Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric
dc.contributor.author | Hock, D | |
dc.contributor.author | Kappes, M | |
dc.contributor.author | Ghita, B::0000-0002-1788-547X | |
dc.date.accessioned | 2020-02-10T12:12:37Z | |
dc.date.available | 2020-02-10T12:12:37Z | |
dc.date.issued | 2020-03 | |
dc.identifier.issn | 2352-4677 | |
dc.identifier.issn | 2352-4677 | |
dc.identifier.other | 100290 | |
dc.identifier.uri | http://hdl.handle.net/10026.1/15366 | |
dc.description.abstract |
With the digitalization of electricity meters many previously solved security problems, such as electricity theft, are reintroduced as IT related challenges which require modern detection schemes based on data analysis, machine learning and forecasting. Here, we demonstrate a multidimensional anomaly detection approach for the early detection of tampered with electricity meters by comparing a set of multiple energy demand time series. Our method can complement and enhance existing monitoring systems which usually only analyze a single time series. We aim to detect electricity theft, which leads to noticeable outliers in our work. We present three data preprocessing methods to produce outliers in case of energy theft and highlight the requirements and fine-tuning mechanisms for the aggregation and comparison of multiple data sources. We show that our metric is robust against multiple manipulated data sources, which is a concrete improvement to alternative outlier preserving concepts to aggregate multiple data sources. With detection rates better than 90%, we demonstrate the effectiveness of using several data sources simultaneously, that, when used individually, provide little value in anomaly detection. Furthermore, we show that we can use different households as comparable data sources, without clustering the households according to their similarity first. | |
dc.format.extent | 100290-100290 | |
dc.language | en | |
dc.language.iso | en | |
dc.publisher | Elsevier BV | |
dc.subject | Electricity theft | |
dc.subject | Anomaly detection | |
dc.title | Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric | |
dc.type | journal-article | |
dc.type | Journal Article | |
plymouth.author-url | https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000528845900012&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008 | |
plymouth.volume | 21 | |
plymouth.publication-status | Published | |
plymouth.journal | Sustainable Energy, Grids and Networks | |
dc.identifier.doi | 10.1016/j.segan.2019.100290 | |
plymouth.organisational-group | /Plymouth | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics | |
plymouth.organisational-group | /Plymouth/Users by role | |
plymouth.organisational-group | /Plymouth/Users by role/Academics | |
dcterms.dateAccepted | 2019-12-07 | |
dc.rights.embargodate | 2020-6-6 | |
dc.identifier.eissn | 2352-4677 | |
dc.rights.embargoperiod | Not known | |
rioxxterms.versionofrecord | 10.1016/j.segan.2019.100290 | |
rioxxterms.licenseref.uri | http://www.rioxx.net/licenses/all-rights-reserved | |
rioxxterms.licenseref.startdate | 2020-03 | |
rioxxterms.type | Journal Article/Review |