Next Article in Journal
Graph Optimization Model Fusing BLE Ranging with Wi-Fi Fingerprint for Indoor Positioning
Next Article in Special Issue
How Instrument Transformers Influence Power Quality Measurements: A Proposal of Accuracy Verification Tests
Previous Article in Journal
Experimental Study on Shear Wave Transmission in Fractured Media
Previous Article in Special Issue
The Vulnerability of the Power Grid Structure: A System Analysis Based on Complex Network Theory
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

GrAb: A Deep Learning-Based Data-Driven Analytics Scheme for Energy Theft Detection

1
Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India
2
Institute of Computer Technology, Ganpat University, Ahmedabad 384012, India
3
National Research and Development Institute for Cryogenic and Isotopic Technologies—ICSI Rm. Valcea, Uz-Inei Street, No. 4, Raureni, P.O. Box 7, 240050 Rm. Valcea, Romania
4
Software Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh 12372, Saudi Arabia
5
Computer Science Department, Community College, King Saud University, Riyadh 11437, Saudi Arabia
6
Department of Power Engineering, “Gheorghe Asachi” Technical University of Iasi, 700050 Iasi, Romania
7
Centre for Inter-Disciplinary Research and Innovation, University of Petroleum and Energy Studies, Dehradun 248007, India
*
Authors to whom correspondence should be addressed.
Sensors 2022, 22(11), 4048; https://doi.org/10.3390/s22114048
Submission received: 4 April 2022 / Revised: 16 May 2022 / Accepted: 23 May 2022 / Published: 26 May 2022
(This article belongs to the Special Issue Sensing and Measurement for Advanced Power Grids)

Abstract

:
Integrating information and communication technology (ICT) and energy grid infrastructures introduces smart grids (SG) to simplify energy generation, transmission, and distribution. The ICT is embedded in selected parts of the grid network, which partially deploys SG and raises various issues such as energy losses, either technical or non-technical (i.e., energy theft). Therefore, energy theft detection plays a crucial role in reducing the energy generation burden on the SG and meeting the consumer demand for energy. Motivated by these facts, in this paper, we propose a deep learning (DL)-based energy theft detection scheme, referred to as GrAb, which uses a data-driven analytics approach. GrAb uses a DL-based long short-term memory (LSTM) model to predict the energy consumption using smart meter data. Then, a threshold calculator is used to calculate the energy consumption. Both the predicted energy consumption and the threshold value are passed to the support vector machine (SVM)-based classifier to categorize the energy losses into technical, non-technical (energy theft), and normal consumption. The proposed data-driven theft detection scheme identifies various forms of energy theft (e.g., smart meter data manipulation or clandestine connections). Experimental results show that the proposed scheme (GrAb) identifies energy theft more accurately compared to the state-of-the-art approaches.

1. Introduction

Over the years, smart electrical appliances have become an essential part of our day-to-day activities that offer consumers a fully easy-to-use automated environment and utility savings. In addition, transforming the traditional grids into smart grids (SG) requires efficient analysis and management of energy consumption to balance the demand and supply of energy [1]. Moreover, it benefits the society in terms of efficient energy usage and conservation [2,3]. According to the Electric Power Research Institute (EPRI), the energy department has predicted only a 1% annual growth rate in electricity consumption for the year 2008–2035 [4]. Although the SG installation is considerably expensive, its benefits have proved it to be highly worthy, as more and more countries are keen on expanding their use of SG in various sectors such as smart cities development, smart transportation, and many more [5]. The expansion of the SGs can be correlated to its predicted market size from the year 2017 to 2023, as shown in Figure 1 [6].
Despite several essential capabilities of SG, it comes with several challenges, such as technical and non-technical losses of energy, data delivery, support for reliability, and security [7]. For example, technical energy loss is identified as facing an outage, faulty meters, or inefficient hardware implementation. On the other hand, the non-technical losses, commonly known as energy theft, are detected when the forger uses unethical practices, for instance, manipulating the energy load consumption data by modifying the energy reading of the smart meter. As a result, energy theft has become a severe concern in some countries, proliferating at an alarming rate that directly affects the nation’s economy. For instance, Northeast Group, a Limited Liability Company (LLC), mentioned that the world loses US$89.3 billion annually to electricity theft in one of the annual study reports. India tops the list with an annual loss of $16.2 billion, followed by Brazil and Russia [8,9].
To handle the aforementioned issues of energy theft, various research work has been done by the scientific community across the globe [10]. The emergent technology of deep learning (DL) has become the forerunner when it comes to energy management and pattern analysis of demand–supply of energy and theft detection in this economy [11,12,13,14]. A recent study conducted by Harvard University argued that artificial intelligence (AI) will revolutionize the energy industry and growth in energy production can be foreseen if we employ DL algorithms for energy management in the near future as shown in Figure 2 [1,15,16,17].
However, energy theft is becoming a major concern in the energy generation and management within all societies around the world [18,19]. On a residential basis, people are adopting fraudulent activities to cut down the load consumption of electrical appliances, resulting in energy theft prospects in SG [20,21]. There are various malpractices on the demand-side to tamper with the energy consumption readings, such as installing their own pipes to bypass the smart meter so that the energy supply does not get measured, damaging, or removing the teeth of the cog used to measure energy and tamper the readings manually. On large-scale operations, it has been seen that streets have been dug up to access the main supply. By doing so, people not only commit unethical practices and crimes but they also leave themselves and those around prone to burns, shocks, fire, and explosions. Therefore, it becomes indispensable to detect outlier changes in energy consumption reading to commercial buildings, residential houses, or industries to prevent any technical or non-technical fault in the future [22,23,24,25].
In this work, we propose a DL-based long-short term memory (LSTM) model for energy consumption prediction, which is further used to compare with the actual threshold consumption values obtained from smart meters. Then, the difference between predicted energy consumption and threshold values decides if there has been tampered data in the smart meter reading [26]. If the actual energy consumption and the predictions are within the threshold value range, it is considered a normal consumption scenario; otherwise, it is an act of energy theft. Additionally, Table 1 comprises list of the symbols and its abbreviation used during implementation of the GrAb model.

1.1. Research Contributions

The following are research contributions provided by the proposed GrAb model:
  • Proposed an LSTM load prediction model to support accurate predictions of time series data provided by the smart meters installed in the smart home.
  • Provided an energy loss classification mechanism consisting of an LSTM-SVC-based deep learning approach, which can help in detecting a loss of energy taking place in the smart grid system. In case the energy loss is there, then it is classified as technical loss or non-technical loss, i.e., energy theft.
  • Comparative analysis of the LSTM model and the loss classification technique with other state-of-the-art approaches to evaluate the performance of the GrAb.

1.2. Organization of the Paper

This paper highlights the importance of smart grids, energy load prediction, energy losses, energy theft detection, demand response, and DL methods, especially LSTM. In Section 2, the data-driven schemes are described to detect the energy losses that can be further used to perceive energy theft. Then, the system model and problem formulation of GrAb are elaborated in Section 3. Next, Section 4 discusses the workflow of the proposed GrAb model. Then, Section 5 deals with the experimentation and results obtained by the GrAb model. Finally, Section 6 makes a conclusion drawn after carrying out the studies and experiments of this paper.

