, J., Liang, W., Chen, C.L.P.: A survey of communication/networking in smart grids. Future Gener. Comput. Syst. 28, 391–404 (2012). (Elsevier)

    Article  Google Scholar 

  19. Xiao, Z., Xiao, Y., Du, D.: Exploring malicious meter inspection in neighborhood area smart grids. IEEE Trans. Smart Grid 4(1), 214–226 (2013)

    Article  Google Scholar 

  20. Xiao, Z., Xiao, Y., Du, D.: Non-repudiation in neighborhood area networks for smart grid. IEEE Commun. Mag. 51(1), 18–26 (2013)

    Article  Google Scholar 

  21. Xia, X., Liang, W., Xiao, Y., Zheng, M., Xiao, Z.: Difference-comparison-based approach for malicious meter inspection in neighborhood area smart grids. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 802–807, June 2015

    Google Scholar 

  22. Xia, X., Liang, W., Xiao, Y., Zheng, M.: BCGI: a fast approach to detect malicious meters in neighborhood area smart grid. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 7228–7233, June 2015

    Google Scholar 

  23. Han, W., Xiao, Y.: IP\(^2\)DM for V2G networks in smart grid. In: Proceedings of the 2015 International Conference on Communications (ICC 2015), pp. 782–787, June 2015

    Google Scholar 

  24. Han, W., Xiao, Y.: Privacy preserving for V2G networks in smart grid: a survey. Comput. Commun. 91–92, 17–28 (2016)

    Article  Google Scholar 

  25. Xiao, Z., Xiao, Y.: Accountable MapReduce in cloud computing. In: Proceedings of 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1082–1087 (2011)

    Google Scholar 

  26. Xiao, Z., Xiao, Y.: Achieving accountable mapreduce in cloud computing. Future Gener. Comput. Syst. 30, 1–13 (2014). (Elsevier)

    Article  Google Scholar 

  27. Han, W., Xiao, Y.: Cybersecurity in internet of things - big data analytics. In: Big Data Analytics for Cybersecurity. Taylor & Francis Group (2016, in press)

    Google Scholar 

  28. Renaut, R.A.: A parallel multisplitting solution of the least squares problem. Numer. Linear Algeba Appl. 5, 11–31 (1998)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under the Grant 61374200, and the National Science Foundation (NSF) under Grant CNS-1059265.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Han, W., Xiao, Y. (2016). Big Data Security Analytic for Smart Grid with Fog Nodes. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics