Privacy Preserving P2P technique

Embed Size (px)

Citation preview

  • 8/12/2019 Privacy Preserving P2P technique

    1/19

    1

    Chapter 1

    Introduction

    Energy theft has been a notorious problem in traditional power systems. The

    Generation, Transmission and Distribution (T&D) of electricity involve huge

    operational losses. The magnitude of these losses is rising at an alarming rate in

    several countries. In order to identify illegal consumers of electricity in the view

    of enhancing the economy of utilities, efficiency and security of the grid, a new

    method of analyzing electricity consumption patterns of customers and

    identifying illegal consumers is proposed and realized.

    In this chapter, Section 1.1 discusses the motivation and objectives behind the

    development of a technique for detection of illegal consumers in a power grid,

    followed by Section 1.2, which presents the organization of the report.

    1.1 Motivation

    Losses that occur during generation can be technically defined, but T&D lossescannot be quantified completely from the sending-end information. Distribution

    losses in several countries have been reported to be over 30%. Substantial

    quantity of losses proves the involvement of Non-Technical Losses (NTL) in

    distribution. Total losses during T&D can be evaluated from the information

    like total load and the total energy billed, using established standards and

    formulae. In general, NTL are caused by the factors external to the power

    system. Electricity theft constitutes a major chunk of the NTL. Major forms of

    electricity theft include bypassing (illegal tapping of electricity from the feeder),tampering the energy meter, and physical methods to evade payment. Electricity

    theft can be defined as, using electricity from the utility without a contract or

    valid obligation to alter its measurement. Worldwide T&D losses are more than

    the total installed generation capacity of countries such as Germany, the UK, or

    France. It is estimated that utilities (worldwide) lose more than $25 Billion

    every year due to illegal consumption of electricity. In Pennsylvania, PPL, a

    utility reports an increase in electricity theft by 16% compared to 2008. It has

    also been identified that the illegal consumption of electricity by local businesssector is increasing.

  • 8/12/2019 Privacy Preserving P2P technique

    2/19

  • 8/12/2019 Privacy Preserving P2P technique

    3/19

    3

    Chapter 2

    Methods of illegal electricity usage

    In general, electricity consumers may be generalized as genuine customers,

    partial illegal consumers, and illegal consumers. This chapter presents several

    simple and sophisticated methods used in pilfering electricity, discusses factors

    that influence illegal consumers to steal electricity.

    2.1 Methods of Stealing Electricity

    The most common and simplest way of pilfering electricity is tapping energy

    directly from an overhead distribution feeder as shown in Figure 2-1. The nextmost prominent method of electricity theft is the manipulation of energy meters

    that are used for recording and billing industrial, commercial and household

    energy consumption. Though there are many techniques for tampering with

    such meters, some of these may include:

    Exposing meters to strong magnetic fields to wipe out the memory. Inserting a film or depositing high viscous fluid to disturb the

    rotation of disc.

    Implementation of sophisticated technologies like remote sensingdevices.

    Tampering the crystal frequency of integrated circuits. Creating a link between the breaking control wires in an energy

    meter would divert the current reading in the meter reflecting zero

    reading at all times.

    In the case of electronic meters, Radio Frequency (RF) devices aremounted to affect the accuracy of the meter.

    A shunt is installed between the incoming and outgoing meterterminals.

    Inter-changing the incoming and outgoing terminals of the meter. Damaging the pressure coil of the meter. Resetting the meter reading. Introducing unwanted harmonics. Exposing the meter to mechanical shock.

  • 8/12/2019 Privacy Preserving P2P technique

    4/19

    4

    Voltage is regulated from the meter terminals, making it read lesserquantity then the original consumption.

    Figure 2-1: Tapping electricity directly from a distribution feeder - bypassing

    the meter.

    Other engineered methods of tampering with the meter without damaging its

    terminals are illustrated below. Two-watt hour meters (employed for measuring

    the energy consumed by large loads with three phase electric supply) are

    tampered according to the following process: Damage the terminal seal; connect

    one of the load terminals to the ground; and open the ground wire from the

    energy meter. In the case of three phase meters, phases are shifted to lower the

    power consumption reading by the energy meter. Another popular way of

    lowering the energy meter reading without directly tampering with the meter is

    shown in Figure 2-2. Here, supply voltage is regulated to manipulate the meter

    reading. Illegal consumers accomplish this by using one of the three phases;

    disconnect neutral from the distribution feeder, and using a separate neutral for

    the return path. Therefore, the energy meter assumes that the voltage between

    the connected phase and this new neutral is zero, implying that the total energy

    consumed is zero. Another way of stealing electricity is by isolating neutral and

    disturbing the electronic reference point by physically damaging the meter. The

  • 8/12/2019 Privacy Preserving P2P technique

    5/19

    5

    voltage to be read by energy meter can then be manipulated by controlling the

    neutral.

    In general, illegal consumption of electricity will be predominant only at desired

    hours of the day - when the customers demand is high i.e. using legalelectricity for small household loads and illegally tapped electricity for heavy

    loads. This kind of theft (partial illegal consumption) is very difficult to

    measure, as the energy consumption pattern is uneven over a period of time. In

    addition, corrupt employees are often responsible for billing irregularities; they

    record an amount of consumption that is lower than the original consumption.

    On the other hand, improper calibration and illegal de-calibration (during

    manufacturing) of energy meters can also cause NTL. In most of the meter

    tampered locations, damaged meter terminals and/or illegal practices may not bevisible during inspection.

    Figure 2-2: Technique used by illegal consumers to regulate the supply

    voltage and manipulate the energy meter reading.

  • 8/12/2019 Privacy Preserving P2P technique

    6/19

    6

    Chapter 3

    Methods of Theft Detection

    3.1 Historical development in Theft Detection Method

    Nizar et al. employ a data mining technique known as Extreme Learning

    Machine (ELM) to classify users electricity consumption patterns or loadprofiles. By comparing the results to a database of users load profiles, the

    proposed algorithm yields a list of users who could be stealing energy, which

    we call energy thieves.

    Nagi et al. propose a similar approach but choose to use genetic algorithms andSupport Vector Machine (SVM) instead of ELM.

    Depuru et al. develop another data mining based scheme utilizing SVM as well.

    Unfortunately, these techniques cannot sort out the energy thieves with absolute

    certainty.

    In contrast, Bandim et al. propose a central observer to measure the total energy

    consumption of a small number of users, and are able to identify all the energy

    thieves by comparing the total energy consumption with the reported energyconsumption from the users.

    Notice that in all the above works, the UC has to know some of users privateinformation, e.g., users load profiles or meter readings at certain times, in orderto find the energy thieves. However, the disclosure of such information would

    violate users privacy and raise concerns about privacy, safety, etc.

    3.2 Load profile and Privacy

    The disclosure of such information would violate users privacy and raiseconcerns about privacy, safety, etc. In particular, users private information may

    be sold to interested third-parties. Insurance companies may buy load-profiles

    from the UC to make premium adjustments on the users policies. For example,they could find electricity consumption patterns that increase the risk of fire in a

    property and increase insurance premiums accordingly. Marketing companies

    may also be interested in this data to identify potential customers. Moreover,

    criminals may utilize such private information to commit crimes. For instance,

    robbers may analyze the energy consumption pattern of potential victims to

  • 8/12/2019 Privacy Preserving P2P technique

    7/19

    7

    deduce their daily behavior. They can even know if a robbery alarm has been set

    at their target location.

    Many researchers, such as Quinn, have realized how high resolution electricity

    usage information can be used to reconstruct many intimate details of aconsumers daily life and invade his/her privacy, and thus call for statelegislators and public utility commissions to address this new privacy threat.

    Table 3.1.1 shows some of the outcomes of the research done by Quinn

  • 8/12/2019 Privacy Preserving P2P technique

    8/19

    8

    Concern Type Related Question Answered by Detailed uses

    Nefarious Uses When are you usually away from home? Is your household protected with an electronic

    alarm system? If so, how often do you arm it?

    And the Psycho question: when do you usuallyshower (and so prompt a long draw from yourwater heater)?

    Insurance How often do you arrive home around the timethe bars close?

    How often do you get a full nights sleep v.drive sleep deprived?

    How often are you late to work, or rushing toget there on time?

    Does the time it takes you to get from yourhome to your workplace require that you breakthe speed limit to get there?

    Do you have a propensity for leaving appliancesturned on and leaving the house, say, a curlingiron or a stove range?

    Banking/NBFCs

    (For Loans)

    An individuals loadprofile gives a rough idea ofhis willingness to save.

    Is he/she going to job regularly/punctually i.e. isthere any threat to persons job?

    How much time does a person gives to sleep i.e.laziness.

    Table 3.1.1Concern Type Related Question Answered by Detailed uses

    As per researchers, if these information will be sold by utilities then people will

    behave like if they are watched by cameras in their personal life which is very

    serious threat to the privacy of any individual.

  • 8/12/2019 Privacy Preserving P2P technique

    9/19

    9

    3.3 Privacy Preserving P2P Computing Technique

    It is a technique of theft detection without losing privacy. In section 3.3.1

    Network model is given. Section 3.3.2 gives mathematical model of our

    Problem and in Section 3.3.3, LUD algorithm is shown.

    3.3.1 Network Model

    Fig.3.1A typical architecture of Neighborhood Area Network (NAN).

    Typical network architecture is depicted in Fig. 3.1. In a serviced area, the

    users SMs together with the collector form a Neighborhood Area Network(NAN). The communications among SMs and between SMs and the collector

    are carried out wirelessly due to SMs communication capability, while the

    communications among the CC, the DS, and the collector are conducted viawired medium.

    In the smart grid, communications and electricity networks overlay each other.

    Utility companies (UCs) deploy control centers (CCs) to monitor their

    distribution stations (DSs), distribution networks and deploy SMs at userspremises to measure their individual energy consumption. Since a CC is usually

    physically far away from users, a communication entity that can facilitate the

    communication between users and the CC is necessary. To this end, an access

    point, called the collector, is placed at each of the serviced areas. One SM is

  • 8/12/2019 Privacy Preserving P2P technique

    10/19

    10

    installed at each collector to measure the total energy consumed by the serviced

    area.

    3.3.2 Mathematical Model

    In our mathematical model for energy theft detection, we assume that an SM isinstalled at the collector such that the collector can know the total energy

    consumption of the users in the service area. We also assume that the UC

    installs an SM at each of the users premises, which is capable of recordingenergy consumption at any time instant.

    Consider a NAN of n users. We define asampling period denoted by SP. Then,

    after every sampling period, all the n+1 SMs will record their energy

    consumption in the past sampling period. We denote such energy consumption

    recorded by user j (1 j n) and by the collector at time ti, by pti,j and ti,

    respectively. We further define an honesty coefficient, denoted by kjwhere kj>

    0, for each userj. Thus, kj* pti,jgives the real energy consumption of userj from

    time instant ti SP to time instant ti. Since the sum of all users real energyconsumption in the past sampling period must be equal to the total energy

    consumption of the neighborhood measured at the collector at time ti, we have

    k1pti,1+ k2pti,2+ ... + knpti,n= ti(1)

    Our objective is to find all the kjs. Obviously,

    1) if kj= 1, then userj is honest and did not steal energy;

    2) if kj > 1, then user j recorded less energy than what he/she consumes and

    hence is an energy thief; and

    3) if 0 < kj< 1, then user j recorded more than what he/she consumes, which

    means that his/her smart meter may be malfunctioning.

    In particular, with n linear equations, we can have a linear system of equations

    (LSE) as follows:

    k1pt1,1+ k2pt1,2+ ... + knpt1,n= t1

  • 8/12/2019 Privacy Preserving P2P technique

    11/19

    11

    .

    .

