Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (43)

Search Parameters:
Keywords = theft of electrical energy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 668 KiB  
Article
Bridging the Energy Divide: An Analysis of the Socioeconomic and Technical Factors Influencing Electricity Theft in Kinshasa, DR Congo
by Patrick Kankonde and Pitshou Bokoro
Energies 2025, 18(13), 3566; https://doi.org/10.3390/en18133566 - 7 Jul 2025
Viewed by 387
Abstract
Electricity theft remains a persistent challenge, particularly in developing economies where infrastructure limitations and socioeconomic disparities contribute to illegal connections. This study analyzes the determinants influencing electricity theft in Kinshasa, the Democratic Republic of Congo, using a logistic regression model applied to 385 [...] Read more.
Electricity theft remains a persistent challenge, particularly in developing economies where infrastructure limitations and socioeconomic disparities contribute to illegal connections. This study analyzes the determinants influencing electricity theft in Kinshasa, the Democratic Republic of Congo, using a logistic regression model applied to 385 observations, which includes random bootstrapping sampling for enhanced stability and power analysis validation to confirm the adequacy of the sample size. The model achieved an AUC of 0.86, demonstrating strong discriminatory power, while the Hosmer–Lemeshow test (p = 0.471) confirmed its robust fit. Our findings indicate that electricity supply quality, financial stress, tampering awareness, and billing transparency are key predictors of theft likelihood. Households experiencing unreliable service and economic hardship showed higher theft probability, while those receiving regular invoices and alternative legal energy solutions exhibited lower risk. Lasso regression was implemented to refine predictor selection, ensuring model efficiency. Based on these insights, a multifaceted policy approach—including grid modernization, prepaid billing systems, awareness campaigns, and regulatory enforcement—is recommended to mitigate electricity theft and promote sustainable energy access in urban environments. Full article
(This article belongs to the Section F4: Critical Energy Infrastructure)
Show Figures

Figure 1

21 pages, 666 KiB  
Article
Efficient and Accurate Zero-Day Electricity Theft Detection from Smart Meter Sensor Data Using Prototype and Ensemble Learning
by Alyaman H. Massarani, Mahmoud M. Badr, Mohamed Baza, Hani Alshahrani and Ali Alshehri
Sensors 2025, 25(13), 4111; https://doi.org/10.3390/s25134111 - 1 Jul 2025
Viewed by 705
Abstract
Electricity theft remains a pressing challenge in modern smart grid systems, leading to significant economic losses and compromised grid stability. This paper presents a sensor-driven framework for electricity theft detection that leverages data collected from smart meter sensors, key components in smart grid [...] Read more.
Electricity theft remains a pressing challenge in modern smart grid systems, leading to significant economic losses and compromised grid stability. This paper presents a sensor-driven framework for electricity theft detection that leverages data collected from smart meter sensors, key components in smart grid monitoring infrastructure. The proposed approach combines prototype learning and meta-level ensemble learning to develop a scalable and accurate detection model, capable of identifying zero-day attacks that are not present in the training data. Smart meter data is compressed using Principal Component Analysis (PCA) and K-means clustering to extract representative consumption patterns, i.e., prototypes, achieving a 92% reduction in dataset size while preserving critical anomaly-relevant features. These prototypes are then used to train base-level one-class classifiers, specifically the One-Class Support Vector Machine (OCSVM) and the Gaussian Mixture Model (GMM). The outputs of these classifiers are normalized and fused in a meta-OCSVM layer, which learns decision boundaries in the transformed score space. Experimental results using the Irish CER Smart Metering Project (SMP) dataset show that the proposed sensor-based detection framework achieves superior performance, with an accuracy of 88.45% and a false alarm rate of just 13.85%, while reducing training time by over 75%. By efficiently processing high-frequency smart meter sensor data, this model contributes to developing real-time and energy-efficient anomaly detection systems in smart grid environments. Full article
Show Figures