2. Related Work

Energy theft usually occurs when someone unethically tampers the readings of his smart meters to show a lesser energy usage than usual. As a result, the tampered readings are recorded and considered as consumption. Therefore, it becomes essential to detect such energy theft so that no one can take unethical advantage. It can be accomplished by monitoring consumer behavior toward their energy usage; if there is a sudden deviation in energy usage, it can be considered an outlier (forger). Here, in case the deviation is directed toward less energy usage, it may raise the probability of energy theft [27,28].
Earlier, there have been a few attempts to explore the issue of energy theft detection and loss classification for SG systems. In the work proposed by Yip et al. [29], there has been a focus on reducing non-technical loss due to energy thefts and defects in smart meters. In this study, the authors have proposed two linear regression-based algorithms called linear regression-based schemes for detecting energy theft and defective smart meters (LR-ETDM) and categorical variable-enhanced linear regression-based scheme for detecting energy theft and defective smart meters (CVLR-ETDM). The LR-ETDM has been presented based on consistent energy theft. Therefore, to deal with inconsistent patterns in energy theft, they deployed categorical variables into linear regression and developed CVLR-ETDM to detect even inconsistent theft patterns and faulty equipment in the SG system.
Furthermore, DL approaches have been used to improve the accuracy of the predictions. Li et al. [30] proposed a convolutional neural network-random forest (CNN-RF) model for detection of electricity theft. They have designed a CNN model to learn the various features of the dataset for different hours and days by using convolution and downsampling. They have used a dropout of 0.4 to avoid overfitting. Over the obtained features, the random forest model (RFM) is used to identify if there is energy theft or not. They carried out the experimentation on the sustainable energy authority of Ireland (SEAI) and Low-Carbon London (LCL) datasets. However, the model does not support load forecasting, and it only considers the historical data of smart meters.
Various methods have been deployed using the CNN mechanisms; Hasan et al. [31] has used the CNN-LSTM based DL approach for energy theft detection. They deployed the synthetic minority over-sampling technique (SMOTE) to generate new data points in the dataset to add the theft users and handle the class imbalance problem between normal users and theft users. The technique obtained 89% classification accuracy over the data provided by the State Grid Corporation of China. They used the confusion matrix as a parameter to rate their model. The shortcoming with this approach is that the proposed mechanism used a dataset that has no time attribute. Hence, this approach can not catch the trends in the dataset according to the time of use. The whole essence of theft detection is based on the time of a day/month and corresponding load consumption at that specific time. Then, Jindal et al. [32] presented an approach using k-means clustering to analyze the normal load consumption and the anomalous load consumption over the Dutch Residential Energy Dataset. This approach detects theft based on the difference between the predicted load and the meter reading data. However, the threshold calculation of (i.e., 10%) to energy consumption to detect energy theft raises the concern for its applicability in real life.
Yan et al. in [33] have proposed an AI-based ensemble method to detect the abnormal activities in the electricity metering infrastructure. They have used the Irish smart energy trails dataset, which has both normal and malicious data on which their ensemble classifiers are trained to bifurcate them. Their proposed approach outperforms other classifiers such as support vector machines, decision trees, and many more in terms of accuracy and false-positive rate. Then, the authors of [34] presented a deep neural network-based electricity theft detection in SGs. They discuss feature space importance, weaknesses in data pre-processing steps, and class imbalance problems. To overcome the above-mentioned issues, they compare and analyze the dataset with dynamic feature space by employing principal component analysis. Furthermore, to optimize the classifier accuracy, they used hyperparameters of the Bayesian optimizer. Their results outperform other baseline works in terms of accuracy and area under the curve (AUC) score. However, their contribution is restrictive to the dataset; hence, it is not adaptable in real-time scenarios. Furthermore, Wen et al. in [35] discuss various challenges of energy theft detection in SG, such as centralized system, privacy, and security. To tackle the aforementioned challenges, they have used distributed systems such as federated learning to preserve the privacy of the energy consumption data. To train the federated model, they have used homomorphic encryption-based encrypted training parameters instead of the raw data of SG. Then, to effectively detect the energy theft, they employed a temporal convolutional network with higher accuracy than the other state-of-the-art solutions. Table 2 shows the comparative analysis between the existing state-of-the-art work with the proposed work.
The authors of [36] studied the security aspect of energy consumption, where SGs incur from the unethical practices of electricity theft. To resolve the security issues, the authors have adopted the DL-based stacked autoencoders and sampling methods, where autoencoders are trained to extract feature space of energy consumption; then, sampling methods have been applied to solve the imbalance problem of the dataset. The results show that their proposed scheme outperforms the existing baseline work in terms of accuracy and detection rate. However, the aforementioned literature is not entirely exploring the potential extent of energy theft. Then, Godahewa et al. in [37] introduced an intelligent framework that predicts the temperature of the room and improves their setpoints. They have used a time series dataset to train the neural network that effectively predicts the temperature and sets the baseline when the room is occupied or unoccupied. Their proposed trained models save energy up to 15–20% approximately compared to the conventional temperature control system. However, the authors have not investigated the security prospect of their proposed framework. Then, the authors of [38] proposed a novel prediction technique for household power consumption prediction. They have employed AI-based models along with discrete transform function, i.e., wavelet transform. Their technique involves a self-attenuation mechanism that quickly learns the composite patterns of the household power consumption data. However, the proposed mechanism is not evaluated against any security attack such as data integrity attacks (load consumption data is modified by the attacker) that jeopardize the performance of the proposed mechanism. Furthermore, Zhenzhi et al. in [39] study different technologies to detect the electricity theft at the consumer side. They discuss existing baseline works, advantages and disadvantages of electricity theft detection technologies, and challenges in theft detection.
Several research works exist in the literature; still, the energy theft detection has not been explored to its full potential [40,41,42,43]. Hence, we propose the GrAb model to address all the challenges and important features for consideration to carrying out energy theft detection. Any variation in energy usage does not necessarily mean that it falls into the category of energy theft. There is a possibility that there might be a reduction in energy usage because of any technical issue. So, the proposed GrAb model considers all three possible scenarios, technical loss, non-technical loss (energy theft), and normal consumption of energy, which will be discussed in detail in the subsequent section.

3. System Model and Problem Formulation

The energy consumption prediction and its profiling are some of the significant aspects to identify the theft of energy using a data-driven approach to characterize the behavior of consumers. These approaches identify energy usage deviations accurately, i.e., possible energy theft. This section presents a proposed GrAb system model and problem formulation for energy theft detection.

3.1. System Model

Figure 3 depicts the system model of the proposed GrAb system to carry out the theft detection based on the energy consumption prediction followed by the classification of the energy loss profile. The GrAb system is divided into two stages: (1) energy consumption prediction and threshold calculator and (2) classification of energy loss. The energy consumption data are fetched from the SMs of residences. These collected energy data L d can be inconsistent in nature, such as missing values, incorrect values, and having a varying range of values, which requires pre-processing. It is pre-processed by filling the missing values using a central tendency, i.e., mean values. Next, to solve the range problem of the dataset load values ( L d values), we applied z-score normalization and linear interpolation to scale the values appropriately, enhancing the LSTM model’s accuracy. Furthermore, the proposed model referred to the time-series-based hourly energy consumption data, where data values are closely spaced. The openEI dataset is considered to train the LSTM model for energy consumption data prediction with the help of load data. The dataset we referred to is a standard dataset that has very few missing values; thus, employing linear interpolation can easily identify these missing values and fill them appropriately. We have explored various other techniques such as finding the mean, median, etc., but linear interpolation has given better results. In case of a long period of missing data or even peaks, the multiple imputations could be applied by using statistical or machine learning-based techniques. Furthermore, incorrect load values L d are corrected using the internal functions of pandas and numpy, such as f i l l n a ( ) , i s n a ( ) . s u m ( ) , d r o p n a ( ) , and many more. It furnished load consumption value L d for the ith hour ( h i ) of the day as ω h i and then passed it to the threshold calculator and LSTM prediction model individually.
In stage 1, the LSTM–based prediction model is presented to predict the hourly load values based on the historical data of load consumption ω h i . The LSTM model consists of three layers, which include one input layer, one middle layer, and one dense/output layer. The input and middle layers use two dropout layers to combat overfitting in the model. The hourly predicted load values P r e d represent the estimated load consumption at hour i, in accordance with the LSTM prediction model. Parallelly, in stage 1, the energy threshold calculator gives the threshold limit for energy consumption in an hour ith. This helps in classifying the energy loss, i.e., TL or NTL or normal profile (NP). If the obtained load values deviate within this limit, the load consumption is considered NP; otherwise, it is classified as TL or NTL. The threshold calculator will assign the threshold energy value for each hour i of the day d a y d , which will be calculated using the total ψ consumed in hour i throughout the month in which d a y d falls. The threshold calculator will correspondingly give the hourly threshold consumption value α . Both P r e d and α are passed into the SVC-based loss classifier.
In stage 2, The SVCM-based linear energy loss classifier has been designed to assign label S V l for energy loss classification (to display a higher or lower energy consumption) for each hour of the day. Therefore, every hour i of the day is assigned a label S V l according to the consumption done. The total count of all these labels is used to decide energy theft for a specific day d a y d . In case energy theft is not detected, the GrAb determines if there has been any TL or it has been normal consumption throughout the day using the same count of labels S V l .