    .

    k1ptn,1+ k2ptn,2+ ... + knptn,n= tn

    which can also be formulated in matrix form:

    Pk = . (2)

    The jth column of P represents the data recorded and stored by user j or SMj,

    while the ith

    row of P represents the data recorded by all the users at ti. The

    collector can choose n time instances when ti s all have different values. Inthis case, it is highly likely that the LSE is independent and the rows of P are

    independent as well, especially when n is large. Thus, the above LSE only has a

    single unique solution, i.e., the feasible solution kj=ti,j/pti,jwherepti,jis the real

    energy consumption of user j from time instant tiSP to time instant ti. Note

    that our model does not take into account energy dissipation, or technical losses(TLs), in the power system, which are mainly caused by the intrinsic

    inefficiencies in transformers and low voltage power lines. However, TLs can

    be calculated without using consumers energy measurements.

    For example, Oliveira et al. describe how to calculate TLs using measurements

    at the distribution station and the knowledge of the distribution network which

    does not need to compromise users privacy. Thus, once the technical losses arecalculated by the collector, the collector can adjust the model by subtracting the

    TLs from vector P. Besides, note that finding the honesty coefficient vector, k,

    is delay tolerant. In other words, k is not required to be found and transmitted to

    the collector in real time. This gives priority to other real time traffic in the

    NAN, such as electricity pricing, incentive-based load reduction signals, and

    emergency load reduction signals.

    3.3.3 LUD algorithm

    It is based on distributed LU decomposition. The LU decomposition is to

    factorize the energy consumption data matrix P into two triangular matrices: alower triangular matrix L and an upper triangular matrix U, i.e.,

  • 8/12/2019 Privacy Preserving P2P technique

    12/19

    12

    P = LU.

    The elements of upper triangular matrix U can be calculated as follows:

    ui,j= 0, i>j

    u1,j=pt1,j, j= 1, 2, ..., n

    ur,j=ptr,j r,kuk,j, r= 2, ..., n,j = r, ..., n (3)

    where pti,j is the ith element of column j in matrix P. Besides, the elements of

    lower triangular matrix L can be obtained by

    li,j= 0, i

  • 8/12/2019 Privacy Preserving P2P technique

    13/19

    13

    is only known to the SM itself and the collector. The collector also transmits

    tj+1to each SMjto allow the SMs to collaboratively compute L , U, and y. Wedenote the smart meter at the collector as SM0. All SMs start running Procedure

    1 when the collector requests them to by sending a control message.

    Procedure 1: Distributed LU Decomposition

    Input:j SMj,tj+1SMj

    1: ifj = 0 or SMjreceives packets from SMj1then

    2: ifj = 0 then

    3: Computey1using (7)

    4: Transmity1only to SM1

    5: end if

    6: if 1 j n 1 then

    7: for q = 1 toj do

    8: Compute uq,jusing (3)

    9: end for

    10: for q =j + 1 to n do

    11: Compute lq,jusing equation (4)

    12: end for

    13: Computeyj+1using (7)

    14: Transmit columns 1,2,...,j of L and all known

    elements ofy1, ..., yj+1only to SMj+1

    15: end if

    16: ifj = n then

    17: Notify the collector that L , U, and y are available

  • 8/12/2019 Privacy Preserving P2P technique

    14/19

    14

    18: end if

    19: end if

    Specifically, SM0first calculatesy1=Pt1, and then transmits it to SM1. SM0does

    not need to compute any element of L or U. After SM1receivesy1, it computes

    column 1 of U, column 1 of L , andy2. Then, SM1transmits column 1 of L ,y1,

    andy2to SM2. SMj(1 < j < n), receivesy1throughyjand columns 1 throughj1

    of L from SMj1, based on which it calculates columnj of U, columnj of L and

    yj+1. After that, SMj transmits columns 1 through j of L and y1 through yj+1 to

    SMj+1. Finally, SMn receives yn and columns 1 through n1 from SMn1,

    calculates column n of U and column n of L , and notifies the collector that the

    Back Substitution procedure, i.e., Procedure 2, can start. Notice that each SMj(j> 0) is responsible for computing columnj of U, columnj of L , andyj+1(1 j