Figure 1

18 pages, 2848 KiB  
Article
Detecting Benford’s Law Effectiveness Threshold Differences According to Affecting Operation
by Jaroslav Petráš, Ardian Hyseni, Ján Zbojovský and Marek Pavlík
Axioms 2025, 14(4), 273; https://doi.org/10.3390/axioms14040273 - 3 Apr 2025
Viewed by 789
Abstract
Benford’s Law describes the effect of specific first significant digit probability distribution in natural datasets. In the case of non-natural or artificial intervention within such datasets, the first digit probability distribution tends to deviate from the theoretical distribution. Thus, Benford’s Law-based methods are [...] Read more.
Benford’s Law describes the effect of specific first significant digit probability distribution in natural datasets. In the case of non-natural or artificial intervention within such datasets, the first digit probability distribution tends to deviate from the theoretical distribution. Thus, Benford’s Law-based methods are useful in detecting unnatural changes in datasets indicating artificial manipulation of the original data. In our article, we first briefly describe the theory behind this law with an overview of Benford’s Law’s properties. We then focus on conformity tests for Benford’s Law as methods for data change detection compared with the original dataset. In our research, the datasets were collected from electricity consumption metering devices. We provide the results of conformity with Benford’s Law for affected datasets within a series of simulations with different affecting operations. We found a research gap when comparing the deviation from a theoretical first-digit probability distribution for different operations affecting the original dataset. We have made a series of simulations with different affecting operations and we tried to determine the effectiveness thresholds for each operation. As shown in the results section, different intervention operations manifest different specific thresholds of such deviations from Benford’s Law’s distribution. Full article
Show Figures

Figure 1

25 pages, 3911 KiB  
Article
Advanced Methodology for Fraud Detection in Energy Using Machine Learning Algorithms
by Silviu Gresoi, Grigore Stamatescu and Ioana Făgărășan
Appl. Sci. 2025, 15(6), 3361; https://doi.org/10.3390/app15063361 - 19 Mar 2025
Viewed by 1359
Abstract
The increasing cost of energy and the prevalence of electricity theft pose significant financial and operational challenges for energy providers. Traditional fraud detection methods often fail to identify sophisticated unauthorized consumption, particularly in non-smart-grid environments. This study proposes an advanced machine learning-based methodology [...] Read more.
The increasing cost of energy and the prevalence of electricity theft pose significant financial and operational challenges for energy providers. Traditional fraud detection methods often fail to identify sophisticated unauthorized consumption, particularly in non-smart-grid environments. This study proposes an advanced machine learning-based methodology for detecting energy fraud, leveraging real-world data from energy distribution networks. This approach integrates multiple machine learning models—k-nearest neighbors (kNN), decision trees, random forest, and artificial neural networks (ANNs)—to improve detection accuracy and efficiency. Experimental results demonstrate an 89.5% fraud detection accuracy, significantly outperforming conventional methods. Furthermore, the implementation of this model led to an estimated financial loss reduction of EUR 45,200. By analyzing historical consumption patterns, anomaly detection techniques, and geospatial data, the proposed system enhances fraud detection capabilities across both smart and non-smart grids. Future research will focus on real-time detection, scalability, and the integration of external data sources to further refine predictive accuracy. Full article
Show Figures

