Open Access
ARTICLE
A Cryptographic-Based Approach for Electricity Theft Detection in Smart Grid
1 Laboratory of Energetic in Arid Zones (ENERGARID), Department of Electrical Engineering, Faculty of Technology, Tahri Mohammed University of Bechar, Bechar, 08000, Algeria.
2 Department of Mathematics and Computer Science, Faculty of Exact Sciences, Tahri Mohammed University of Bechar, Bechar, 08000, Algeria.
3 Laboratory of Energetic in Arid Zones (ENERGARID), Department of Electrical Engineering, Faculty of Technology, Tahri Mohammed University of Bechar, Bechar, 08000, Algeria.
* Corresponding Author: Naim Khelifi. Email: .
Computers, Materials & Continua 2020, 63(1), 97-117. https://doi.org/10.32604/cmc.2020.09391
Received 09 December 2019; Accepted 06 January 2020; Issue published 30 March 2020
Abstract
In order to strengthen their security issues, electrical companies devote particular efforts to developing and enhancing their fraud detection techniques that cope with the information and communication technologies integration in smart grid fields. Having been treated earlier by several researchers, various detection schemes adapted from attack models that benefit from the smart grid topologies weaknesses, aiming primarily to the identification of suspicious incoming hazards. Wireless meshes have been extensively used in smart grid communication architectures due to their facility, lightness of conception and low cost installation; however, the communicated packets are still exposed to be intercepted maliciously in order either to falsify pertinent information like the smart meter readings, or to inject false data instead, aiming at electricity theft during the communication phase. For this reason, this paper initiates a novel method based on RSA cryptographic algorithm to detect electricity fraud in smart grid. This new method consists of generating two different cryptograms of one electricity measurement before sending, after which the recipient is used to find the same value after decrypting the two cyphers in a normal case. Otherwise, a fraudulent manipulation could occur during the transmission stage. The presented method allows us to kill two birds with one stone. First, satisfactory outcomes are shown: the algorithm accuracy reaches 100%, from one hand, and the privacy is protected thanks to the cryptology concept on the other hand.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.