3.2. Problem Formulation

As discussed in the above subsection, energy ψ is transmitted and distributed by various sources S. Each of these sources provides energy to consumers C j , who, in this case, are considered residential energy consumers. Each consumer C j is making use of several appliances { A 1 , A 2 , ⋯, A m } A . The energy consumption for each of these devices used by consumer C j may fall into an energy loss type represented by class { γ 1 , γ 2 , γ 3 } γ referred to as technical loss, non-technical loss and normal consumption. The total consumption of a day d a y d is defined as follows.
ψ d a y d = i = 1 , y = 1 i = 24 , y = 3 ψ d a y d ( h i ) γ y .
where h i represents the ith hour and γ y shows the energy loss type ∈ { γ 1 , γ 2 , γ 3 } of a particular day d a y d . The energy consumption prediction on the hourly basis ω h i is produced while passing the hourly load value, i.e., ψ h i to the LSTM model of GrAb.
ω h i = L S T M ( ψ h i )
The threshold hourly energy consumption for an hour h i in a month M x is defined by the entity α as follows.
α M x h i = ( d = 1 r i = 1 24 ψ d a y d h i ) / r
where r is the number of days in the month M x which may vary from 28 to 31 while d a y d is the dth day of the month and h i is the ith hour of that day. Let us consider Δ as the absolute difference function and μ is the meter readings recorded by the user for day d a y d . Let the SVC labels be { S V 1 , S V 2 } contained in set S V be defined as 1 and −1, respectively. Let θ ( a , b ) be the comparator function for two values a and b. The functioning of θ ( a , b ) can be defined as follows.
θ ( a , b ) = 1 , a b
and
θ ( a , b ) = 0 , a < b
Now, let ξ be the threshold limiter.
ξ = θ ( Δ ( μ h i , ω h i ) ) , Δ ( α h i , ω h i ) ) .
Then, label S V l is defined as follows.
S V l = 1 , ξ = 1 , μ h i ω h i > 0
and
S V l = 1 , ξ = 1 , μ h i ω h i < 0
For each hour h i of the day, a label S V l is given for that hour, considering the parameters and operations shown in the above equation. The problem formulation for GrAb comes down to identify the type of energy loss γ y occurred in day d a y d as follows.
γ y d a y d = Φ ( i = 1 24 S V 1 , i = 1 24 S V 2 )
where Φ is the loss classification function, subject to the constraints:
γ 1 , i = 1 24 S V 1 i = 1 24 S V 2
γ 2 , i = 1 24 S V 1 < i = 1 24 S V 2
γ 3 , i = 1 24 S V 1 = 0 , i = 1 24 S V 2 = 0
S V 1 , μ h i > ω h i
S V 2 , μ h i < ω h i
μ h i , ω h i , α h i 0

4. GrAb: The Proposed Approach

Figure 4 depicts the architecture of the DL-based energy theft detection system referred to as GrAb to ensure the reduction in non-technical energy loss. GrAb consists of four layers: (i) energy data generation and collection layer (EDGCL), (ii) threshold calculator layer (TCL), (iii) energy consumption prediction layer (ECPL), and (iv) energy theft detection layer (ETDL). Each layer is described as follows.

4.1. Energy Data Generation and Collection Layer

In this section, the energy plays a key role in the working of the electric appliance ( A k ), which needs a larger amount of energy generation (at SG) for consumers { C 1 , C 2 , ⋯, C n } C to operate their electric appliances { A 1 , A 2 , ⋯, A m } A at time T. The smart meter ( S M ) records the energy consumption data generated by various electrical appliances such as AC, refrigerators, computers, television, heater, lights, fans, and many more are recorded by the smart meter ( S M ). Here, S M collects the energy consumption data on an hourly basis for each appliance A k . Energy generation sources fulfill the energy demands of these electric household appliances to carry out day-to-day activities. There are various sources of energy such as wind power, hydropower, thermal power and many more { S 1 , S 2 , ⋯, S o } S , which provide energy to consumers { C 1 , C 2 , ⋯, C n } C , who belong to different domains { D 1 , D 2 , D 3 } D such as residential houses, industries and the commercial sector. The various amount of energy { ψ 1 , ψ 2 , ⋯, ψ q } ψ generated by the uth source S u at S G are transmitted to the relevant transmission stations and then distributed to every domain { D 1 , D 2 , D 3 }. In the case of the residential houses, D 1 , the energy consumed by consumer C j using appliance A k is recorded through S M . In the GrAb model, we have considered the hourly energy consumption data for the prediction of energy theft—the ψ q amount of energy data generated—and collected the required pre-processing for energy theft detection.

4.2. Threshold Calculator Layer

In this layer, the energy data obtained from the SM are pre-processed and converted to pre-processed data D p . Algorithm 1 shows a brief pseudocode of this layer. This D p includes data normalization between 0 and 1 to obtain better computational results. To deal with the potential missing and inconsistent values, the GrAb model uses the linear interpolation technique L I T to remove hidden inconsistencies from the collected energy data. The D P contains energy load consumption in the ith hour, ω h i , which plays a crucial role in threshold calculation and energy consumption prediction. Here, ω h i is passed to a threshold calculator to calculate the hourly threshold value of energy consumption for a specific day. C t h r e s is a decision-maker to identify energy theft in the final stage. This ω h i for each appliance A k is passed to the LSTM prediction model for energy consumption prediction, which is discussed in detail in the subsequent section.
Algorithm 1: Step-by-step process to calculate the threshold value
Input: Month M x , Energy consumption values ω h i
Output: Average Consumption C a v g
Initialization: Let d be the no. of days in month M x , and h i be set of hours { h 1 , h 2 , ⋯, h 24 }. Let C a v g [ h i ] define the threshold consumption at h i th hour.
   procedureCALCULATE_HOURLY_THRESHOLD( ω h i , M x )
       for  i 1 to d do
           for  j 1 to 24 do
               C a v g [ h i ] C a v g [ h i ] + ω h i
           end for
       end for
       for  i 1 to d do
           for  j 1 to 24 do
               C a v g [ h i ] C a v g [ h i ] ÷ d
           end for
       end for return C a v g
end procedure

4.3. Energy Consumption Prediction Layer

In this layer, the D p data contain a time-series data ω h i , which is passed to the LSTM-based prediction model of GrAb. This LSTM model comprises two LSTM layers, two dropout layers, and one dense layer. The LSTM model produces predicted load values P r e d on an hourly basis for each appliance A k . In the proposed LSTM model, the overfitting of the time series energy data is handled by including the dropout after layer-1 and layer-2 in the GrAb system, with 50 nodes in each layer. The proposed model is a sequential model with a dropout of 5% for its LSTM layers. Dropout is included with each LSTM layer as they have a greater number of nodes and parameters and are thus more prone to cause overfitting, as shown in Algorithm 2. Table 3 summarizes the details of the proposed LSTM-based energy consumption prediction model. Then, the dense layer acts as an output layer for forwarding the predicted energy load data P r e d to the next layer, i.e., the energy theft detection layer.
Algorithm 2: Working of the LSTM-based proposed model
Input: Dataset D S , Dropout d O u t
Output: Predicted load values P r e d
Initialization: From D S Consider list of V load values, { L 1 , L 2 , , L V } for the k number of appliances { A 1 , A 2 , …, A k } A
Number of nodes in LSTM model is = N L S T M
1:
procedureLSTM_LOAD_FORECASTING( D S , d O u t )
2:
    Identify Features from D S
3:
    for  v 1 to V do
4:
         L [ v ] INPUT()
5:
    end for
6:
    for  v 1 to V do
7:
        Normalize L [ v ] in range (0,1)
8:
    end for
9:
    for  v 1 to V do
10:
        if  L [ v ] .IsNotValid then
11:
            L [ v ] L [ v ] Interpolate()
12:
        end if
13:
    end for
14:
     I s e q INITIALIZE_SEQUENTIAL_LSTM_ MODEL(DS)
15:
     L S T M L a y e r 1 INPUT( L v )
16:
     L S T M L a y e r 1 .DROPOUT( d O u t )
17:
     L S T M L a y e r 2 COMPUTE( L S T M L a y e r 1 )
18:
     L S T M L a y e r 2 .DROPOUT( d O u t )
19:
     D e n s e L a y e r COMPUTE( L S T M L a y e r 2 )
20:
     P r e d PREDICT_LOAD_VALUES( D e n s e L a y e r )
21:
    return P r e d
22:
end procedure

4.4. Energy Theft Detection Layer

In this layer, the most necessary part of the classification of the predicted energy profile takes place. The predicted load values P r e d and threshold values C t h r e s are considered in this layer for the classification. Along with them, we also consider the meter readings S M R , which are the real-time energy consumption data values given by the SM. All of these values are considered on an hourly basis, and the accumulated results of each hour are considered to declare the type of consumption that has happened throughout the day. We proposed a SVM-based linear loss classifier, i.e., SVC for computational analysis of S M R , P r e d and C t h r e s , as shown in the loss classifier Algorithms 3 and 4. Here, the energy consumed throughout the day is considered energy theft or NTL ( E T ) if the energy consumption prediction P r e d is relatively lower than the C t h r e s value. In the case of no E T , the GrAb system checks for the scope of any T L of the energy consumption of the specific day. If no E T and no T L exist, then the energy consumption throughout the specific day is declared to be normal consumption N R .
Algorithm 3: SVC-based class labeling
Input: Test data value z
Output: Class Label C l γ y
Initialization: Sample Training values as X [ ] and Sample Training Labels as Y [ ]
1:
procedureSVM_CLASSIFICATION( z, ω h i )
2:
     c l f INITIALIZE_SVC_ MODEL()
3:
    SET( K e r n e l l i n e a r )
4:
    SET( G a m m a a u t o )
5:
     c l f FIT( X [ ] , Y [ ] )
6:
     C l c l f .PREDICT(z)
7:
    return C l
8:
end procedure
Algorithm 4: Loss classifier of the proposed work
Input: Smart meter readings S M R , Predicted load values P r e d , Average hourly load consumption C a v g , Day d a y d
Output: Usage classification State S t
Initialization: Let w [ ] record if the consumption has been higher than threshold on an hourly basis. Let z [ ] record if the consumption has been lower than the threshold on an hourly basis. Let h i g h c o u n t be the count of upper limit of threshold crossed in the day, and let l o w c o u n t be the count of lower limit of threshold crossed in the day
1:
procedureMAKE_CLASSIFICATION( T x , B C )
2:
    for  i 1 to 24 do
3:
        if MOD( S M R [ d a y d ] [ h i ] - P r e d [ d a y d ] [ h i ] ) >
4:
             MOD( C a v g [ d a y d ] [ h i ] - P r e d [ d a y d ] [ h i ] ) then
5:
             z S M R [ d a y d ] [ h i ] P r e d [ d a y d ] [ h i ]
6:
             r e s S V M ( z )
7:
            if  r e s = 1 then
8:
                 w [ i ] 1
9:
                if  r e s = 1  then
10:
                     z [ i ] 1
11:
                end if
12:
            else             c o n t i n u e
13:
            end if
14:
         end if
15:
    end for
16:
    for  i 1 to 24 do
17:
        if  w [ i ] =1 then
18:
            h i g h c o u n t h i g h c o u n t +1
19:
        else
20:
           if  z [ i ] =1 then
21:
                l o w c o u n t l o w c o u n t +1
22:
           else             c o n t i n u e
23:
           end if
24:
        end if
25:
    end for
26:
    if  h i g h c o u n t l o w c o u n t && h i g h c o u n t > 0  then
27:
         S t ` ` T E C H N I C A L L O S S
28:
        if  l o w c o u n t > h i g h c o u n t  then
29:
            S t ` ` T H E F T D E T E C T E D
30:
        else
31:
            S t ` ` N O R M A L
32:
        end if
33:
    end if return S t
34:
end procedure

5. Results and Discussion

The GrAb model works in two stages; as discussed in Section 3, stage 1 comprises the energy consumption prediction and threshold calculation, and stage 2 classifies the energy loss for energy theft detection. In this section, we have emphasized the discussion on results obtained from both the stages, i.e., results obtained from the proposed LSTM-based prediction model and classification of energy loss. The proposed GrAb model is used over an openEI dataset that consists of hourly consumption data.

5.1. Dataset Description

The proposed GrAb model is used over a standard benchmarked dataset, i.e., Open Energy Information (OpenEI) dataset that provides free and open-source real-time energy data for researchers, energy traders, policymakers, and technology enthusiasts to extract useful information and analysis and provide the effective decisions in SG systems. The dataset consists of hourly consumption data of several electrical devices such as AC, Light, Basic Facilities, and Miscellaneous (Misc) (considered for the experiment) for a residential house located in Alaska [44]. Furthermore, it has a time series column that specifies the date and time the hourly consumption data of electrical appliances are taken. Because of the inclusion of time series data, we have incorporated the LSTM model, which works efficiently with time series data. The dataset comprises 8761 × 4 rows and columns of hourly consumption data, which passes as an input to the AI-based LSTM model for energy consumption prediction. However, the dataset is not appropriate for training because of missing values, sensitivity to outliers, and not normalized. Therefore, appropriate python libraries are used, such as pandas and NumPy, which have default functions such as f i l l n a ( ) , i s n a ( ) , s u m , and d r o p n a that help to confront missing values. Furthermore, the interpolation technique has been utilized to solve the value range problem, i.e., in a single column, a few values are higher (6.22669 kW), and a few values are smaller (0.96790 kW); this degrades the performance of LSTM training. Therefore, the interpolation technique seamlessly standardized the value of all column values to a specific range, i.e., [—1, 1]. Then, the pre-processed data are forwarded to the LSTM model to be trained on a time series dataset of hourly consumption data, i.e., OpenEI.

5.2. Simulation Settings

The proposed GrAb model is implemented on a Windows operating system (OS) configured as Intel(R) Core(TM) CPU @ 2.60 GHz, 16 GB RAM using python, i.e., a functional programming language. Next, various open Source libraries such as Numpy v1.18.4, Pandas v1.0.4, and Keras v2.3.1 have been used to perform miscellaneous computations of DL libraries. The LSTM model learns the dynamic trends of energy consumption data for a particular residential customer.

