The scientists explained that SMs are essential to advanced metering infrastructure (AMI), enabling remote monitoring and linking utilities with customers while supporting a rooftop PV–driven green energy transition. However, their widespread deployment introduces significant cybersecurity risks, including inaccurate billing, energy theft, service disruptions, and privacy breaches, making robust security measures essential.
They estimated that over 209 million SMs are currently deployed across Europe and said that, while these devices offer functionalities such as outage detection, theft detection, and power quality monitoring, they also raise concerns about privacy, data interception, and system vulnerability.
The group also emphasized that cyberattacks, particularly false data injection, can manipulate meter readings, compromise system integrity, and cause significant financial losses for utilities. By altering consumption data, attackers can evade billing, enable energy theft, or distort demand patterns used for grid management.
Beyond direct revenue impacts, these attacks can mislead system operators, resulting in incorrect operational decisions such as improper load balancing, faulty demand forecasting, or inefficient energy distribution. Over time, such disruptions can degrade system performance and reliability.
Currently, hardware-based and software-based approaches are used to detect anomalies in SM data. Hardware solutions require additional equipment, while software-based methods include data-driven, network-based, state estimation-based, and hybrid techniques. Both solutions, however, face challenges such as scalability issues, inability to detect multiple simultaneous attacks, sensitivity to noise, and reliance on expensive measurement devices like Phasor Measurement Units (PMUs).
To address these limitations, the researchers proposed a novel attack detection method that leverages smart meter data and a robust state estimation framework.
The proposed approach relies on a distribution system state estimator (DSSE), which is a mathematical tool that processes limited, noisy real-time data from sensors, to determine grid states, such as voltages and currents, even when measurements are noisy or incomplete. It then constructs confidence ellipses around the estimated values to capture uncertainty. These ellipses, commonly used to visualize the relationship and variability between two variables, provide a statistical boundary for expected behavior.
By measuring the distance between real-time data and these boundaries, the method can reportedly identify anomalies, with any value falling outside its corresponding ellipse being flagged as suspicious, indicating a potential cyberattack.
This approach, according to the research team, simplifies threshold selection, improves detection accuracy, and performs well even under high noise conditions and multiple-node attacks. It was validated using two grid models of different sizes, simulating both single-node and multiple-node attacks. Attack scenarios involved small manipulations of voltage values, which are realistic for avoiding detection.
The method was then compared with traditional techniques such as the chi-square test and the Largest Normalized Residual (LNR) test, with the results showing that while traditional methods are sensitive to noise and require careful threshold tuning, the proposed approach maintains high detection accuracy and reduces false detections, especially in noisy environments.
“It should be noted that the suggested approach has a higher computational complexity and requires more processing power to accomplish,” the academics stated. “However, this method provides a more precise detection of power theft, an issue that imposes enormous costs on both society and end-users, who jointly endure the financial burden of stolen energy until its termination.”
By submitting this form you agree to pv magazine using your data for the purposes of publishing your comment.
Your personal data will only be disclosed or otherwise transmitted to third parties for the purposes of spam filtering or if this is necessary for technical maintenance of the website. Any other transfer to third parties will not take place unless this is justified on the basis of applicable data protection regulations or if pv magazine is legally obliged to do so.
You may revoke this consent at any time with effect for the future, in which case your personal data will be deleted immediately. Otherwise, your data will be deleted if pv magazine has processed your request or the purpose of data storage is fulfilled.
Further information on data privacy can be found in our Data Protection Policy.