A Difference-Comparison-based Approach for
Malicious Meter Inspection in Neighborhood Area
Smart Grids
Xiaofang Xia
1,2,3
, Wei Liang
1,2
, Yang Xiao
1,2
, Meng Zheng
1,2,∗
, and Zhifeng Xiao
4
1
Key Lab of Networked Control Systems, Chinese Academy of Sciences, 110016 Shenyang, China
2
Shenyang Institute of Automation, Chinese Academy of Sciences, 110016 Shenyang, China
3
University of Chinese Academy of Sciences, 100039 Beijing, China
4
Dept. of Computer Science and Software Engineering, Pennsylvania State Erie, Erie, PA, 16563 USA
{xiaxiaofang, weiliang, yangxiao, zhengmeng 6}@sia.cn, zux2@psu.edu
Abstract—In this paper, we explore the malicious meter in-
spection (MMI) problem in neighborhood area smart grids. By
exploiting a binary inspection tree, we propose a Difference-
Comparison-based Inspection (DCI) algorithm to quickly target
the malicious meters. Different from existing algorithms, the DCI
algorithm is designed based on three rules that are derived
according to the difference comparison results in each local
subtree. An attractive feature of the DCI algorithm is that it
manages to skip a large number of nodes on the binary inspection
tree and thus accelerates the detection of malicious nodes. Both
analysis and simulation results show that DCI outperforms
the existing inspection algorithms in terms of inspection speed,
regardless of the ratio and permutation of malicious meters.
I. I NTRODUCTION
Albeit offering higher efficiency, lower cost, and more
environmentally sound energy management, smart grid brings
new risks and threats at the same time [1]. Electricity theft is
one of the serious issues that needs to be addressed. Due to
the two-way communication of the smart grid, it is possible to
compromise the electricity bill almost anywhere and anytime:
a) while it is recorded, b) while it is at rest in the meter, and
c) while it is in flight across the network [2]. The economical
loss caused by electricity theft is huge. It has been estimated
that utility companies worldwide lose more than $25 billion
every year due to electricity theft. For India alone, the loss is
around $4.5 billion [3], $1.5 billion less than the United States
[4].
Extensive studies have been done to detect the electricity
theft in smart grid. Typical works either take advantage of the
physical checks of tamper-evident seals by field personnel or
leverage the machine learning theory-based methods to build
the consumption patterns and detect the anomalies [5]-[9].
However, the tamper-evident seals can be easily defeated [10],
and the machine learning-based approaches are not accurate
enough to declare electricity theft only by the occurrence of
deviation, since there are many other reasons, such as the
dramatic change of weather and the random behavior of the
* Corresponding author.
electricity consumers, possibly leading to the deviation as well.
On the other hand, literatures [11]-[15] developed a series of
real-time comparison-based inspection algorithms, whose ba-
sic idea is to monitor the discrepancy between the subscribers
and their inspectors (redundant smart meters installed at the
power provider end). If the discrepancy exceeds a specified
threshold [12], it means that there may exist some ‘malicious’
meters
1
. However, the existing mutual inspection algorithms
suffer the limitation on high deployment cost, since the mu-
tual inspection strategy [12] demands one extra smart meter
for each user, which may be unaffordable for the utilities,
especially when the smart grid scales out. Xiao et al. employ
a binary inspection tree as a logic structure for the detection of
compromised meters [11]. However, the proposed algorithms
in [11] only outperform the naive scanning approach when the
ratio of malicious meters is low.
This paper extends our previous work in [11] to utilize
the binary inspection tree and proposes a new Difference-
Comparison-based Inspection (DCI) algorithm that significant-
ly improves the detection speed. DCI algorithm is different
from the inspection algorithms in [11] mainly due to the
following aspects:
• First, while conducting inspection on one node, the in-
spector calculates the amount of the stolen electricity of
its corresponding subtree, which the algorithms in [11]
neglect. The stolen amount is then used to determine
which node to probe in the next step;
• Furthermore, according to the difference between the
amount of the stolen electricity of an internal node and
that of its left child node, three rules, which allow the
inspector to skip a large number of nodes in the binary
inspection tree and quickly identify the dirty meters, are
developed;
• Finally, by adopting the pre-order traversal approach [16],
1
One meter is called malicious when its corresponding user commits the
electricity theft and in this paper the two terms ‘user’ and ‘meter’ are used
interchangeably.
IEEE ICC 2015 SAC - Communications for the Smart Grid
978-1-4673-6432-4/15/$31.00 ©2015 IEEE 802