5.3. Performance Evaluation and Comparative Analysis of LSTM Model

The energy load values predicted by the LSTM model will act as a reference to compare with the consumption data. Therefore, we have considered the energy load predictions as our actual curve. The OpenEI dataset is employed for the training and testing purposes, which is divided into a 70:30 ratio to get satisfying accuracy in prediction results. Here, Root Mean Squared Error (RMSE) and mean absolute percentage error (MAPE) are considered as the evaluation parameter for the proposed LSTM-based prediction model, as shown in Figure 5. LSTM is formally used as a time forecasting training model; hence, to evaluate the forecast accuracy of the LSTM model, RMSE and MAPE are commonly used as performance metrics. MAPE is defined as the average percentage error between the ground truth value and a forecast value for each time period. In our work, predicted energy load data P r e d is the output of the LSTM model; it can be formulated in MAPE as
MAPE = 1 n t = 1 n | P r e d ^ P r e d | P r e d
where, n represents all the data points for each time t, P r e d indicates ground truth value and P r e d ^ specifies the forecast predicted value. Contrary, the RMSE is defined as the square root of the difference between the predicted value and ground truth value for the energy load data P r e d , it is formulated as
RMSE = t = 1 n ( P r e d ^ P r e d ) 2 n
The lower the MAPE and RMSE error values, the better the performance of prediction by the LSTM model. Figure 5 illustrates the RMSE values predicted by the LSTM model for different electrical appliances. The higher the RMSE values, the lower the model’s prediction. From the graph, it is evident that the LSTM has shown an accurate prediction for miscellaneous and AC, as it has a minimum error (0.005 and 0.0010). Contrary, the LSTM model underperforms while predicting basic facilities and light load consumption as it has higher RMSE values, i.e., (0.025 and 0.015). It is important that the LSTM model correctly predicts the load consumption data of the electric appliances that are regularly used and consumes more energy, such as AC, light, fan, and others. This is because such appliances consume more energy and produce high-energy tariff bills for the consumers. Therefore, the forgers try to modify the load consumption data of such appliances to get the minimum tariff bill. Needless to say, the proposed work has accurately predicted the load consumption data of the above-mentioned electric appliances, which results in reduced energy theft in smart grids. Table 4 shows a comparative analysis of the prediction error of MAPE and RMSE for different electrical appliances. The higher the prediction error, the lower the LSTM model’s performance. From Table 4, we can observe that the MAPE prediction error is higher than the RMSE prediction error; this happens because it calculates the absolute average percentage error, but RMSE uses square root to minimize the error. In addition, MAPE is not considered a valuable performance metric when dealing with the time series dataset because MAPE is not differentiable, and its hessian is zero wherever it is defined. So, there might be a need for differentiation when forecasting future energy consumption values. Therefore, RMSE is a reliable performance metric as it is differentiable at any instant of time. The error values show that the miscellaneous has a lower RMSE value and basic facilities have a higher RMSE value (also shown in Figure 5). Incorporating RMSE makes the model highly accurate in load consumption prediction against the other exiting approaches. The last row shows an average load consumption prediction error for both MAPE and RMSE; the value of RMSE is small, indicating that the predicted and actual data are close to each other, which implies that the model has better accuracy. So, we consider the results of the prediction (using the LSTM model) as a basis on which the load classification is employed in the GrAb model.
The efficiency of the G r A b LSTM prediction model is being compared to the other state-of-the-art approaches that also use the LSTM-based load forecasting model for energy consumption data of residential houses [45]. Khan et al. [46] (Baseline 1) presented an LSTM-Autoencoder-oriented DL approach to predict the load consumption at the household level by using the UCI machine learning repository [47]. This approach comes up with the prediction results with a low error rate, i.e., an RMSE value of 0.47.
In contrast, the GrAb LSTM model gives an RMSE value of 0.0137 (considering the average RMSE value from Table 4), which is quite low, as shown in Figure 6a. To validate the accuracy of the GrAb LSTM model, we have obtained MAPE as one of the parameters to compare with state-of-the-art approaches. Choi et al. [48] (Baseline 2) presented an LSTM-based mixed data sampling (MIDAS) model to predict the load consumption for short and long term on a residential dataset [49]. The MIDAS produces a value of 32.5 MAPE, where the GrAb produces a 7.42 average MAPE value, which outshines the GrAb in terms of MAPE as well compared to other state-of-the-art approaches, as shown in Figure 6b.

5.4. Energy Loss Classification Results

As the dataset mentioned in the previous subsection does not have any traces of theft data, we injected synthetic data to simulate the theft scenario for classification of energy losses and theft detection using the GrAb model. The false data injection is accomplished by analyzing the probability distribution of the dataset because once the synthetic generator generates the data, it should map the probability distribution of the original dataset. However, we want a forge data to be inserted into the dataset to efficiently train our AI models for the prediction and detection of energy theft. Hence, the synthetically generated data will not entirely follow the probability distribution of the original dataset. To do so, we have used a conditional generative adversarial network (CTGAN) by employing an open-source python library, i.e., CTGAN. First, we have imported an essential library of CTGAN, i.e., CTGANSynthesizer, wherein we have provided hyperparameters, such as b a t c h _ s i z e , e p o c h s , and v e r b o s e to initialize the model training. Then, with the help of the f i t ( ) function, we trained the model to generate 1500 synthetic data samples, which are then appended to the original dataset. The principle for this synthetic data injection is that a counterfeit customer can tamper with the home energy system (by tampering the smart meter or other means) to reduce the energy consumption value reported to the SG. For this purpose, we injected false data values for each appliance for a specific customer and compared them with the consumption data calculated based on the threshold values of the genuine customer. We have considered both the positive and negative deviation of load consumption to detect such technical loss.
The classification result of energy loss for each scenario is summarized in Table 5, and Figure 7 shows the hourly distribution of positive, negative, and neutral deviation of energy consumption for each appliance.

5.4.1. Case I—Technical Loss

Suppose the injected data hourly consumption value is less than the threshold value; then, it is considered energy theft. If it is more than the threshold value, it could be a technical loss, and the rest falls as the normal load consumption profile. For example, let us take the traces of 14th May data for appliance AC and inject the false data for the given day. Then, by using the LSTM model, we have predicted the values of the load consumption and compared them with the actual (baseline values marked in green color) values, as shown in Figure 8.
Due to the high accuracy of the proposed LSTM model, we consider the model’s predictions as our actual curve to compare with the anomalous data for theft detection. As shown in Figure 8, the anomalous hourly consumption is marked in red color and shows the technical energy losses. Then, the normal load profile is marked in sky-blue color.
For the given scenario of Figure 8, the load consumption P r e d at 3 a.m. is 0.1312 kWh. The average consumption for an hour at 3 a.m. during May is 0.1486 kWh. Therefore, a difference of 0.017k Wh is valid to consider the consumption normal. Now, looking at the anomalous data, the consumption at 3 a.m. shown by the meter reading is 0.1046 kWh. The magnitude of its deviation from the baseline curve is 0.026 kWh. Since this difference in consumption is greater than the one allowed for consumption at 3 a.m., the SVM-based loss classifier algorithm classifies it as a reading lower than allowed and updates L [ 3 ] = 1 .
Conventionally, for any particular hour i, in case the magnitude of difference between predicted load consumption (actual) and baseline value is greater than that of the threshold value, the load consumption is verified if they fall on the higher or lower end, and correspondingly, the list H [ ] and L [ ] are updated, respectively, for an hour i to detect technical energy losses. Similarly, technical energy losses for other appliances such as light, Misc, and Basic facilities have been reported.
The LSTM model is used to predict the value of load consumption (normal load profile is marked in sky-blue color) and compare it with baseline values (green line), as shown in Figure 9. The graph shows the energy loss prediction for an electric appliance, i.e., light. Furthermore, it depicts the normal energy loss prediction where the baseline (green line) shows the ground truth values and the red line shows the predicted anomalous load profile values of the LSTM model. Figure 9 shows the abnormal behavior in the LSTM-based predicted load profile values; this happens because we have synthetically injected the data (to detect the energy theft), which is not in the distribution of the original load profile data. From the graph shown in Figure 9, it can be observed that at a time (t = 11), the baseline shows 0.064 kWh load consumption; however, the anomalous load shows 0.13 kWh load consumption. Similarly, at a time (t = 21), we can notice the same malicious behavior of the forger. When the actual value fluctuates from the baseline value, there is a high possibility of an energy theft scenario.