Figure 1

16 pages, 3128 KiB  
Article
Risk Assessment Method of Solar Smart Grid Network Security Based on TimesNet Model
by Yushu Cheng and Bochao Zhao
Appl. Sci. 2025, 15(6), 2882; https://doi.org/10.3390/app15062882 - 7 Mar 2025
Viewed by 829
Abstract
Smart grids have enormous potential in terms of reliability and sustainability, but with the large-scale integration of distributed energy like solar energy, the network security risks of smart grids have also increased. In response to the physical and information network threats faced in [...] Read more.
Smart grids have enormous potential in terms of reliability and sustainability, but with the large-scale integration of distributed energy like solar energy, the network security risks of smart grids have also increased. In response to the physical and information network threats faced in the network security risk assessment of solar powered smart grids, this study develops a smart grid theft detection model based on TimesNet and a smart grid intrusion detection model based on bidirectional long short-term memory networks. The results indicated that when the proportion of electricity theft data was 25%, the false detection rate of the proposed model was 3.52. The area under the curve of the proposed model was 0.98, and the detection rate, false negative rate, F1 value, and accuracy were 97.04%, 1.21%, 92.69%, and 97.15%, respectively. The loss value of the proposed intrusion detection model was stable at around 0.012 in the NSL-KDD dataset and around 0.02 in the CICIDS2017 dataset, with a detection accuracy of 97.54% and a false positive rate of 1.21%. The experiment demonstrated the electricity theft behavior and network intrusion detection performance of the proposed model, which can effectively detect security threats faced by solar smart grids and provide practical basis for network security risk assessment. The research results can help reduce the economic losses of power companies, maintain a good order of electricity consumption, and ensure the safe and stable operation of solar smart grids. Full article
(This article belongs to the Special Issue Advanced Smart Grid Technologies, Applications and Challenges)
Show Figures

Figure 1

20 pages, 6699 KiB  
Article
Evaluating the Performance of Smart Meters: Insights into Energy Management, Dynamic Pricing and Consumer Behavior
by Konstantinos G. Koukouvinos, George K. Koukouvinos, Pavlos Chalkiadakis, Stavrοs D. Kaminaris, Vasilios A. Orfanos and Dimitrios Rimpas
Appl. Sci. 2025, 15(2), 960; https://doi.org/10.3390/app15020960 - 19 Jan 2025
Cited by 4 | Viewed by 4449
Abstract
Energy consumption demands are rapidly increasing every year, with an 8% annual growth rate projected for the next five years. As buildings represent over 35% of this demand, a metering system is required for monitoring to accurately calculate costs. This paper explores the [...] Read more.
Energy consumption demands are rapidly increasing every year, with an 8% annual growth rate projected for the next five years. As buildings represent over 35% of this demand, a metering system is required for monitoring to accurately calculate costs. This paper explores the evolution and impact of energy management through smart meters, emphasizing their superiority over traditional electromechanical devices, in applications such as minimizing power losses and enhancing grid reliability. This study compares the performance of five distinct metering systems, including electromechanical and advanced smart meters. Real-time testing across various scenarios is incorporated, examining parameters such as real and reactive power measurement, accuracy and adaptability to smart grids. Key findings revealed that smart meters, notably the EDMI Mk10A, outperform legacy systems in precision, data transmission and energy optimization. In addition, the potential of smart meters to enable dynamic cost calculation and prevent electricity theft is evident. Despite their advantages, challenges such as data privacy, installation costs and electromagnetic radiation concerns, persist. Future investigations to address the identified limitations are required. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

18 pages, 2161 KiB  
Article
Blending-Based Ensemble Learning Low-Voltage Station Area Theft Detection
by Dunchu Chen, Wenwu Li and Jie Fang
Energies 2025, 18(1), 31; https://doi.org/10.3390/en18010031 - 25 Dec 2024
Viewed by 748
Abstract
In order to improve the efficiency of electricity theft detection, the power theft detection area and users should be better integrated, we proposed a Blending ensemble learning electricity theft detection model based on the Base Learner Selection Strategy (BLSS). Firstly, the adaptive synthetic [...] Read more.
In order to improve the efficiency of electricity theft detection, the power theft detection area and users should be better integrated, we proposed a Blending ensemble learning electricity theft detection model based on the Base Learner Selection Strategy (BLSS). Firstly, the adaptive synthetic (ADASYN) sampling method is used to process the unbalanced power consumption data, and the sample distribution of training data is balanced. Secondly, the BLSS selection method is used to screen the optimal base learner combination and construct the Blending ensemble learning model. Then, based on the historical data, the model makes a short-term prediction of the power consumption of the station area the next day, and focuses on the verification of the suspected energy-stealing station area where the Root Mean Square Percentage Error (RSPE) exceeds the threshold, so as to lock in the potential energy stealing users. Finally, through the comparison and verification of real examples, the search scope for electricity theft inspections was reduced by 79.17%, greatly improving the detection efficiency of the power supply company. At the same time, the model’s electricity theft detection and recognition accuracy rate can be as high as 97.50%. The Blending ensemble learning electricity stealing detection model based on the BLSS base learner selection method has strong electricity stealing detection and recognition ability. Full article
(This article belongs to the Section F: Electrical Engineering)
Show Figures