5.4.2. Case II—Energy Theft

We have injected synthetic data to create a scenario of energy theft in which malicious customers have lowered their meter readings for unethical means. The malicious user can lower his own appliances load and might increase the load values of his neighborhood so that the overall energy consumption of the locality remains the same. Thus, no one might be able to detect his meter tampering practice.
To handle the aforementioned issue, the threshold energy consumption value is calculated in the proposed Grab model to identify energy theft, i.e., energy consumption < threshold value. Here, GrAb analyzes each resident’s appliance consumption individually to detect energy theft on a practical basis to grab the unethical practices of the malicious customer.
Here, the load consumption analysis for energy theft of the basic facility is shown in Figure 10. It illustrates the normal load profile (marked in sky-blue color) of basic electric appliances, where the baseline (green line) indicates the existing values and the anomalous load profile (red line) indicates the predicted values from the LSTM model. In the figure, both sky-blue and green lines overlap, which signifies that there is no data integrity issue in the load consumption data, i.e., no energy theft. However, it is noticeable from the graph (Figure 10) that the load profile of the basic electric appliances deviates from its normal average load profile, indicating an energy theft. At the time (t = 7), the baseline load consumption and normal value are 1.2; however, due to the false injection, the anomalous value fluctuates from the baseline value, i.e., the value is 0.9. The same is also noticeable at the time (t = 20); the baseline load consumption value is 1.7; however, the actual predicted value is 1.5, indicating the case of energy theft.
Furthermore, Figure 11 depicts the energy loss prediction for miscellaneous electrical appliances. It shows the normal load consumption profile (sky-blue line) for miscellaneous electrical devices for a specific day. In contrast, the graph shows the anomalous load profile (red line) for the same day to notice the energy theft. The baseline value (green line) indicates the ground truth values, and the anomalous value (red line) indicates the predicted values by the LSTM model. From Figure 11, we can observe that the baseline and normal loads are overlapped with each other; this happens because the LSTM model correctly predicts the load profile for the electrical device. However, the graph shows the malicious behavior of the attacker, where it has injected a false reading in the load profile. For instance, at a time (t = 20), the baseline value is 0.61; however, the anomalous value has fluctuated to 0.53, which signifies a scenario of energy theft.

5.4.3. Case III—Normal Energy Consumption

This case comprises the magnitude of difference between the predicted consumption of the synthetic data and the baseline values in a specific hour. If this difference is in the range of the allowed fluctuation calculated from the threshold calculator of the GrAb model for the specific appliances within the particular hour, such a case can not be considered as any loss, and it is normal energy consumption.

6. Conclusions

The modernization of grid infrastructure, i.e., SG, has improved energy generation, distribution, and management. Even though the adoption of SG is not yet uniform around the world, many countries have started investing heavily in SG deployment. However, energy management becomes difficult due to energy losses either via technical or non-technical reasons (i.e., energy theft), which increases the energy generation burden on SG. In this paper, we propose a data-driven analytical model referred to as GrAb to identify the energy theft in a residential area. The GrAb used the DL-based LSTM model to make predictions on energy consumption data and proposed a threshold calculator. Then, an SVM-based loss classifier is used to classify energy consumption into three classes—technical, non-technical, and normal energy consumption—based on the threshold value. Implementing the proposed model in a real-time environment can benefit society and the government agencies by catching the people who resort to unethical practices such as energy theft. Furthermore, the GrAb also benefits the resident owners by ensuring that they are not using faulty smart meters and helping genuine customers reduce the excess energy bill caused due to energy theft. In the future, the GrAb can be extended to commercial areas and industries to increase the revenues of the utility providers. Additionally, we will employ AI-based federated learning and integrate it into the smart meters of the smart grid, which will detect the energy theft in the local smart meter of a particular individual as well as the global smart meter in case the attackers have wirelessly maneuvered the smart meter of a large geographic area.