Figure 1

19 pages, 2264 KiB  
Article
Scientometric Analysis of Publications on Household Electricity Theft and Energy Consumption Load Profiling in a Smart Grid Context
by José Antonio Moreira de Rezende, Reginaldo Gonçalves Leão Junior and Otávio de Souza Martins Gomes
Sustainability 2024, 16(22), 9921; https://doi.org/10.3390/su16229921 - 14 Nov 2024
Viewed by 1054
Abstract
This study provides a scientometric analysis of research focused on energy theft detection and load profiling in smart grid networks. Data were retrieved from the Web of Science and Scopus databases, covering publications from 2003 to April 2024. Using the Bibliometrix package and [...] Read more.
This study provides a scientometric analysis of research focused on energy theft detection and load profiling in smart grid networks. Data were retrieved from the Web of Science and Scopus databases, covering publications from 2003 to April 2024. Using the Bibliometrix package and VOSviewer software, we analyzed trends in publications, author productivity, collaborative networks, and key journals. The study highlights significant growth in the research field, with China and the USA emerging as the most productive countries, with strong international collaboration. Nadeem Javaid is identified as a leading author, contributing to publications with a strong focus on the application of deep learning techniques for energy consumption analysis in smart grids. Key journals such as IEEE Access, Applied Energy, and Energies were found to be central to this research area. Our findings highlighted the importance of this area, as smart grid technologies continue to evolve, requiring advanced methodologies to detect non-technical losses and analyze consumption patterns. This research supports the United Nations’ (UN) Sustainable Development Goals (SDGs), particularly goals related to sustainable energy and infrastructure development, by emphasizing the importance of technological innovation and collaboration in tackling energy theft. Full article
Show Figures

Figure 1

25 pages, 2699 KiB  
Article
Accurate Power Consumption Predictor and One-Class Electricity Theft Detector for Smart Grid “Change-and-Transmit” Advanced Metering Infrastructure
by Atef Bondok, Omar Abdelsalam, Mahmoud Badr, Mohamed Mahmoud, Maazen Alsabaan, Muteb Alsaqhan and Mohamed I. Ibrahem
Appl. Sci. 2024, 14(20), 9308; https://doi.org/10.3390/app14209308 - 12 Oct 2024
Cited by 4 | Viewed by 1283
Abstract
The advanced metering infrastructure (AMI) of the smart grid plays a critical role in energy management and billing by enabling the periodic transmission of consumers’ power consumption readings. To optimize data collection efficiency, AMI employs a “change and transmit” (CAT) approach. This approach [...] Read more.
The advanced metering infrastructure (AMI) of the smart grid plays a critical role in energy management and billing by enabling the periodic transmission of consumers’ power consumption readings. To optimize data collection efficiency, AMI employs a “change and transmit” (CAT) approach. This approach ensures that readings are only transmitted when there is enough change in consumption, thereby reducing data traffic. Despite the benefits of this approach, it faces security challenges where malicious consumers can manipulate their readings to launch cyberattacks for electricity theft, allowing them to illegally reduce their bills. While this challenge has been addressed for supervised learning CAT settings, it remains insufficiently addressed in unsupervised learning settings. Moreover, due to the distortion introduced in the power consumption readings due to using the CAT approach, the accurate prediction of future consumption for energy management is a challenge. In this paper, we propose a two-stage approach to predict future readings and detect electricity theft in the smart grid while optimizing data collection using the CAT approach. For the first stage, we developed a predictor that is trained exclusively on benign CAT power consumption readings, and the output of the predictor is the actual readings. To enhance the prediction accuracy, we propose a cluster-based predictor that groups consumers into clusters with similar consumption patterns, and a dedicated predictor is trained for each cluster. For the second stage, we trained an autoencoder and a one-class support vector machine (SVM) on the benign reconstruction errors of the predictor to classify instances of electricity theft. We conducted comprehensive experiments to assess the effectiveness of our proposed approach. The experimental results indicate that the prediction error is very small and the accuracy of detection of the electricity theft attacks is high. Full article
(This article belongs to the Section Transportation and Future Mobility)
Show Figures

Figure 1

2 pages, 393 KiB  
Correction
Correction: Akram et al. Towards Big Data Electricity Theft Detection Based on Improved RUSBoost Classifiers in Smart Grid. Energies 2021, 14, 8029
by Rehan Akram, Nasir Ayub, Imran Khan, Fahad R. Albogamy, Gul Rukh, Sheraz Khan, Muhammad Shiraz and Kashif Rizwan
Energies 2024, 17(18), 4661; https://doi.org/10.3390/en17184661 - 19 Sep 2024
Viewed by 876
Abstract
There was an error in the original publication [...] Full article
19 pages, 4309 KiB  
Article
Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks
by Ali Alshehri, Mahmoud M. Badr, Mohamed Baza and Hani Alshahrani
Sensors 2024, 24(10), 3236; https://doi.org/10.3390/s24103236 - 20 May 2024
Cited by 11 | Viewed by 3292
Abstract
Smart power grids suffer from electricity theft cyber-attacks, where malicious consumers compromise their smart meters (SMs) to downscale the reported electricity consumption readings. This problem costs electric utility companies worldwide considerable financial burdens and threatens power grid stability. Therefore, several machine learning (ML)-based [...] Read more.
Smart power grids suffer from electricity theft cyber-attacks, where malicious consumers compromise their smart meters (SMs) to downscale the reported electricity consumption readings. This problem costs electric utility companies worldwide considerable financial burdens and threatens power grid stability. Therefore, several machine learning (ML)-based solutions have been proposed to detect electricity theft; however, they have limitations. First, most existing works employ supervised learning that requires the availability of labeled datasets of benign and malicious electricity usage samples. Unfortunately, this approach is not practical due to the scarcity of real malicious electricity usage samples. Moreover, training a supervised detector on specific cyberattack scenarios results in a robust detector against those attacks, but it might fail to detect new attack scenarios. Second, although a few works investigated anomaly detectors for electricity theft, none of the existing works addressed consumers’ privacy. To address these limitations, in this paper, we propose a comprehensive federated learning (FL)-based deep anomaly detection framework tailored for practical, reliable, and privacy-preserving energy theft detection. In our proposed framework, consumers train local deep autoencoder-based detectors on their private electricity usage data and only share their trained detectors’ parameters with an EUC aggregation server to iteratively build a global anomaly detector. Our extensive experimental results not only demonstrate the superior performance of our anomaly detector compared to the supervised detectors but also the capability of our proposed FL-based anomaly detector to accurately detect zero-day attacks of electricity theft while preserving consumers’ privacy. Full article
Show Figures

Figure 1

27 pages, 4542 KiB  
Article
A Low-Cost Energy Monitoring System with Universal Compatibility and Real-Time Visualization for Enhanced Accessibility and Power Savings
by Hashim Raza Khan, Majida Kazmi, Lubaba, Muhammad Hashir Bin Khalid, Urooj Alam, Kamran Arshad, Khaled Assaleh and Saad Ahmed Qazi
Sustainability 2024, 16(10), 4137; https://doi.org/10.3390/su16104137 - 15 May 2024
Cited by 5 | Viewed by 4686
Abstract
Energy management is important for both consumers and utility providers. Utility providers are concerned with identifying and reducing energy wastage and thefts. Consumers are interested in reducing their energy consumption and bills. In Pakistan, residential and industrial estates account for nearly 31,000 MW [...] Read more.
Energy management is important for both consumers and utility providers. Utility providers are concerned with identifying and reducing energy wastage and thefts. Consumers are interested in reducing their energy consumption and bills. In Pakistan, residential and industrial estates account for nearly 31,000 MW of the maximum total demand, while the transmission and distribution capacity has stalled at about 22,000 MW. This 9000 MW gap in demand and supply, as reported in 2022, has led to frequent load shedding. Although the country now has an excess generation capacity of about 45,000 MW, the aging transmission and distribution network cannot deliver the requisite power at all times. Hence, electricity-related problems are likely to continue for the next few years in the country and the same is true for other low- and middle-income countries (LMICs). Several energy monitoring systems (EnMS) have been proposed, but they face limitations in terms of cost, ease of application, lack of universal installation capability, customization, and data security. The research below focused on the development of an economical, secure, and customizable real-time EnMS. The proposed EnMS comprises low-cost hardware for gathering energy data with universal compatibility, a secured communication module for real-time data transmission, and a dashboard application for visualization of real-time energy consumption in a user-preferred manner, making the information easily accessible and actionable. The experimental results and analysis revealed that approximately 40% cost savings in EnMS development could be achieved compared to other commercially available EnMSs. The performance of the EnMS hardware was evaluated and validated through rigorous on-site experiments. The front-end of the EnMS was assessed through surveys and was found to be interactive and user-friendly for the target clients. The developed EnMS architecture was found to be an economical end-product and an appropriate approach for small and medium clients such as residential, institutional, commercial, and industrial consumers, all on one platform. Full article
Show Figures

Figure 1

24 pages, 3307 KiB  
Article
LazyFrog: Advancing Security and Efficiency in Commercial Wireless Charging with Adaptive Frequency Hopping
by Sungkyu Ahn, Hyelim Jung and Ki-Woong Park
Sensors 2024, 24(8), 2571; https://doi.org/10.3390/s24082571 - 17 Apr 2024
Cited by 1 | Viewed by 1249
Abstract
With the proliferation of electronic devices and electricity-based mobility solutions, the significance of wireless power transfer technology has increased substantially. However, ensuring secure and reliable power transmission to authorized users remains a significant challenge. Addressing this complex issue requires an integrated approach that [...] Read more.
With the proliferation of electronic devices and electricity-based mobility solutions, the significance of wireless power transfer technology has increased substantially. However, ensuring secure and reliable power transmission to authorized users remains a significant challenge. Addressing this complex issue requires an integrated approach that balances efficiency, stability, and security considerations. While current efforts primarily focus on improving charging efficiency and user convenience, integrating robust security measures into wireless charging infrastructure is challenging due to its inherently open nature and susceptibility to external interference. Technical advancements are required to strengthen the security of the wireless charging infrastructure; however, these should be balanced with power loss management. This study tackles two core issues: the increasing hardware requirements for billing system authentication protocols and the interception of wireless charging signals by unauthorized users, leading to power theft and subsequent losses. To address these challenges, we propose a mechanism termed “LazyFrog”. This mechanism dynamically adjusts the frequency hopping schedule, activating frequency changes only in response to detected threats during remote charging or upon identifying unauthorized access attempts. The proposed mechanism compares the expected power reception at the device with the actual power supplied by the charging station, enabling the detection of abnormal power losses. By minimizing unnecessary frequency changes and optimizing energy consumption, LazyFrog reduces hardware requirements. Moreover, we have implemented a relative distance estimation mechanism to facilitate efficient power transfer as wireless devices move within the charging environment. With these features, LazyFrog demonstrates a secure, flexible, and energy-efficient wireless charging system ready for practical application. Full article
Show Figures

Figure 1

17 pages, 3555 KiB  
Article
Artificial Intelligence for Energy Theft Detection in Distribution Networks
by Mileta Žarković and Goran Dobrić
Energies 2024, 17(7), 1580; https://doi.org/10.3390/en17071580 - 26 Mar 2024
Cited by 8 | Viewed by 3798
Abstract
The digitization of distribution power systems has revolutionized the way data are collected and analyzed. In this paper, the critical task of harnessing this information to identify irregularities and anomalies in electricity consumption is tackled. The focus is on detecting non-technical losses (NTLs) [...] Read more.
The digitization of distribution power systems has revolutionized the way data are collected and analyzed. In this paper, the critical task of harnessing this information to identify irregularities and anomalies in electricity consumption is tackled. The focus is on detecting non-technical losses (NTLs) and energy theft within distribution networks. A comprehensive overview of the methodologies employed to uncover NTLs and energy theft is presented, leveraging measurements of electricity consumption. The most common scenarios and prevalent cases of anomalies and theft among consumers are identified. Additionally, statistical indicators tailored to specific anomalies are proposed. In this research paper, the practical implementation of numerous artificial intelligence (AI) algorithms, including the artificial neural network (ANN), ANFIS, autoencoder neural network, and K-mean clustering, is highlighted. These algorithms play a central role in our research, and our primary objective is to showcase their effectiveness in identifying NTLs. Real-world data sourced directly from distribution networks are utilized. Additionally, we carefully assess how well statistical methods work and compare them to AI techniques by testing them with real data. The artificial neural network (ANN) accurately identifies various consumer types, exhibiting a frequency error of 7.62%. In contrast, the K-means algorithm shows a slightly higher frequency error of 9.26%, while the adaptive neuro-fuzzy inference system (ANFIS) fails to detect the initial anomaly type, resulting in a frequency error of 11.11%. Our research suggests that AI can make finding irregularities in electricity consumption even more effective. This approach, especially when using data from smart meters, can help us discover problems and safeguard distribution networks. Full article
(This article belongs to the Special Issue Energy Management and Optimization for New Power Systems)
Show Figures

Figure 1

25 pages, 6252 KiB  
Article
Research on Blockchain-Enabled Smart Grid for Anti-Theft Electricity Securing Peer-to-Peer Transactions in Modern Grids
by Jalalud Din, Hongsheng Su, Sajad Ali and Muhammad Salman
Sensors 2024, 24(5), 1668; https://doi.org/10.3390/s24051668 - 4 Mar 2024
Cited by 6 | Viewed by 2427
Abstract
Electricity theft presents a significant financial burden to utility companies globally, amounting to trillions of dollars annually. This pressing issue underscores the need for transformative measures within the electrical grid. Accordingly, our study explores the integration of block chain technology into smart grids [...] Read more.
Electricity theft presents a significant financial burden to utility companies globally, amounting to trillions of dollars annually. This pressing issue underscores the need for transformative measures within the electrical grid. Accordingly, our study explores the integration of block chain technology into smart grids to combat electricity theft, improve grid efficiency, and facilitate renewable energy integration. Block chain’s core principles of decentralization, transparency, and immutability align seamlessly with the objectives of modernizing power systems and securing transactions within the electricity grid. However, as smart grids advance, they also become more vulnerable to attacks, particularly from smart meters, compared to traditional mechanical meters. Our research aims to introduce an advanced approach to identifying energy theft while prioritizing user privacy, a critical aspect often neglected in existing methodologies that mandate the disclosure of sensitive user data. To achieve this goal, we introduce three distributed algorithms: lower–upper decomposition (LUD), lower–upper decomposition with partial pivoting (LUDP), and optimized LUD composition (OLUD), tailored specifically for peer-to-peer (P2P) computing in smart grids. These algorithms are meticulously crafted to solve linear systems of equations and calculate users’ “honesty coefficients,” providing a robust mechanism for detecting fraudulent activities. Through extensive simulations, we showcase the efficiency and accuracy of our algorithms in identifying deceitful users while safeguarding data confidentiality. This innovative approach not only bolsters the security of smart grids against energy theft, but also addresses privacy and security concerns inherent in conventional energy-theft detection methods. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Back to TopTop