Author Contributions

Conceptualization: M.S.R. and S.T.; Writing—original draft preparation: M.S.R., F.A., A.K. and D.V.; Methodology: F.A., B.-C.N. and S.T.; Writing—review and editing: S.T., R.S., B.-C.N. and A.T.; Investigation: D.V., A.K. and A.T.; Supervision: A.K., S.T.; Visualization; B.-C.N., F.A. and R.S.; Software; S.T., M.S.R. and A.T. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Researchers Supporting Project No. (RSP2022R509) King Saud University, Riyadh, Saudi Arabia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This work was funded by the Researchers Supporting Project No. (RSP2022R509), King Saud University, Riyadh, Saudi Arabia and partially supported by UEFISCDI Romania and MCI through projects AISTOR, FinSESco, I-DELTA, DEFRAUDIFY, Hydro3D, FED4FIRE-SO-SHARED and by European Union’s Horizon 2020 research and innovation program under grant agreements No. 872172 (TESTBED2) and No. 777996 (SealedGRID) and Ministry of Research, Innovation and Digitization through 487 Program 1—Development of the national research and development system, Subprogram 1.1. Insti-488 tutional performance—Projects to finance excellence in RDI, Contract No. 19PFE/30.12.2021 and a 489 grant of the National Center for Hydrogen and Fuel Cells (CNHPC)—Installations and Special 490 Objectives of National Interest (IOSIN).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kumari, A.; Tanwar, S.; Tyagi, S.; Kumar, N.; Obaidat, M.S.; Rodrigues, J.J. Fog Computing for Smart Grid Systems in the 5G Environment: Challenges and Solutions. IEEE Wirel. Commun. 2019, 26, 47–53. [Google Scholar] [CrossRef]
  2. Belitz, H.J.; Winter, S.; Müller, C.; Langhammer, N.; Kays, R.; Wietfeld, C.; Rehtanz, C. Technical and economic analysis of future smart grid applications in the E-DeMa project. In Proceedings of the 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), Berlin, Germany, 14–17 October 2012; pp. 1–8. [Google Scholar]
  3. Gagwari, D.; Bhatia, R. A brief analysis of recent developments in smart grid. In Proceedings of the 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), Kozhikode, India, 19–21 February 2015; pp. 1–5. [Google Scholar]
  4. L1. Available online: http://deeplearning.net/tutorial/lstm.html (accessed on 30 December 2019).
  5. Espinoza, J.L.; Samaniego, E.; Jara-Alvear, J.; Ochoa, T.D. Smart grids: A multi-scale framework of analysis. In Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), Quito, Ecuador, 20–22 September 2017; pp. 1–6. [Google Scholar]
  6. L3. Available online: https://www.statista.com/statistics/246154/global-smart-grid-market-size-by-region/ (accessed on 30 April 2020).
  7. He, X.; Ai, Q.; Qiu, R.C.; Huang, W.; Piao, L.; Liu, H. A big data architecture design for smart grids based on random matrix theory. IEEE Trans. Smart Grid 2015, 8, 674–686. [Google Scholar] [CrossRef]
  8. L2. Available online: https://www.prnewswire.com/news-releases/world-loses-893-billion-to-electricity-theft-annually-587-billion-in-emerging-markets-300006515.html (accessed on 30 April 2020).
  9. Caciotta, M.; Giarnetti, S.; Leccese, F. Hybrid neural network system for electric load forecasting of telecomunication station. In Proceedings of the XIX IMEKO World Congress Fundamental and Applied Metrology, Lisbon, Portugal, 6–11 September 2009; pp. 657–661. [Google Scholar]
  10. Zhang, D.; Han, X.; Deng, C. Review on the research and practice of deep learning and reinforcement learning in smart grids. CSEE J. Power Energy Syst. 2018, 4, 362–370. [Google Scholar] [CrossRef]
  11. Günel, K.; Ekti, A.R. Exploiting Machine Learning Applications for Smart Grids. In Proceedings of the 2019 16th International Multi-Conference on Systems, Signals & Devices (SSD), Istanbul, Turkey, 21–24 March 2019; pp. 679–685. [Google Scholar]
  12. Hossain, E.; Khan, I.; Un-Noor, F.; Sikander, S.S.; Sunny, M.S.H. Application of big data and machine learning in smart grid, and associated security concerns: A review. IEEE Access 2019, 7, 13960–13988. [Google Scholar] [CrossRef]
  13. Pisica, I.; Eremia, M. Making smart grids smarter by using machine learning. In Proceedings of the 2011 46th International Universities’ Power Engineering Conference (UPEC), Soest, Germany, 5–8 September 2011; pp. 1–5. [Google Scholar]
  14. Singh, S.; Yassine, A.; Benlamri, R. Towards Hybrid Energy Consumption Prediction in Smart Grids with Machine Learning. In Proceedings of the 2018 4th International Conference on Big Data Innovations and Applications (Innovate-Data), Barcelona, Spain, 6–8 August 2018; pp. 44–50. [Google Scholar]
  15. L4. Available online: http://sitn.hms.harvard.edu/flash/2017/artificial-intelligence-will-revolutionize-energy-industry/ (accessed on 30 April 2020).
  16. Xu, H.; Huang, H.; Khalid, R.S.; Yu, H. Distributed machine learning based smart-grid energy management with occupant cognition. In Proceedings of the 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm), Sydney, NSW, Australia, 6–9 November 2016; pp. 491–496. [Google Scholar]
  17. Tanwar, S.; Bhatia, Q.; Patel, P.; Kumari, A.; Singh, P.K.; Hong, W.C. Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward. IEEE Access 2019, 8, 474–488. [Google Scholar] [CrossRef]
  18. Singh, S.K.; Bose, R.; Joshi, A. Energy theft detection in advanced metering infrastructure. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 4–8 February 2018; pp. 529–534. [Google Scholar]
  19. Wen, M.; Yao, D.; Li, B.; Lu, R. State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  20. L5. Available online: https://www.opusenergy.com/blog/energy-theft-the-dangers-you-need-to-know-about/ (accessed on 30 April 2020).
  21. Sakhnini, J.; Karimipour, H.; Dehghantanha, A. Smart grid cyber attacks detection using supervised learning and heuristic feature selection. In Proceedings of the 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 12–14 August 2019. [Google Scholar]
  22. Velascoa, J.A.; Amarís, H.; Alonsoa, M.; Miguelezb, M. Energy Losses Estimation in Low Voltage Smart Grids by using Loss Maps. In Proceedings of the International Conference on Energy, Environment and Economics (ICEEE2018), Edinburgh, UK, 14–16 August 2018. [Google Scholar]
  23. Jindal, A.; Dua, A.; Kaur, K.; Singh, M.; Kumar, N.; Mishra, S. Decision tree and SVM-based data analytics for theft detection in smart grid. IEEE Trans. Ind. Inform. 2016, 12, 1005–1016. [Google Scholar] [CrossRef]
  24. Yip, S.C.; Tan, C.K.; Tan, W.N.; Gan, M.T.; Bakar, A.H.A. Energy theft and defective meters detection in AMI using linear regression. In Proceedings of the 2017 IEEE International Conference on Environment and Electrical Engineering and 2017 IEEE Industrial and Commercial Power Systems Europe (EEEIC/I&CPS Europe), Milan, Italy, 6–9 June 2017; pp. 1–6. [Google Scholar]
  25. Richardson, C.; Race, N.; Smith, P. A privacy preserving approach to energy theft detection in smart grids. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 12–15 September 2016; pp. 1–4. [Google Scholar]
  26. Özdemir, Ö.; Tornai, K. Smart Grid Data Classification with Deep Networks. In Proceedings of the Smart SysTech 2018—European Conference on Smart Objects, Systems and Technologies, Munich, Germany, 12–13 June 2018; pp. 1–9. [Google Scholar]
  27. Yassine, A.; Shirehjini, A.A.N.; Shirmohammadi, S. Smart meters big data: Game theoretic model for fair data sharing in deregulated smart grids. IEEE Access 2015, 3, 2743–2754. [Google Scholar] [CrossRef]
  28. Munshi, A.A.; Yasser, A.R.M. Big data framework for analytics in smart grids. Electr. Power Syst. Res. 2017, 151, 369–380. [Google Scholar] [CrossRef]
  29. Yip, S.C.; Wong, K.; Hew, W.P.; Gan, M.T.; Phan, R.C.W.; Tan, S.W. Detection of energy theft and defective smart meters in smart grids using linear regression. Int. J. Electr. Power Energy Syst. 2017, 91, 230–240. [Google Scholar] [CrossRef]
  30. Li, S.; Han, Y.; Yao, X.; Yingchen, S.; Wang, J.; Zhao, Q. Electricity Theft Detection in Power Grids with Deep Learning and Random Forests. J. Electr. Comput. Eng. 2019, 2019, 4136874. [Google Scholar] [CrossRef]
  31. Hasan, M.; Toma, R.N.; Nahid, A.A.; Islam, M.; Kim, J.M. Electricity Theft Detection in Smart Grid Systems: A CNN-LSTM Based Approach. Energies 2019, 12, 3310. [Google Scholar] [CrossRef] [Green Version]
  32. Jindal, A.; Schaeffer-Filho, A.; Marnerides, A.K.; Smith, P.; Mauthe, A.; Granville, L. Tackling energy theft in smart grids through data-driven analysis. In Proceedings of the 2020 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 17–20 February 2020; pp. 410–414. [Google Scholar]
  33. Yan, Z.; Wen, H. Electricity Theft Detection Base on Extreme Gradient Boosting in AMI. IEEE Trans. Instrum. Meas. 2021, 70, 1–9. [Google Scholar] [CrossRef]
  34. Lepolesa, L.J.; Achari, S.; Cheng, L. Electricity Theft Detection in Smart Grids Based on Deep Neural Network. IEEE Access 2022, 10, 39638–39655. [Google Scholar] [CrossRef]
  35. Wen, M.; Xie, R.; Lu, K.; Wang, L.; Zhang, K. FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid. IEEE Internet Things J. 2022, 9, 6069–6080. [Google Scholar] [CrossRef]
  36. Lin, G.; Feng, X.; Guo, W.; Cui, X.; Liu, S.; Jin, W.; Lin, Z.; Ding, Y. Electricity Theft Detection Based on Stacked Autoencoder and the Undersampling and Resampling Based Random Forest Algorithm. IEEE Access 2021, 9, 124044–124058. [Google Scholar] [CrossRef]
  37. Godahewa, R.; Deng, C.; Prouzeau, A.; Bergmeir, C. A Generative Deep Learning Framework Across Time Series to Optimize the Energy Consumption of Air Conditioning Systems. IEEE Access 2022, 10, 6842–6855. [Google Scholar] [CrossRef]
  38. Saad Saoud, L.; Al-Marzouqi, H.; Hussein, R. Household Energy Consumption Prediction Using the Stationary Wavelet Transform and Transformers. IEEE Access 2022, 10, 5171–5183. [Google Scholar] [CrossRef]
  39. Lin, Z.; Cui, X.; Jin, W.; Liu, S.; Feng, X.; Feng, H. Key Technologies of Electricity Theft Detection at Consumer Side. Dianli Xitong Zidonghua [Autom. Electr. Power Syst.] 2022, 46, 188–199. [Google Scholar] [CrossRef]
  40. Zheng, J.; Xu, C.; Zhang, Z.; Li, X. Electric load forecasting in smart grids using long-short-term-memory based recurrent neural network. In Proceedings of the 2017 51st Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 22–24 March 2017; pp. 1–6. [Google Scholar]
  41. Kong, W.; Dong, Z.Y.; Jia, Y.; Hill, D.J.; Xu, Y.; Zhang, Y. Short-term residential load forecasting based on LSTM recurrent neural network. IEEE Trans. Smart Grid 2017, 10, 841–851. [Google Scholar] [CrossRef]
  42. Choi, H.; Ryu, S.; Kim, H. Short-term load forecasting based on ResNet and LSTM. In Proceedings of the 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aalborg, Denmark, 29–31 October 2018; pp. 1–6. [Google Scholar]
  43. Zheng, Y.; Suryanarayanan, S.; Maciejewski, A.A.; Siegel, H.J.; Hansen, T.M.; Celik, B. An Application of Machine Learning for a Smart Grid Resource Allocation Problem. In Proceedings of the 2019 IEEE Milan PowerTech, Milan, Italy, 23–27 June 2019; pp. 1–6. [Google Scholar]
  44. OpenEI. Open Energy Information. Available online: https://openei.org/datasets/files/961/pub/RESIDENTIAL_LOAD_DATA_E_PLUS_OUTPUT/BASE/ (accessed on 5 January 2020).
  45. Hossen, T.; Nair, A.S.; Chinnathambi, R.A.; Ranganathan, P. Residential Load Forecasting Using Deep Neural Networks (DNN). In Proceedings of the 2018 North American Power Symposium (NAPS), Fargo, ND, USA, 9–11 September 2018; pp. 1–5. [Google Scholar] [CrossRef]
  46. Khan, Z.A.; Hussain, T.; Ullah, A.; Rho, S.; Lee, M.; Baik, S.W. Towards Efficient Electricity Forecasting in Residential and Commercial Buildings: A Novel Hybrid CNN with a LSTM-AE based Framework. Sensors 2020, 20, 1399. [Google Scholar] [CrossRef] [Green Version]
  47. Hébrail, G.; Bérard, A. Individual Household Electric Power Consumption Data Set. UCI Machine Learning Repository. 2012. Available online: https://archive.ics.uci.edu/ml/datasets/individual+household+electric+power+consumption (accessed on 9 January 2020).
  48. Choi, E.; Cho, S.; Kim, D.K. Power Demand Forecasting using Long Short-Term Memory (LSTM) Deep-Learning Model for Monitoring Energy Sustainability. Sustainability 2020, 12, 1109. [Google Scholar] [CrossRef] [Green Version]
  49. He, Y.; Lin, B. Forecasting China’s total energy demand and its structure using ADL-MIDAS model. Energy 2018, 151, 420–429. [Google Scholar] [CrossRef]
Figure 1. Smart Grid Market Growth [6].
Figure 1. Smart Grid Market Growth [6].
Sensors 22 04048 g001
Figure 2. Energy Growth Forecasting Using Deep Learning.
Figure 2. Energy Growth Forecasting Using Deep Learning.
Sensors 22 04048 g002
Figure 3. GrAb System Model.
Figure 3. GrAb System Model.
Sensors 22 04048 g003
Figure 4. GrAb system architecture.
Figure 4. GrAb system architecture.
Sensors 22 04048 g004
Figure 5. RMSE values for devices using GrAb.
Figure 5. RMSE values for devices using GrAb.
Sensors 22 04048 g005
Figure 6. Comparison of the proposed GrAb model and state-of-art approaches. (a) Grab—RMSE Comparison. (b) Grab—MAPE Comparison.
Figure 6. Comparison of the proposed GrAb model and state-of-art approaches. (a) Grab—RMSE Comparison. (b) Grab—MAPE Comparison.
Sensors 22 04048 g006
Figure 7. Distribution of hours for deviation.
Figure 7. Distribution of hours for deviation.
Sensors 22 04048 g007
Figure 8. Energy loss prediction for AC.
Figure 8. Energy loss prediction for AC.
Sensors 22 04048 g008
Figure 9. Energy loss prediction for lights.
Figure 9. Energy loss prediction for lights.
Sensors 22 04048 g009
Figure 10. Energy Loss prediction for Basic Facilities.
Figure 10. Energy Loss prediction for Basic Facilities.
Sensors 22 04048 g010
Figure 11. Energy loss prediction for miscellaneous devices.
Figure 11. Energy loss prediction for miscellaneous devices.
Sensors 22 04048 g011
Table 1. Abbreviations Used.
Table 1. Abbreviations Used.
SymbolsDescriptionSymbolsDescription
AIArtificial IntelligenceICTInformation Communication Technology
SGSmart GridsEPRIElectric Power Research Institute
LSTMLong Short-Term MemoryRFMRandom Forest Model
RMSERoot Mean Square ErrorEDGCLEnergy Data Generation and Collection Layer
MAPEMean Absolute Percentage Error T C L Threshold Calculator Layer
S t Classification StateETDLEnergy Theft Detection Layer
HHour L d Load Consumption Data
MMonth d a y d dth day
SVCSupport Vector Classifier E C P L Energy Consumption Prediction Layer
SummationETEnergy Theft
for allSMSmart Meters
LITLinear Interpolation Technique D P Preprocessed data
C t h r e s Threshold ConsumptionTECThreshold Energy Calculator
P r e d Predicted Load Values S M R Meter readings
TLTechnical lossNTLNon-Technical Loss
NRNormal Consumtion γ Loss Type
ω h i Load Consumption in Hour i α Threshold Consumption
θ Comapartor Function ξ Threshold Limiter
Δ Modulus Function S V l SVC label
Φ Loss Classifier ψ Energy
CSet of ConsumersASet of Appliances
SSet of Energy Sources R F Random Forest
LRLinear Regression--
LCLLow-Carbon LondonETDMDetection of Energy Theft and Defective Smart Meters
CNNConvolutional Neural NetworkCVLRCategorical Variable-Enhanced Linear Regression
SEAISustainable Energy Authority of IrelandSMOTESynthetic Minority Over-Sampling Technique
Table 2. Comparative analysis between existing state-of-the-art work with our proposed work.
Table 2. Comparative analysis between existing state-of-the-art work with our proposed work.
AuthorYearObjectiveProsCons
Wen et al. [19]2018Privacy preserving and energy theft detection in smart gridsReduce the computation overhead and efficient energy theft detectionProposed detection mechanism supports only linear systems
Sakhnini et al. [21]2019Detection of cyberattacks on smart grids using AI modelsImproved detection rate and feature selection using genetic algorithmSlow convergence because of a complex fitness function
Yan et al. [33]2021Electricity theft detection using AI models for smart metersConsider six different types of attack in the datasetFeature space is small and data imbalance problem
Lin et al. [36]2021Electricity theft detection using autoencoders and resampling techniquesEmphasis on detection strategies and solves class imbalance problemProposed model is not evaluated features specific to electrical data
Godahewa et al. [37]2022Optimize the energy consumption of an air conditioner using DLReduce the energy consumption to approximately 15–20%Not consider the security aspect (energy theft)
Saoud et al. [38]2022Reducing the household energy consumption using wavelet transform and AI modelsImproved prediction performance using wavelet transformComplex reconstruction of the signals by wavelet transform
The proposed work2022Detection of energy theft using DL-based analytical schemeCombinatorial approach of LSTM and support vector machine (SVM) enhances the detection rate-
Table 3. GrAb: LSTM-based prediction model.
Table 3. GrAb: LSTM-based prediction model.
EnergyConsumptionPrediction ModelStructure
AttributeLayer 1Layer 2Layer 3
TypeInput–LSTMHidden–LSTMOutput–Dense
No. of Nodes50501
Dropout5%5%-
Model TypeSequential
Table 4. Prediction accuracy for individual devices in GrAb.
Table 4. Prediction accuracy for individual devices in GrAb.
Device NameMAPE Value (%)RMSE Value
AC22.820.0111
Lights3.980.0148
Misc0.280.0053
Basic Facilities2.610.0256
Average7.420.0137
Table 5. SVC model based Loss Classification Result.
Table 5. SVC model based Loss Classification Result.
DeviceTimeAllowed Fluctuation (kWh)Observed Fluctuation (kWh)SVC LabelTL/NTL CountLoss Type (T/NTL)
AC3:00 a.m.0.0170.026—12/2TL
4:00 a.m.0.0170.045—1
8:00 p.m.0.0160.0341
9:00 p.m.0.0190.0311
Lights11:00 a.m.0.0010.064102/01TL
12:00 p.m.0.0020.0761
9:00 p.m.0.0120.158—1
Basic Facilities7:00 a.m.0.0830.259—10/4NTL
8:00 a.m.0.0190.16—1
8:00 p.m.0.0080.166—1
9:00 p.m.0.0130.198—1
Miscellaneous Facilities6:00 a.m.0.0080.026—10/2NTL
8:00 p.m.0.0110.070—1
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tanwar, S.; Kumari, A.; Vekaria, D.; Raboaca, M.S.; Alqahtani, F.; Tolba, A.; Neagu, B.-C.; Sharma, R. GrAb: A Deep Learning-Based Data-Driven Analytics Scheme for Energy Theft Detection. Sensors 2022, 22, 4048. https://doi.org/10.3390/s22114048

AMA Style

Tanwar S, Kumari A, Vekaria D, Raboaca MS, Alqahtani F, Tolba A, Neagu B-C, Sharma R. GrAb: A Deep Learning-Based Data-Driven Analytics Scheme for Energy Theft Detection. Sensors. 2022; 22(11):4048. https://doi.org/10.3390/s22114048

Chicago/Turabian Style

Tanwar, Sudeep, Aparna Kumari, Darshan Vekaria, Maria Simona Raboaca, Fayez Alqahtani, Amr Tolba, Bogdan-Constantin Neagu, and Ravi Sharma. 2022. "GrAb: A Deep Learning-Based Data-Driven Analytics Scheme for Energy Theft Detection" Sensors 22, no. 11: 4048. https://doi.org/10.3390/s22114048

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop