10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area...

14
1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 1 Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks Yang Liu, Shiyan Hu, Senior Member, IEEE and Tsung-Yi Ho, Senior Member, IEEE Abstract—In this work, the vulnerability of the electricity pricing model in the smart home system is assessed. Two closely related pricing cyberattacks which manipulate the guideline electricity prices received at smart meters are considered and they aim at reducing the expense of the cyberattacker and increasing the peak energy usage in the local community. A single event detection technique which uses support vector regression and impact difference for detecting anomaly pricing is proposed. The detection capability of such a technique is still limited since it does not model the long term impact of pricing cyberattacks. This motivates us to develop a partially observable Markov decision process based detection algorithm, which has the ingredients such as reward expectation and policy transfer graph to account for the cumulative impact and the potential future impact due to pricing cyberattacks. Our simulation results demonstrate that the pricing cyberattack can reduce the cyberattacker’s bill by 34.3% at cost of the increase of others’ bill by 7.9%, and increase the peak to average ratio (PAR) by 35.7%. Furthermore, the proposed long term detection technique has the detection accuracy of more than 97% with significant reduction in PAR and bill compared to repeatedly using the single event detection technique. Index Terms—Smart Home, Cybersecurity, Partially Observable Markov Decision Process, Advanced Metering Infrastructure, Electricity Pricing Manipulation 1 I NTRODUCTION S MART home controls the end use of a power grid and it has become a critical component in the smart grid infrastructure. Smart home scheduling technique plays a key role in the smart home system as it controls the energy usage of the customers. It reduces the energy consumption during the time period when electricity price is high and shift it to the cheap time period. In this fashion, the average monetary cost of customers for energy consumption is reduced and the energy load of the power grid is balanced over the time horizon. From the utility perspective, a nicely designed electricity pricing curve will guide the energy usage of customers which can result in a balanced energy load in the community. In fact, in the prevailing U.S. electricity market, there are two pricing models which are popularly used together. The first one is the real time pricing. Based on the energy consumed in a past time window (e.g., one hour), a utility can charge the local community through billing to each customer who consumes the energy in that time window. Basically, the real time pricing determines the charge based on the actual energy consumption. The second model is called guideline pricing or predicted pricing. Since a smart home scheduler is to determine when to launch each appliance in advance, it needs to know the future utility pricing. However, this cannot be known since it depends on the actual energy consumption in the future. Thus, the utility has to predict the future load, design a predictive pricing curve, and use it to guide the smart home schedulers on when the cheap time slots would be. This predictive pricing is called guideline pricing. Basically, the guideline pricing is not used to charge the customers while it is necessary for guiding them on energy scheduling. Refer to Figure 1 for the two pricing models provided by ComED Corporation. Typically, the predictive guideline pricing well matches the actual real time pricing, which is as expected. Implementing smart home scheduling needs the support from the communication system associated with a smart grid, which Yang Liu and Shiyan Hu are with Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI, 49931, USA (e-mail: [email protected]; [email protected]) Tsung-Yi Ho is with Department of Computer Science and Information Engineering, National Chiao Tung University, Hsinchu, Taiwan (e-mail: [email protected]) Shiyan Hu is the corresponding author. is known as advanced metering infrastructure (AMI) [2], [3]. The AMI enables the two-way communications between utilities and the customers and facilitates smart home scheduling. Home area networks and utility networks are two important components in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are commonly deployed. The home area networks are connected to the utility network aggregation points via the broadband technologies such as WiMAX, IEEE 802.16e, broadband PLC, and even LTE [4]. In the real implementation of the AMI, different combinations of the protocols can be chosen depending on the need. In a simplified communication infrastructure of AMI, the utility transmits the pricing information to a central computer in the local community or substation. Subsequently, such pricing information is broadcast to smart meters. The specific communication protocol depends on the communication infrastructure of the local community. Refer to Figure 2. There are some existing smart home scheduling works utilizing this infrastructure such as [2], [5]. The above popular infrastructure is vulnerable to at least three attacking strategies. First, one can directly hack the computer in the local community or substation and modify the pricing infor- mation there. Subsequently, the pricing information forwarded to the whole community could be a fake one. Second, one can block an access point in the WiFi network using the jamming attack (i.e., sending excessive requests to the access point), create a fake access point and send the faking pricing information to the smart meters covered by the fake access point. Third, one can hack the smart me- ter and modify the pricing it receives. With the different difficulty levels in implementation, the cyberattacker can choose which one to use. In this work, we focus on the cyberattack based on smart meter tampering. The modern smart meters are usually micro- controller based and installed with advanced embedded operation systems. For example, the smart meter of Texas Instruments is based on MSP430, which supports two-way communication such that the system can be remotely upgraded [6]. Remote upgrading makes the smart meter vulnerable to cyberattacks. In fact, multiple public media reports witness that various smart devices such as security camera, smart TV, smart doorlock, smart refrigerators, smart bulbs and powered outlets became the targets of hackers [7], [8], [9].

Transcript of 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area...

Page 1: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 1

Leveraging Strategic Detection Techniques for Smart HomePricing Cyberattacks

Yang Liu, Shiyan Hu, Senior Member, IEEE and Tsung-Yi Ho, Senior Member, IEEE

Abstract—In this work, the vulnerability of the electricity pricing model in the smart home system is assessed. Two closely related pricingcyberattacks which manipulate the guideline electricity prices received at smart meters are considered and they aim at reducing the expenseof the cyberattacker and increasing the peak energy usage in the local community. A single event detection technique which uses supportvector regression and impact difference for detecting anomaly pricing is proposed. The detection capability of such a technique is still limitedsince it does not model the long term impact of pricing cyberattacks. This motivates us to develop a partially observable Markov decisionprocess based detection algorithm, which has the ingredients such as reward expectation and policy transfer graph to account for thecumulative impact and the potential future impact due to pricing cyberattacks. Our simulation results demonstrate that the pricing cyberattackcan reduce the cyberattacker’s bill by 34.3% at cost of the increase of others’ bill by 7.9%, and increase the peak to average ratio (PAR) by35.7%. Furthermore, the proposed long term detection technique has the detection accuracy of more than 97% with significant reduction inPAR and bill compared to repeatedly using the single event detection technique.

Index Terms—Smart Home, Cybersecurity, Partially Observable Markov Decision Process, Advanced Metering Infrastructure, ElectricityPricing Manipulation

1 INTRODUCTION

SMART home controls the end use of a power grid and it hasbecome a critical component in the smart grid infrastructure.

Smart home scheduling technique plays a key role in the smarthome system as it controls the energy usage of the customers.It reduces the energy consumption during the time period whenelectricity price is high and shift it to the cheap time period. Inthis fashion, the average monetary cost of customers for energyconsumption is reduced and the energy load of the power gridis balanced over the time horizon. From the utility perspective,a nicely designed electricity pricing curve will guide the energyusage of customers which can result in a balanced energy load inthe community.

In fact, in the prevailing U.S. electricity market, there are twopricing models which are popularly used together. The first one isthe real time pricing. Based on the energy consumed in a past timewindow (e.g., one hour), a utility can charge the local communitythrough billing to each customer who consumes the energy inthat time window. Basically, the real time pricing determinesthe charge based on the actual energy consumption. The secondmodel is called guideline pricing or predicted pricing. Since a smarthome scheduler is to determine when to launch each appliancein advance, it needs to know the future utility pricing. However,this cannot be known since it depends on the actual energyconsumption in the future. Thus, the utility has to predict thefuture load, design a predictive pricing curve, and use it to guidethe smart home schedulers on when the cheap time slots wouldbe. This predictive pricing is called guideline pricing. Basically,the guideline pricing is not used to charge the customers while it isnecessary for guiding them on energy scheduling. Refer to Figure 1for the two pricing models provided by ComED Corporation.Typically, the predictive guideline pricing well matches the actualreal time pricing, which is as expected.

Implementing smart home scheduling needs the support fromthe communication system associated with a smart grid, which

Yang Liu and Shiyan Hu are with Department of Electrical and ComputerEngineering, Michigan Technological University, Houghton, MI, 49931, USA(e-mail: [email protected]; [email protected])Tsung-Yi Ho is with Department of Computer Science and InformationEngineering, National Chiao Tung University, Hsinchu, Taiwan (e-mail:[email protected])Shiyan Hu is the corresponding author.

is known as advanced metering infrastructure (AMI) [2], [3]. TheAMI enables the two-way communications between utilities andthe customers and facilitates smart home scheduling. Home areanetworks and utility networks are two important componentsin this infrastructure. In the home area networks, the wirelesscommunication such as WiFi, 802.11, ZigBee and Homeplug arecommonly deployed. The home area networks are connected to theutility network aggregation points via the broadband technologiessuch as WiMAX, IEEE 802.16e, broadband PLC, and even LTE [4].In the real implementation of the AMI, different combinations ofthe protocols can be chosen depending on the need. In a simplifiedcommunication infrastructure of AMI, the utility transmits thepricing information to a central computer in the local communityor substation. Subsequently, such pricing information is broadcastto smart meters. The specific communication protocol depends onthe communication infrastructure of the local community. Refer toFigure 2. There are some existing smart home scheduling worksutilizing this infrastructure such as [2], [5].

The above popular infrastructure is vulnerable to at least threeattacking strategies. First, one can directly hack the computer inthe local community or substation and modify the pricing infor-mation there. Subsequently, the pricing information forwarded tothe whole community could be a fake one. Second, one can blockan access point in the WiFi network using the jamming attack (i.e.,sending excessive requests to the access point), create a fake accesspoint and send the faking pricing information to the smart meterscovered by the fake access point. Third, one can hack the smart me-ter and modify the pricing it receives. With the different difficultylevels in implementation, the cyberattacker can choose which oneto use. In this work, we focus on the cyberattack based on smartmeter tampering. The modern smart meters are usually micro-controller based and installed with advanced embedded operationsystems. For example, the smart meter of Texas Instruments isbased on MSP430, which supports two-way communication suchthat the system can be remotely upgraded [6]. Remote upgradingmakes the smart meter vulnerable to cyberattacks. In fact, multiplepublic media reports witness that various smart devices such assecurity camera, smart TV, smart doorlock, smart refrigerators,smart bulbs and powered outlets became the targets of hackers[7], [8], [9].

Page 2: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 2

This paper focuses on the impact of pricing cyberattacks tothe smart home customers as well as the local community. Weshow that it is possible to design specific cyberattacks to modifythe guideline pricing curves for reducing the expense of thecyberattacker and increasing the peak energy usage in the localpower system. After analyzing these impacts, detection technol-ogy against the pricing cyberattacks will be developed. The key isto identify the pricing manipulation. For this, we first predict theguideline pricing curve from recent historical pricing curves usingthe support vector regression technique since the guideline pricingtends to be similar in a short term. The predicted guideline pricingwill be then compared to the guideline pricing curve receivedat the smart meter. For this, one could compute the maximumdifference between the two curves and signal an alert when it islarger than a threshold. The problem is that it would be difficultto design a good threshold in practice. The goal for setting a goodthreshold is to balance the false detection rate and the impact tothe local community and customers. For example, if one sets thethreshold to be zero, cyberattacks can be detected but with a lotof false detection. On the other hand, it is reasonable to ask, butdifficult to answer, what the best threshold is if customers cantolerate a certain percentage of (e.g., up to 2%) bill increase.

In contrast, our philosophy is that since anyway the goal forsetting a good threshold is to limit the impact to local communityand customers, why not directly using the impact as the threshold?To explore this idea, we will use a new concept called impactdifferences to quantify the bill and the peak to average ratio (PAR)increase comparing the predicted guideline pricing curve and thereceived guideline pricing curve. When the impact differences arelarger than some prespecified values, a potential pricing attack isdetected and an alert signal will be sent to the utility to requestfor further check which would need some amount of humaninteraction. Based on such a framework, the single event detectiontechnique is developed.

The above single event detection technique works well if theimpact difference is beyond a threshold during each time slot.However, there are many cases that the impact difference at eachtime slot is minor while the cumulative effect over a long termis significant. If one assumes that smart meters are hacked if thereceived guideline electricity price can increase the average billby 2%, the hacker could simply manipulate the electricity pricingwith the bill increase of only 1.9% each time slot. Although thiscauses little impact per time slot, accumulating over a long termthe total bill increase would be significant. In this case, no alert willbe reported if one just repeatedly uses the single event detectiontechnique at each time slot. A straightforward way to solve thisproblem is to lower the thresholds. However, this would resultin significant false alarm due to the fluctuation of the electricitypricing. Thus, we propose a long term detection technique usingPartially Observable Markov Decision Process (POMDP), whichhas the ingredients such as probabilistic state transition, rewardexpectation and policy transfer graph to account for the cumula-tive cyberattack impact and its potential future impact.

There are some existing works related to the general pricingattacks in the literature. In [10], an attacking strategy is proposed inwhich the attacker jams the communication network and preventsthe customers from knowing the updated electricity price. In[11], false injection attack is introduced, which manipulates thereal time monitoring data to interfere the state estimation, thusdamaging the power grid. In [12], the hackers tamper their ownsmart meters and tune down the measurements of energy usageto decrease the electricity bill. These works do not address smart homepricing cyberattacks since they do not consider the impact due to smarthome scheduling. Countermeasure techniques have been designedto mitigate these cyberattacks. In [13], a likelihood ratio test basedalgorithm is proposed to detect the malicious data attack on smart

grid state estimation. In [14], the jamming attack modeling anddetection technique are proposed for time critical networks. Theworks [15] [16] study the countermeasure techniques against falsedata injection attack based on sparse optimization and Kalmanfilter, respectively. Again, these works do not address the pricingcyberattacks in the smart home context.

In this work, the vulnerability of the electricity pricing trans-mission in AMI is assessed. Two closely related pricing cyberat-tacks which manipulate the guideline electricity prices received atsmart meters are considered. They target for reducing the expenseof the hacker as well as increasing the peak energy usage inthe local community. A single event detection technique whichuses support vector regression and impact difference for pricinganomaly detection is then proposed for the pricing cyberattacks.The performance of single event detection technique is limitedsince it does not have a long term view. This motivates us todevelop a long term detection technique using partially observableMarkov decision process (POMDP) to monitor and protect thesmart home system. Our contributions are summarized as follows.

• Two cyberattacks which manipulate the guideline electric-ity price received at the smart meters are considered. Theytarget for reducing the expense of the cyberattacker as wellas increasing the peak energy usage in the local community.

• A single event detection technique based on the supportvector regression and the impact difference is proposed todetect the pricing manipulation.

• In some cases, the single event detection technique hasa low detection rate since it does not model the longterm impact of pricing cyberattacks. This motivates us todevelop a partially observable Markov decision processbased detection algorithm, which has the ingredients suchas reward expectation and policy transfer graph to accountfor the cumulative impact and the potential future impactdue to pricing cyberattacks.

• Our simulation results demonstrate that the pricing cyber-attack can reduce the attacker’s bill by 34.3% at the cost ofthe increase of others’ bill by 7.9% on average. In addition,the pricing cyberattack can significantly unbalance the en-ergy profile of the local power system as it increases thepeak to average ratio by 35.7%.

• Our simulation results demonstrate that the proposed sin-gle event detection technique can effectively detect theelectricity pricing manipulation for some testcases. Whilefor those with little impact per time slot, the long termdetection technique is deployed and the detection accuracyis above 97% with the significant reduction in PAR andbill increase. This significantly improves a natural heuristicwhich repeatedly uses the single event detection techniqueat each time slot.

Note that comparing with the preliminary version of this paperappeared in [1], this paper analyzes the limitation of the singleevent detection technique and shows that it does not provide along term view of cyberattack impact. To tackle this challenge,a POMDP based long term detection technique is developed inthis work for reducing the system loss due to the cumulativecyberattack impact and the potential future impact.

The rest of this paper is organized as follows. In Section 2, thedescription of the system model is presented and the concept ofsmart home scheduling is introduced. In Section 3, two types ofcyberattacks are proposed and analyzed. In Section 4, the singleevent detection technique is proposed. In Section 5, the long termdetection technique is developed. In Section 6, simulations are con-ducted to analyze the impact of cyberattack and the performanceof defense techniques. The paper is summarized in Section 7.

Page 3: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 3

0 5 10 15 20 252

3

4

5

6

7

8

9

10

11

12

Time Horizon (Hour)

Ele

ctric

ity P

rice

(Cen

t/kW

h)

Guideline PriceReal Time Price

Fig. 1. Guideline and Real Time Electricity Price Provided by ComED [17].

2 PRELIMINARIES

2.1 Smart Home System Model

A set of N = 1, . . . , N customers supplied by a utility areconsidered in the system. Refer to Figure 2. Each customer sched-ules the energy consumption during the next 24 hours from thecurrent moment, which is divided into H time slots and letH = 1, 2, . . . , H. Each customer is equipped with a smart meter,which receives the electricity price from the utility and sends themeasurement of real time energy consumption to the aggregator.In the following, we will give an overview of the game model andsolution of smart home scheduling, which have been developed inour previous work [18].

2.1.1 Energy Consumption

Each customer n ∈ N has a set of home appliances denoted byAn. At each time slot h, the home appliance m ∈ An worksunder power level xm,h ∈ Xm, where Xm is the set of availablepower levels for home appliance m. In general, there are twocategories of home appliances, namely, manually controlled homeappliances and automatically controlled ones. The category ofmanually controlled home appliances consists of TV set, computer,refrigerator etc. The category of automatically controlled homeappliances consists of washing machine, cloth dryer, dish washer,electric vehicle (EV) etc. It is worth noting that HVAC (Heating,Ventilation and Air Conditioning) system could be classified intoboth categories. For example, the customer can adjust the workingpower level of the air conditioner manually according to thetemperature in the room. However, there also exists situation thatthe customer needs the temperature to reach a certain level ata certain time point, in which the air conditioner works in theautomatic mode. For each customer n, denote by Pn the set ofmanually controlled home appliances and denote by Qn the set ofautomatically controlled home appliances. Thus, An = Pn

Qn.For customer n, the total energy consumption of the manuallycontrolled home appliances at time slot h is denoted by l

p

n,h, onehas

lp

n,h =∑

m∈Pn

xm,htm,h, (1)

where tm,h is the actual execution time of home appliance m

at time slot h. At time slot h, the total energy consumption ofautomatically controlled home appliances is denoted by l

q

n,h, onehas

lq

n,h =∑

m∈Qn

xm,htm,h. (2)

For each automatically controlled home appliance m ∈ Qn, thepower level is chosen subject to the following constraints.

A g g r e g a t o r B a s eS t a t i o n A c c e s s P o i n t C u s t o m e r sFig. 2. System Model

(1) The total energy consumption of the home appliance m isequal to the required total energy consumption Em. That is,

Em =∑

h∈H

xm,htm,h. (3)

(2) For a specified task, the home appliance m needs to beexecuted after the earliest start time αm and before the deadlineβm such that

xm,h = 0,∀h < αm, h > βm. (4)

At each time slot h, the total energy load of the community isdenoted by Lh, and thus

Lh =∑

n∈N

(lpn,h + lq

n,h). (5)

2.1.2 Monetary Cost

As is mentioned before, there are two types of electricity prices inthe smart home system, which are guideline electricity price andreal time electricity price respectively as depicted in Figure 1. Theguideline electricity price is provided to the customers to facilitatesmart home scheduling, while the real time electricity price is usedin computing the bill.

In real time pricing, at each time slot the monetary cost ofenergy consumption depends on the total energy load of the grid.In this paper, the quadratic cost function is used to compute thetotal monetary cost of all the customers, which is a popular pricingmodel used in literature [2] [19]. The total monetary cost at timeslot Ch is given as

Ch = ahL2h (6)

where ah is the pricing parameter which models the relationshipbetween energy consumption and monetary cost. At each timeslot, the monetary cost is distributed to each customer accordingto the energy usage of the customer. For customer n, the monetarycost is denoted by Cn,h where

Cn,h = (lpn,h + lq

n,h)Ch

Lh

= ah(lpn,h + lq

n,h)Lh. (7)

2.2 Smart Home Scheduling

Given the above constraints, one can formulate a game whereeach customer n aims to minimize the individual monetary costthrough solving the problem P1 [18].

Page 4: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 4

P1 minimizexm,h∈Xm,∀h∈H,m∈Qn

h∈H

ah(lpn,h + lq

n,h)Lh

subject to lp

n,h =∑

m∈Pn

xm,htm,h

lq

n,h =∑

m∈Qn

xm,htm,h

Em =∑

h∈H

xm,htm,h

Lh =∑

n∈N

(lpn,h + lq

n,h)

xm,h = 0,∀h < αm, h > βm

Since the monetary cost of each customer n depends on thetotal energy load of the community including all the other cus-tomers, the scheduling of one customer has an impact on others.This naturally leads to a game. The monetary cost of each customern can be divided into two parts. One has

Cn,h = ah(lpn,h + lq

n,h)(lpn,h + lq

n,h) + ah(lpn,h + lq

n,h)l−n,h, (8)

where l−n,h is the community wide energy load excluding theenergy consumption of customer n at time slot h and

l−n,h =∑

i∈N ,i6=n

(lpi,h + lq

i,h). (9)

The game can be then formulated as follows [18].Game Model:

• Players: All the customers in the system.• Payoff Function: P (lqn,h|l−n,h) = −Cn,h = −ah(lpn,h +

lq

n,h)(lpn,h + lq

n,h) − ah(lpn,h + lq

n,h)l−n,h.• Shared Information: l−n,h.• Problem formulation:

P1 minimizexm,h∈Xm,∀h∈H,m∈Qn

h∈H

ah(lpn,h + lq

n,h)Lh

subject to lp

n,h =∑

m∈Pn

xm,htm,h

lq

n,h =∑

m∈Qn

xm,htm,h

Em =∑

h∈H

xm,htm,h

Lh =∑

n∈N

(lpn,h + lq

n,h)

xm,h = 0,∀h < αm, h > βm

In the game, each customer aims to minimize the total paymentthrough scheduling the energy consumption of the automaticallycontrolled home appliances. Nash Equilibrium is achieved whenno one can further reduce his/her own monetary cost withoutchanging that of any other customer [20]. To solve this game, a de-centralized technique proposed in our previous work [18] is usedin this paper. This is an iterative algorithm. In each iteration, eachcustomer solves the Problem P1 using the dynamic programmingbased algorithm while assuming the energy consumption of all theothers, i.e., l−n,h, is fixed [18]. After each iteration, each customerobtains the new energy consumption information from all othersaccording to their updated scheduling solutions. With the updatedenergy consumption of each customer, l−n,h is updated and eachcustomer uses dynamic programming to schedule their homeappliances with the updated l−n,h. This process is iterated untilconvergence. Refer to Figure 3 for the algorithmic flow in [18].

E a c h c u s t o m e r s o l v e s P r o b l e m P 1 w i t h d y n a m i cp r o g r a m m i n g b a s e d s i n g l e 0 c u s t o m e r s m a r t h o m es c h e d u l i n g a l g o r i t h mE a c h c u s t o m e r u p d a t e s t h e e n e r g y c o n s u m p t i o n a n ds h a r e s i t t o a l l t h e o t h e r c u s t o m e r sS t o pC o n v e r g e ?

S t a r tE a c h c u s t o m e r u p d a t e sY e sN o

Fig. 3. Algorithmic Flow of Multiple Customer Smart Home Scheduling [18].

3 PRICING CYBERATTACKS

Consider the communication infrastructure of the AMI in Figure 2.First, the utility transmits the pricing information to a centralcomputer in the local community (substation) through Internet.Second, such pricing information is broadcast to smart metersthrough Internet or WiFi network or a combination of them,depending on the communication infrastructure of the local com-munity. For example, in a hierarchical infrastructure where a com-munity consists of multiple subcommunities, pricing informationis forwarded to each subcommunity through Internet and is thenbroadcast inside the subcommunity through the WiFi network. Ina WiFi network, there are some access points, which serve as theagents to receive the pricing information from the subcommunityand forward it to the smart meters inside the subcommunity.

The above popular infrastructure is vulnerable to at least threeattacking strategies. First, one can directly hack the computer inthe substation and modify the pricing information there. Subse-quently, the pricing information forwarded to the whole commu-nity could be a faking one. Second, one can block an access point inthe WiFi network using the jamming attack (i.e., sending excessiverequests to the access point), create a fake access point and sendthe faking pricing information to the smart meters covered bythe fake access point. Third, one can hack the smart meter andmodify the pricing it receives. As is indicated by [21], “commercialsmart devices including smart meters are often designed andmanufactured utilizing off-the-shelf components and/or solutions.Therefore, security protection methods can only be applied at theapplication/network level and can hardly cover the hardwareinfrastructure. As a result, attackers can easily bypass firmwareverification and install malicious OS kernel in the device to re-motely control the smart device”. For example, an attacker couldremotely manipulate the guideline pricing received at a smartmeter without being realized. With the different difficulty levelsin implementation, the cyberattacker can choose which one to usein practice.

3.1 Cyberattack for Bill Reduction

The first possible cyberattack is to fake the guideline pricing curvesuch that the utility bill of the cyberattacker can be reduced atthe cost of bill increase of others in the community. Consider

Page 5: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 5

the following scenario. The guideline electricity price in the earlymorning such as 1:00am to 8:00am are usually not high due tolimited amount of human activities. However, if a cyberattackerschedules a large load during this period, it could still be ex-pensive. Therefore, if the cyberattacker fakes the guideline pricingcurve such that the electricity price during 1:00am and 8:00am isvery high, then almost no customer in the community will sched-ule energy during this period. Subsequently, the cyberattacker canschedule his/her own large load there, resulting in the significantreduction of his/her own bill. Of course, such a reduction comesfrom the increase of the bill of other customers. The procedure forthe cyberattack for bill reduction using pricing manipulation is asfollows.

(1) Determine the starting time ts and ending time te for thehacker to schedule his/her own energy load.

(2) Manipulate the guideline electricity prices received at thetarget smart meters such that after manipulation the guidelineprices are high from ts to te and low at other time slots.

(3) Schedule his/her own energy load from ts to te.When the guideline electricity price is high from ts to te, the

customers tend not to schedule the energy consumption thereaccording to the smart home scheduling. This reduces the energyload during these time slots, and results in the decrease of the realtime electricity price there. Subsequently, the cyberattack couldschedule the energy consumption from ts to te, and makes profitthrough saving his/her own bill at the cost of increasing the bill ofother customers.

3.2 Cyberattack for Forming the Peak Energy Load

The second possible attack is to fake the guideline pricing curvesuch that a peak energy usage can be formed. Consider thefollowing scenario. The guideline electricity price at 8:00pm isusually expensive since the utility discourages the excessive en-ergy usage during this period which is typically occupied withvarious human activities (e.g., watching TV). If a cyberattackercreates a fake guideline pricing curve with very low price atthis slot, significant amount of energy (e.g., laundry load) will beaccumulated there. This will form a peak in the energy usage,which could significantly impact the power system stability. Theprocedure for the cyberattack for forming a peak energy load usingpricing manipulation is as follows.

(1) Determine the starting time ts and ending time te of peakenergy usage hours.

(2) Manipulate the guideline electricity prices received at thetarget smart meters such that after manipulation the guidelineprices are very low from ts to te.

(3) A peak energy load will be formed from ts to te.If the guideline electricity price is very low from ts to te,

the customers tend to schedule large energy load there due tosmart home scheduling. This increases the energy load duringthis time period which could potentially form a peak in energyconsumption.

4 SINGLE EVENT DETECTION TECHNOLOGY

The above two pricing cyberattacks need to significantly perturbthe guideline pricing curves. The key to design the countermea-sure is to identify the guideline pricing manipulation. Machinelearning and statistical data analysis techniques would be naturalchoices since the typical guideline pricing curves should be similarto each other in a short term. This is the case as one can see fromFigure 4 which is based on the industrial pricing data from [22].In this work, we choose support vector regression (SVR) since ittends to produce robust results [23].

After computing the predicted guideline price curve, one cancompare it with the guideline pricing curve received at the smart

0 5 10 15 20 251

1.5

2

2.5

3

3.5

4

4.5

Time Horizon (Hour)

Pric

e (C

ent/k

Wh)

06/11/201406/12/201406/13/2014

Fig. 4. Real Time Electricity Price from 06/11/2014 to 06/13/2014 Providedby Ameren Illinois [22].

meter. For comparison, one could compute the maximum differ-ence between the two curves and signal an alert when it is largerthan a threshold. However, the main problem with this idea isthat it would be difficult to design a good threshold in practice.Note that the goal for setting a good threshold is to balance thefalse detection rate and the impact to the local community andcustomers. For example, if one sets the threshold to be zero, thenall pricing manipulation can be identified but with a lot of falsedetection. On the other hand, it is reasonable to ask what thebest threshold is if customers can tolerate up to 2% bill increase?However, this question is difficult to answer.

In contrast, our philosophy is that since anyway the goal forsetting a good threshold is to limit the impact to local commu-nity and customers, why not directly using the impact as thethreshold? To explore this idea, we define a set of thresholds,called the maximum tolerable impact differences. An examplemaximum tolerable impact differences could be up to 2% increasein peak to average ratio (PAR) and up to 5% increase in bill.Given the predicted guideline pricing curve and the receivedguideline pricing curve, one can perform smart home schedulingsimulations to compute the average bill and PAR for each of thetwo guideline pricing curves, and then compute the differencesbetween them, called the actual impact differences. When theactual impact differences are larger than the maximum tolerableimpact differences, a potential pricing attack is spotted and analert signal will be sent to the utility to request for further checkwhich could need some amount of human interaction. This workwill develop such a framework.

Denote by vectors ap and a the predicted guideline electricityprice and the received guideline electricity price, respectively.Denote by ∆B and ∆P the actual impact differences in billand PAR, respectively. We also define two thresholds δB and δP

which are the maximum tolerable impact differences in bill andPAR, respectively. If ∆B > δB or ∆P > δP , the smart metertreats the guideline electricity price as being manipulated due tocyberattacks. Suppose that the guideline pricing of last T days,denoted by A, are known. Adapting SVR to our problem context,the predicted guideline electricity pricing can be computed asfollows.

• Denote the historical guideline electricity prices during thelast T days by the matrix

A =

a1,1 a1,2 a1,3 . . . a1,H

a2,1 a2,2 a2,3 . . . a2,H

a3,1 a3,2 a3,3 . . . a3,H

......

.... . .

...aT,1 aT,2 aT,3 . . . aT,H

. (10)

Page 6: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 6

Denote by ah = [a1,h, a2,h, . . . , aT,h] the guideline electric-ity prices at time slot h during the last T days.

• We aim at computing the function f(ah) which derives thepredicted guideline electricity price at time slot h, denotedby a

p

h, from ah. That is,

ap

h = f(ah). (11)

• Given the historical guideline electricity price, the functionf(a) is computed through solving the following problem[23]

P2 maximize

H∑

i

ui −1

2

H∑

i

H∑

j

uiujaiajK(ai, aj)

subject to

H∑

i

uiai = 0

ui ≥ 0,∀i ∈ H,

where K(ai, aj) is defined as kernel function [23]. In ourimplementation, radial basis kernel function is used suchthat

K(ai, aj) = exp(−γ × ‖ai − aj‖2). (12)

Obtaining ui through solving Problem P2, the function f(a)can be computed as

f(a) =H

i

uiaiK(at, a). (13)

• After the function f(a) is computed, the predicted guide-line electricity price is derived according to Eqn. (11).

After computing the predicted guideline pricing curve ap, onecan perform smart home scheduling simulations to compute thebill Bp and the PAR Pp. Similarly, one can compute the bill B andthe PAR P through using the received guideline pricing curve.Subsequently, the bill increase rate is computed as ∆B =

B−Bp

Bp

and the PAR increase is computed as ∆P =P−Pp

Pp. If ∆B > δB or

∆P > δP , an alert will be signaled. The proposed countermeasuretechnique for the guideline electricity pricing manipulation attackis summarized in Algorithm 1.

Algorithm 1 Single Event Electricity Pricing Manipulation Cyber-attack Detection Algorithm

1: Obtain a set of historical guideline electricity prices A.2: Obtain the received guideline electricity price a.3: Compute the support vector regression model through solving

Problem P2.4: Compute the predicted guideline electricity price according to

Eqn. (11).5: Perform smart home scheduling simulations to compute the

average bill Bp and the PAR Pp using the predicted guidelineprice.

6: Perform smart home scheduling simulations to compute theaverage bill B and the PAR P using the received guidelineprice.

7: Evaluate ∆B =B−Bp

Bpand ∆P =

P−Pp

Pp.

8: if ∆B > δB or ∆P > δP then9: Send an alert to the utility.

10: end if

5 LONG TERM DETECTION TECHNIQUE

5.1 Motivation

The single event detection technique can effectively detect the cy-berattack for which the impact differences are beyond the thresh-olds at each single time slot. However, there are certainly many

cases that the impact differences at each time slot are minor whilethe cumulative effect over a long term is significant. If one assumesthat smart meters are hacked if the received guideline electricityprice can increase the average bill by 2%, the hacker could simplymanipulate the electricity pricing with the bill increase of only1.9% at each time slot. Although this causes little impact per timeslot, accumulating over a long term (e.g., one month) the total billincrease would be significant. The main issue is that in this case noalert will be reported if one just repeatedly uses the single eventdetection technique for each time slot.

As mentioned above, the single event detection would havelow detection rate when the thresholds in impact differences areabove those used by hackers. A straightforward solution is tolower the thresholds. However, this would result in significantfalse alarm due to the fluctuation of the electricity pricing. Totackle this limitation, we propose to integrate the single eventdetection with Partially Observable Markov Decision Process(POMDP) [24] such that the cyberattacks can still be identifiedwhile the false alarm is mitigated. The rational behind this idea isthat due to the inherent long term view provided by POMDP, evenif one uses low thresholds in single event detection, the false alarmcan be ameliorated through various POMDP ingredients such asthe probabilistic state transition and reward expectation. Thus, thelong term detection technique can identify most of the possiblecyberattacks without increasing the cost due to false alarms.

5.2 Theoretic Foundation of POMDP

POMDP is an advanced control theoretic technique, which takes asinput the real world states (e.g., those corresponding to differentcyberattack impacts) and generate actions (e.g., fixing the hackedsmart meters) as output. Since in reality one cannot directly obtainthe state, POMDP approximately computes the states based onthe observations which are possibly with some uncertainties. Forcompleteness, an overview of the POMDP technique proposed in[24] is presented as follows.

A typical POMDP problem is described as a tuple〈S ,A, T, R, Ω,O〉 [24], [25]. The finite set S denotes the state spaceof the system. The finite set A denotes the action space containingall the available actions for the decision maker (e.g., the localcommunity in our problem). The transition from the state s to s′

while taking action a is defined using the corresponding transitionprobability P (s′|a, s), namely, T (s′, a, s) = P (s′|a, s). After takingaction a at sate s, the decision maker receives a reward R(s′, a, s)if the next state is s′. The observation space of the system state isdescribed as the finite set O. The mapping between states andobservations is defined as Ω(o, a, s) = P (o|a, s), which is theconditional probability that the observation is o while action andstate are a and s, respectively. The decision maker estimates thesystem state based on observation and takes action based on it.Thus, state, observation and action are the three key componentsof POMDP.

In our proposed long term detection method, the utility orthe local community serves as the decision maker. The states ofthe system are set based on the cyberattacks in the community.Consider a mini-community with 2 smart meters. A natural wayto model the state is such that s0 denotes no smart meter is hacked,s1 denotes smart meter 1 is hacked, s2 denotes smart meter 2 ishacked, and s3 denotes both smart meters are hacked. The decisionmaker obtains observations and estimates the state. Note that ahacked smart meter can cause losses to the system and fixing thehacked smart meters is also associated with labor costs. Thus, thedecision maker considers the long term expected cost to decidewhether to fix the smart meters or not. However, a straightforwardimplementation of the above formulation needs 2n states for n

smart meters, which is computationally prohibitive. Therefore, asin [26] a formulation with reduced number of states is used.

Page 7: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 7O b s e r v a t i o n E a c h s m a r t m e t e r u s e s s i n g l ee v e n t d e t e c t i o n t e c h n i q u e t od e t e c t c y b r a t t a c k a n d r e p o r t si t t o t h e d e c i s i o n m a k e r .S t a t eE s t i m a t i o n A c c o r d i n g t o t h e o b s e r v a t i o n ,t h e d e c i s i o n m a k e r e s t i m a t e st h e n u m b e r o f h a c k e d s m a r tm e t e r s .O p t i m a lA c t i o n T h e d e c i s i o n m a k e r c a n e i t h e r( 1 ) i g n o r e t h e c y b e r a t t a c k s o r( 2 ) c h e c k a n d f i x t h e h a c k e ds m a r t m e t e r s t o m a x i m i z e t h ee x p e c t e d r e w a r d .S i n g l e e v e n t d e t e c t i o n t e c h n i q u e i su s e d t o o b t a i n o b s e r v a t i o n f o r t h el o n g t e r m d e t e c t i o n t e c h n i q u e .E a c h c u s t o m e r p r e d i c t s t h eg u i d e l i n e p r i c e w i t h S V R a n dc o n d u c t s s m a r t h o m e s c h e d u l i n gs i m u l a t i o n w i t h i t . C y b e r a t t a c k i sr e p o r t e d i f t h e r e c e i v e d g u i d e l i n ep r i c e r e s u l t s i n a s i g n i f i c a n t l y h i g h e rP A R a n d e l e c t r i c i t y b i l l t h a n t h ep r e d i c t e d g u i d e l i n e p r i c e .

Fig. 5. Architecture of The Proposed Detection Technique.

The state space is given by the set S = s0, s1, . . . , sN, whereeach state si ∈ S denotes that i smart meters are hacked. Thus,there are totally N + 1 states for a community with N customers.The observation space is given by the set O = o0, o1, . . . , oN,in which oi ∈ O denotes that i smart meters are observed to behacked. During the long run, the smart meters are continuouslymonitored and the utility or local community has the updated theobservation of the system during each time slot.

Since the exact current state is not known, the decision makerestimates the number of hacked smart meters from the observationand judges if the cyberattack can introduce significant expectedsystem loss. If it is the case, the decision maker needs to checkand fix the hacked smart meters. Otherwise, it chooses to ignorethe cyberattack since checking and repairing the smart metersare associated with labor cost. Thus, the decision maker has twoavailable actions.

• Action a0, monitor the system and ignore the cyberattacks.• Action a1, apply single event detection technique on each

single smart meter to detect the hacked smart meters andfix them.

Note that the POMDP based long term detection techniquecontains observation as a key component, which is obtained bythe single event detection technique. Refer to Figure 5. Eachcustomer uses SVR to predict the guideline price and conductsmart home scheduling simulation with it. If the PAR or electricitybill corresponding to the received guideline price is sufficientlyhigher than that corresponding to the predicted guideline price,an alert signal is generated. The decision maker counts the totalnumber of alerts and sets the observation according to it. Forexample, if there are n alerts, the observation is obtained as on.

One might wonder why integrating single event detection toPOMDP would improve the detection rate while mitigating falsealarm. This is essentially due to the inherent long term viewprovided by POMDP. Even if low thresholds in single event de-tection induce false alarms, they can be ameliorated through var-ious POMDP ingredients such as the probabilistic state transitionand reward expectation, while the detection rate is significantlyimproved.

The estimation of the state is defined as belief state b. Theproperties described in [24] for belief state are summarized asfollows.

• The belief state b = b(s0), b(s1), . . . , b(sN) denotes theconfidence level associated with each state. For example,the belief state for our problem can be 0.8, 0.2, 0, 0, . . . , 0,which means that the current system state is s0 withprobability 0.8, s1 with probability 0.2 and other stateswith probability 0 according to the estimation. Each time

when the new observation is obtained, the belief state isalso updated according to the Bayesian rule as follows [24].

b(s′) = P (s′|o, a, s) =Ω(o, a, s′)

s∈S T (s′, a, s)b(s)

P (o|a, b),

(14)where P (o|a, b) is a normalizing factor to make∑

s′∈S b(s′) = 1. As is seen from Eqn. (14), the new beliefstate depends on the last belief state, current observation aswell as the last action. It also depends on state transitionfunction and observation function, which are the underly-ing regulations of the POMDP.

• The state transition function T (s′, a, s) represents the tran-sition of real world states, which are not completely observ-able. Thus, the belief state transition is modeled by [24]

τ (b′, a, b) = P (b′|a, b) =∑

o∈O

P (b′|b, a, o)P (o|a, b). (15)

In Eqn. (15), P (o|a, b) is the same normalizing factor as inEqn. (14). When b, a and o are all given, b′ is determin-istic and can be directly obtained from Eqn. (14). Thus,P (b′|b, a, o) is given as [24]

P (b′|b, a, o) =

1, if (b, a, o) ⇒ b′

0, otherwise(16)

• The reward function ρ is defined based on the belief state[24].

ρ(a, b) =∑

s∈S

s′∈S

b(s)R(s′, a, s)T (s′, a, s), (17)

which is the reward when the decision maker takes actiona at belief state b.

• The decision maker will optimize the long term expectedreward. However, the future event imposes more uncer-tainty than the current. Thus, a discount factor γ is in-troduced to reduce the importance of future event in theoptimization target and the expected reward is modified asdiscounted expected reward defined as E[

∑∞t=0

γtrt]. rt isthe reward in step t. The optimal value of the discountedexpected reward given the current belief state b is denotedas V ∗(b) such that [24]

P3 V∗(b) = max

a∈A

ρ(a, b) + γ∑

b′∈B

τ (b′, a, b)V ∗(b′)

.

Each time the decision maker intends to find the optimalaction. He or she needs to consider both the reward inthe present step and the discounted expected reward inthe long future. During the long run, the decision makerreceives the update of the observation each time slot, fromwhich he/she estimates the belief state of the system. Giventhe belief state of the current system state, the decisionmaker obtains the optimal action by solving the optimiza-tion problem P3.A popular approach to solve the problem P3 is a recur-sive method shown in [24]. Consider an example withstates s0, s1 and actions a0, a1. When the current beliefstate is 0.8, 0.2. Starting from each step correspond-ing to a time slot, there are two available actions. Thesolving process can be illustrated using a binary treeas depicted in Figure 6. Due to the space limit, notall the nodes are shown. At each possible state s, de-note by R(s, a) the maximum expected reward for actiona. V ∗(b) is computed as V ∗(b) = max0.8R(s0, a0) +0.2R(s1, a0), 0.2R(s0, a1)+0.8R(s1, a1). Note that for timeslot t, R(s, a) = maxr(a, t) + R(a′), where r(a, t) is the

Page 8: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 88 0 % 2 0 %

Fig. 6. Dynamic Programming for Computing Optimal Action.

reward by taking action a at current step and R(a′) is theexpected reward from next step to the future. For example,starting from s0, the expected reward by taking action a1

is R(s0, a1) = maxr(a1, t) + R(a′). Thus, r(a1, t) can betreated as the reward associated as the node a1, whichcan be computed by r(a1, t) = T (s0, a1, s0)R(s0, a1, s0) +T (s1, a1, s0)R(s1, a1, s0). Moving further in the tree, thereward associated with each node can be computed in thesame way. It stops when the stopping criterion is reached,e.g., when γt is small enough. Finally, it finds the optimalpath from the root to the leaves with the maximum totalreward to obtain each R(s, a) using the dynamic program-ming algorithm described in [24].

5.3 Our POMDP Based Detection

In our problem context, there are three types of transition func-tions, namely, state transition function, belief state transition func-tion and observation transition function. We already show thebelief state transition function in Eqn. (15). In the formulationof the POMDP, state transition probability indicates the mappingbetween the system states at two adjacent time slots. Each actionleads to the update of the system state. Action a0 does not reducethe number of hacked smart meters under the influence of thedecision maker. The hacker can continue the cyberattack if it is noteliminated. For example, it can hack more smart meters to increasethe impact to the power system. Thus, the state transition functionfor action a0 is given as

T (si, a0, sj) = Pa(si|sj), (18)

where Pa(si|sj) is the probability that the hacker will hack i smartmeters at next time slot if j smart meters are hacked at thismoment.

In contrast to other works which use artificial model for statetransition, this work uses model training to compute Pa(si|sj)from the historical data. Although the real system state is notknown in history, since action a0 does not change the system state,we can develop the state transition from the observation. In orderto compute the state transition probability from the historical data,define an observation transition function as T ′(o′, a0, o), which isthe probability that the observation transits from o to o′. Thus, thestate transition can be derived from

T (s′, a0, s) =∑

o∈O

o′∈O

T′(o′, a0, o)P (s|a0, o)P (s′|a0, o

′), (19)

01

23

45

0

2

4

60

0.2

0.4

0.6

0.8

1

Current StateNext State

Tra

nsiti

on P

roba

bilit

y

Fig. 7. State Transition Probabilities Corresponding to Action a0.

where P (s|a0, o) is the conditional probability that observation o

is obtained after taking action a0 while the real state is s. P (s|a, o)is computed from Bayesian rule as follows.

P (s|a0, o) =P (o|a0, s)P (s)

s′∈S P (o|a0, s′)P (s′). (20)

In Eqn. (20), P (o|a0, s) is the observation function definedin Eqn. (22). Since the probability for each system state P (s) isnot known, it is approximated by P (o). T ′(o′, a0, o) is obtainedfrom the historical data. For example, before action a0 is taken,o0 appears 10 times. After action a0, there are 5 times o0 tran-siting to o0, 3 times to o1 and 2 times to o2. Thus we haveT ′(o0, a0, o0) = 0.5, T ′(o1, a0, o0) = 0.3 and T ′(o2, a0, o0) = 0.2.Derived from the historical data, the state transition function takesinto consideration the long term effect of cyberattacks. An exampleof the transition function values is depicted in Figure 7, which isobtained from the historical training data and is also used as theinput to our small testcase simulation.

Taking action a1, the utility or local community applies thesingle event detection technique to each individual smart meter todetermine whether it is hacked and the hacked smart meters willbe fixed. The transition function for a1 is given as follows.

T (si, a1, sj) =

1, if si = s0

0, otherwise. (21)

The observation after taking a0 is given as

Ω(oi, a0, sj) = P (oi|a0, sj), (22)

in which P (oi|a0, sj) is the probability that there are j smart metershacked while i ones are observed to be hacked. If action a1 is taken,all hacked smart meters are checked and fixed by the single eventdetection technique, which is also the belief of the decision maker.Therefore, we have

Ω(oi, a1, sj) =

1, if oi = o0

0, otherwise. (23)

The cyberattacks induces loss to the power system. This ismodeled by the reward functions. For the ease of optimization,the system loss is formulated as follows. Give two parameters S∗

1

and S∗2 where S∗

1 ≤ S∗2 . If the total number of hacked smart meters

S∗1 ≤ i ≤ S∗

2 , the system loss is CL1 . If i ≥ S∗

2 , the system loss isCL

1 +CL2 . The action a1 needs human interaction and is associated

with a labor cost. Without loss of generality, the labor cost canbe separated into two parts. The on-site inspection cost CI and

Page 9: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 9

smart meter recovery cost CR. Once action a1 is taken, the on-site inspection cost is CI is no matter smart meter is fixed or not.Fixing each smart meter costs CR. Thus, the reward for a0 and a1

are given as follows.

R(si, a0, sj) =

−CL1 , if S∗

1 ≤ i ≤ S∗2

−CL1 − CL

2 , if S∗2 ≤ i

0, otherwise

. (24)

R(si, a1, sj) = −CI − (j − i)CR

. (25)

At each time slot, the long term detection technique consistsof two phases. (1) Monitor the system state and obtain the ob-servation. (2) Solve the POMDP problem to compute the optimalpolicy and take corresponding action. According to Problem P3,the optimal action is based on the belief state, which dependson the current observation, last belief state as well as the actiontaken last step. Summarizing all the possible combinations ofobservations and corresponding policies, a policy transfer graphcan be achieved, which is the output of POMDP. It shows theoptimal action the decision maker can take given the currentsituation. Refer to Figure 15 for a policy transfer graph. Thecomplete procedure of the proposed long term detection techniqueis summarized in Figure 8.

6 SIMULATION

The proposed algorithms are implemented using MATLAB and CProgramming Language and simulations are conducted to analyzethe impacts of smart home pricing cyberattacks and the perfor-mance of detection techniques. In addition, the POMDP solver[27] is used to compute the policy transfer graph in Figure 15. Inthe simulation setup, a community consisting of 500 customers isconsidered, and each customer is equipped with a smart meterconnected with the AMI. For each customer, there are both man-ually controlled home appliances and automatically controlledhome appliances. In our testcases, the average energy load dueto manually controlled home appliances is shown in Figure 9. Therange for the daily energy consumption and execution duration ofthe automatically controlled home appliances are shown in Table 1,which is similar to our previous works [1], [18]. The simulationduration is set to the next 24 hours divided into hourly timeslots. The quadratic pricing model is used. Therefore, y axes inFigure 10(a), Figure 11(a), Figure 12(a) and Figure 14(a)(b) showthe quadratic coefficients in pricing and one needs to multiplethem by the energy load in the corresponding time slots to obtainunit price.

TABLE 1Daily Energy Consumption and Execution Duration of Automatically

Controlled Home Appliances [18]

Home Appliance Daily Consumption Execution DurationWashing Machine 1.2kWh-2kWh 1h-3h

Dish Washer 1.2kWh-2kWh 1h-3hCloth Dryer 1.5kWh-3kWh 1h-3h

EV 9kWh-12kWh 4h-8hAir Conditioner 2kWh-3kWh 2h-3h

Heater 2kWh-3kWh 2h-3h

6.1 Cyberattack for Bill Reduction

In this simulation, the smart home scheduling results with theunattacked guideline electricity price and the attacked guidelineelectricity price are compared. For the cyberattack, the hackermanipulates the guideline price and create a peak price from 1:00am to 6:00 am and makes the rest flat. Refer to Figure 10 for the

0 5 10 15 20 250

0.5

1

1.5

2

2.5

3

3.5

4

Time Horizon (Hour)

Ene

rgy

Load

(kW

h)

Fig. 9. Average Energy Load by Manually Controlled Home Appliances(Background Energy Load).

results without attack and Figure 11 for the results with attack,respectively. We make the following observations.

• From Figure 10(a), one sees that the guideline price wellmatches the real time price, which is as expected.

• From Figure 10(b), one sees that the energy load is welldistributed over the time horizon.

• In contrast, Figure 11(a) shows that the guideline price andreal time price are significantly different. The reason is thatwhen a smart home scheduler sees a high guideline pricefrom 1:00 am to 6:00 am, it tends not to schedule the loadthere, which can be clearly seen from Figure 11(b). Note thatthere are still scheduled appliances during that time perioddue to (1) the background energy such as refrigerator and(2) the appliances which are required to be scheduled theredue to starting time and ending time constraints. Due tothe reduced energy usage from 1:00 am to 6:00 am, the realtime price at these time slots are lower than what it shouldbe. Since the quadratic pricing model is used, the unit priceis computed as the multiplication of quadratic coefficient (yaxis) and the energy load. From 1:00 am to 6:00 am, the unitprice is $0.0812 per kWh without cyberattack and is $0.0528per kWh with cyberattack on average, which is a 34.3%reduction. Thus, if the hacker schedules his/her own loadduring this time period, a significant reduction in his/herown bill can be achieved.

• This bill reduction of the hacker comes from the bill in-creases of other customers. Using the unattacked guidelineelectricity price, each customer pays $3.82 on average.However, using the attacked guideline price, the averagebill increases to $4.12, which is 7.9% higher.

• As a byproduct, the cyberattack will also impact the energyload balancing. Comparing Figure 10(b) and Figure 11(b),the peak to average ratio (PAR) of the energy load fromunattacked guideline electricity price is 1.107 while it be-comes 1.358 with the attacked guideline electricity price.

6.2 Cyberattack for Forming a Peak Energy Load

In this simulation, the smart home scheduling results with theunattacked guideline electricity price and the attacked guidelineelectricity price are compared. For this cyberattack, the hackermanipulates the guideline price and creates a dip from 7:00 pmto 9:00 pm. Refer to Figure 10 for the results without attack andFigure 12 for the results with attack, respectively. We make thefollowing observations.

Page 10: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 10O b t a i n t h e O b s e r v a t i o nM a p t h e o b s e r v a t i o n t ob e l i e f s t a t eC o m p u t e t h e b e l i e f s t a t et r a n s i t i o na c c o r d i n g t o E q n . ( 1 5 )C o m p u t e t h ei n t e r m e d i a t e r e w a r df u n c t i o na c c o r d i n g t o E q n . ( 1 7 )S o l v e t h e o p t i m i z a t i o np r o b l e m P 3 t o g e t t h eo p t i m a l a c t i o n

O b t a i n t h e h i s t o r i c a l d a t a f r o mP O M D P m o d e l t r a i n i n gC o m p u t e t h e s t a t e t r a n s i t i o n p r o b a b i l i t y f o r a c t i o na c c o r d i n g t o E q n . ( 1 9 ) a n d E q n . ( 2 0 ) , t h e r e s u l t i s s h o w n i n F i g u r e 6 .C o m p u t e s t a t e t r a n s i t i o n p r o b a b i l i t y a n d o b s e r v a t i o np r o b a b i l i t y f o r a c t i o n f r o m E q n . ( 2 1 ) a n d E q n . ( 2 3 )r e s p e c t i v e l y .C o m p u t e t h e r e w a r d f u n c t i o n s a c c o r d i n g t o E q n . ( 2 4 ) a n d E q n . ( 2 5 )r e s p e c t i v e l y .?A p p l y s i n g l e e v e n t d e f e n s e t e c h n i q u e o n e a c h s m a r t m e t e r t o d e t e c tt h e h a c k e d s m a r t m e t e r s a n d r e q u e s t f i x t h e m .Y e s N oE n d

Fig. 8. Algorithmic Flow of Our Proposed POMDP Based Long Term Detection Technique.

0 5 10 15 20 250.000075

0.0001

0.000125

0.00015

0.000135

0.0002

0.000225

Time Horizon (Hour)

Ele

ctric

ity P

rice

($/k

Wh

2 )

(a)

0 5 10 15 20 250

0.5

1

1.5

2

2.5

3

3.5

4

Time Horizon (Hour)

Ene

rgy

Load

(kW

h)

(b)

Guideline Electricity Price without AttackReal Time Electricity Price without Attack

Fig. 10. (a) Guideline Electricity Price and Real Time Electricity Price without Cyberattack. (b) Average Energy Load (PAR=1.107) without Cyberattack.

• Figure 12(a) shows that the guideline price and real timeprice are significantly different. The reason is that whena smart home scheduler sees a low guideline price from7:00 pm to 9:00 pm, it tends to schedule a large amount ofload there, which can be clearly seen from Figure 12(b).The PAR of the energy load from unattacked guidelineelectricity price is 1.107 while it becomes 1.502 with theattacked guideline electricity price which is increased by35.7%. This means that the cyberattacks can significantlyunbalance the local energy load.

• Due to the peak energy usage from 7:00 pm to 9:00 pm,the real time price at these time slots are higher than whatit should be. From 7:00 pm to 9:00 pm, after convertingquadratic pricing to unit price, one can obtain that theunit price without cyberattack is $0.160 per kWh and withcyberattack is $0.111 per kWh on average, which is a 43.9%increase. The average daily bill of each customer is $4.02,

which is 5.24% more.

6.3 Single Event Detection Technique

In this simulation, the performance of our proposed single eventdetection technique is evaluated. Refer to Figure 13. Given aset of the historical guideline electricity prices of last 7 days, apredicted guideline electricity price is computed using the supportvector regression on these data. We have tested on various pricingcyberattacks. To present our simulation results, we assume that thehacker chooses to use a bill reduction cyberattack through increas-ing the guideline electricity price during some time slots. Referto Figure 14 for the simulation results. The maximum tolerableimpact differences are set as δB = 5% for average bill increase andδP = 2% for PAR increase, respectively. We make the followingobservations.

• When there is no pricing cyberattack, Figure 14(a) showsthe received guideline electricity price and the predicted

Page 11: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 11

0 5 10 15 20 250.000075

0.0001

0.000125

0.00015

0.000175

0.0002

0.000225

Time Horizon (Hour)

Ele

ctric

ity P

rice

($/k

Wh

2 )

(a)

0 5 10 15 20 250

0.5

1

1.5

2

2.5

3

3.5

4

Time Horizon (Hour)

Ene

rgy

Load

(kW

h)

(b)

Guideline Electricity Price with AttackReal Time Electricity Price with Attack

Fig. 11. (a) Guideline Electricity Price and Real Time Electricity Price with Pricing Cyberattack for Bill Reduction. (b) Average Energy Load (PAR=1.358)with Pricing Cyberattack for Bill Reduction.

0 5 10 15 20 250

0.000025

0.00005

0.000075

0.0001

0.000125

0.00015

Time Horizon (Hour)

Ele

ctric

ity P

rice

($/k

Wh

2 )

(a)

0 5 10 15 20 250

0.5

1

1.5

2

2.5

3

3.5

4

Time Horizon (Hour)

Ene

rgy

Load

(kW

h)

(b)

Guideline Electricity Pricewith Attack

Real Time Electricity Pricewith Attack

Fig. 12. (a) Guideline Electricity Price and Real Time Electricity Price with Pricing Cyberattack for Forming Peak Energy. (b) Average Energy Load(PAR=1.502) with Pricing Cyberattack for Forming Peak Energy.

0 5 10 15 20 250.000095

0.0001

0.000105

0.00011

0.000115

0.000120

0.000125

0.000130

Time Horizon (Hour)

Ele

ctric

ity P

rice

($/k

Wh

2 )

Historical Electricity Price Day 1Historical Electricity Price Day 2Historical Electricity Price Day 3Historical Electricity Price Day 4Historical Electricity Price Day 5Historical Electricity Price Day 6Historical Electricity Price Day 7Predicted Guideline Electricity Price

Fig. 13. Historical electricity price of the last 7 days and predicted guidelineelectricity price.

guideline electricity price. Comparing with the predictedelectricity price, the average bill pay increase is -0.26%,smaller than δB and the PAR increase is -1.45%, smallerthan δP . Thus, the received guideline electricity is regardedas normal.

• When there is pricing cyberattack, Figure 14(b) showsthe received guideline electricity price and the predictedguideline electricity price. Comparing with the predicted

electricity price, the average bill increase is 6.79%, largerthan δB and the PAR increase is 2.82%, larger than δP . Inthis case, the electricity pricing manipulation is detected.

6.4 Long Term Detection Technique

Two sets of simulations and the comparison with other methodsare conducted to evaluate the performance of the long termdetection technique. A small testcase with 5 smart meters (6 states)is first used as a toy example, and a large testcase with 500customers (501 states) is then used to match the realistic setup.The parameters of the POMDP model are presented in Table 2.Among them CL

1 and CL2 are the two level system losses while S∗

1

and S∗2 are the corresponding thresholds. Based on [28], we set the

labor cost for checking and fixing a smart meter to be CR and thecost for checking the smart meters using single event technique tobe CI .

We analyze the performance of the proposed long term detec-tion technique using the policy transfer graph obtained by solvingthe POMDP problem. In order to show the advantage of ourproposed method, the results are compared with those obtainedfrom three other methods. In the first method, we repeatedly usethe single event detection technique and recover the smart metersreported to be hacked, which is defined as the heuristic method. Inthe second method, a Bollinger bands based detection technique isdeployed, which is a standard statistical data analysis method thatis widely used in financial research, stock trading and time seriesanalysis [29]. It computes the moving average and standard devi-

Page 12: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 12

0 5 10 15 20 25

0.0001

0.00015

0.000110

0.000115

0.000120

0.000125

0.000130

0.000135

Time Horizon (Hours)

Ele

ctric

ity P

rice

($/k

Wh

2 )

(b)

0 5 10 15 20 25

0.0001

0.000105

0.000110

0.000115

0.000120

0.000125

0.000130

0.000135

Time Horizon (Hours)

Ele

ctric

ity P

rice

($/k

Wh

2 )

(a)

Predicted Guideline Electricity PriceRecieved Guideline Electricity Price without Attack

Predicted Guideline ElectricityPrice

Recieved Guideline ElectricityPrice with Attack

Fig. 14. (a) Without Cyberattack. For received guideline pricing, Bill=$3.83, PAR=1.170. and for predicted guideline pricing, Bill=$3.82, PAR=1.153, ∆B =

−0.26% and ∆P = −1.45%. (b) With Cyberattack. For received guideline pricing, Bill=$3.83, PAR=1.170. and for predicted guideline pricing, Bill=$4.09,PAR=1.203, ∆B = 6.79% and ∆P = 2.82%.

TABLE 2Parameters used in simulations. CL

1and CL

2are the two level system losses while S∗

1and S∗

2are the corresponding thresholds. CI and CR are the labor

costs for checking the smart meters and fixing a smart meter respectively. γ is the discount factor in the POMDP model.

Parameter Name S∗1 S∗

2 CR CI CL1 CL

2 γ

5-Customer Testcase 4 5 $50 $50 $200 $500 0.9500-Customer Testcase 100 250 $50 $2000 $25000 $100000 0.9

ation of the historical guideline price during the last seven days.Subsequently, it computes a upper band and a lower band, whichare K times the deviation above and below the moving average,respectively. They are known as Bollinger bands. Cyberattack isreported if the received guideline price is outside the bands. In thelast method, no defense technique is deployed. The cyberattacksare randomly generated and the simulations are conducted for thetime horizon of 48 hours. The three methods are evaluated usingobservation accuracy, PAR increase, bill increase and labor cost fordetecting hacks and fixing hacked smart meters. At each time slot,the observation accuracy is defined using the difference betweenthe number of actually hacked smart meters and the number ofsmart meters reported to be hacked by each method. Precisely, theobservation accuracy is defined as θ = 1 − |i−j|

jif the observation

is oi and the system state is sj (i.e., j smart meters are actuallyhacked while i smart meters are reported to be hacked).

6.4.1 5-Customer Testcase Study

We formulate our POMDP based long term detection problem asshown in Figure 8. The POMDP solver [27] is used to computethe policy transfer graph as depicted in Figure 15. Each nodein the graph corresponds to an output action but not a stategiven the current observation in the system so that the node e

in the policy transfer graph is different from the system state s.Recall that a0 and a1 are the available actions. The decision makertakes no action when the output is a0 and fix the hacked smartmeters when the output is a1. oi,∀i ∈ 0, 1, 2, . . . , 5 denotes theobservation that i smart meters in the system are hacked. Thesystem starts from state e0 and the decision maker takes actiona0 as the initial action. Given the observation after the action, thesystem transfers to the other state according to the policy transfergraph. For example, the system starts from state e0 at the timeslot h = 1. If it takes action a0 and observes o1 when h = 2, thesystem goes to state e1 according to the policy transfer graph andthe corresponding action is a0. If o2 is the subsequent observation,the system goes to state e5 and takes action a1.

The observation accuracies of the proposed method and theheuristic method are shown in Figure 16. The simulation results on

S t a r t

Fig. 15. Policy transfer graph for the 5-customer testcase.

PAR increase, bill increase and labor cost comparing our proposedmethod, the heuristic method and no defense technique are shownin Table 3. The bill increases are all normalized such that the billincrease without defense technique is 1. The PAR increase is theaverage value of each day. From Figure 16 and Table 3, we makethe following observations.

• Comparing with the results of no defense technique, ourproposed method can reduce the PAR by 1− 2.95%

31.9%= 90.8%

and the bill increase by 1 − 0.0848

1= 91.5%.

• The accuracy of the Bollinger bands based detection tech-nique is 42.88%. Comparing with the Bollinger bands baseddetection technique, our proposed long term techniquecan reduce the PAR by 3.85%−2.95%

3.85%= 22.78% and the

normalized bill increase by 0.106−0.0848

0.106= 20.00%, while

still saving the labor cost by 4050−2400

2400= 68.75%.

• Comparing with the heuristic method, our POMDP methodhas much better detection accuracy. It has the accuracy of97.42% while heuristic method has the accuracy of 62.95%.

Page 13: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 13

0 10 20 30 40 500

0.2

0.4

0.6

0.8

1

1.2

Time Horizon (Hours)

Obs

erva

tion

Acc

urac

y

POMDP Based Method, 0.9742 on AverageHeuristic Method, 0.6295 on AverageBollinger Bands Based Method, 0.4288 on Average

Fig. 16. Observation accuracy for the 5-customer testcase.

In addition, our POMDP method can reduce the PAR andbill increase by 1 − 2.95%

5.67%= 48.0% and 1 − 0.0848

0.167= 49.2%,

respectively, at the expense of increasing the labor cost byonly 2600−2400

2400= 8.3% comparing with heuristic method.

The large improvements in detection accuracy, PAR andbill certainly outweigh the small expense increase for ourPOMDP method.

6.4.2 500-Customer Testcase StudyWe next perform the simulations on a much larger 500 customertestcase which better models the realistic setup. The observationaccuracies of the proposed method and the heuristic method forthis 500-customer testcase are shown in Figure 17. The results onbill increase, PAR increase and labor cost are shown in Table 4. Wemake the following observations.

• Comparing with the results of no defense technique, thebill increase of and PAR increase are reduced by 1− 0.118

1=

88.2% and 1 − 3.42%

31.3%= 89.1%, respectively.

• The Bollinger bands based detection technique has anaccuracy of only 36.52%. Comparing with the Bollingerbands based detection technique, our proposed long termtechnique can reduce the PAR increase by 4.57%−3.42%

4.57%=

35.15% and the normalized bill increase by 0.127−0.118

0.127=

7.09%, while still saving the labor cost by 413850−258500

258500=

60.10%. This is because the Bollinger bands based detectiontechnique is a general statistical data analysis method with-out considering the specific problem nature of the smarthome pricing cyberattacks.

• Comparing with the heuristic method, our POMDP methodhas much better detection accuracy. It has the accuracy of97.73% while heuristic method has the accuracy of 51.15%.In addition, our POMDP method can reduce the PAR andbill increase by 1 − 3.42%

8.40%= 59.3% and 1 − 0.118

0.313= 62.3%,

respectively, at the expense of increasing the labor costby only 258500−239000

239000= 8.16% comparing with heuristic

method since more smart meters need to be fixed. Again,the large improvements in detection accuracy, PAR andbill outweigh the small expense increase for our POMDPmethod. It demonstrates that our proposed long term detec-tion technique can more effectively detect the cyberattacksconsidering the cumulative effect, which cannot be handledby the single event detection technique.

7 CONCLUSION

In this paper, the electricity pricing cyberattacks in the smart homesystem are considered. These cyberattacks aim at reducing the bill

0 10 20 30 40 500

0.2

0.4

0.6

0.8

1

1.2

Time Horizon (Hours)

Obs

erva

tion

Acc

urac

y

POMDP Based Method, 0.9773 on AverageHeuristic Method, 0.5115 on AverageBollinger Bands Based Method, 0.3652 on Average

Fig. 17. Observation accuracy for the 500-customer testcase.

of hackers and increasing the peak energy usage in the local powersystem. After analyzing their impacts, a single event detectiontechnique based on support vector regression is proposed. Sincethe single event detection does not have a long term view of thecyberattack impact, its detection capability is significantly limited.This motivates us to develop a partially observable Markov de-cision process based long term detection technique, which hasthe ingredients such as reward expectation and policy transfergraph to account for the cumulative cyberattack impact and thepotential future impact. Our simulation results demonstrate thatthe pricing cyberattack can reduce the hacker’s bill by 34.3% atthe cost of the increase of others’ bill by 7.9% on average. Inaddition, the pricing cyberattack can unbalance the energy load ofthe local power system as it increases the peak to average ratio by35.7%. Furthermore, our simulation results demonstrate that theproposed long term detection technique has the detection accuracyof more than 97% with the significant reduction in peak to averageratio and bill compared to a natural heuristic algorithm whichrepeatedly uses the single event detection technique.

REFERENCES

[1] Y. Liu, S. Hu, and T.-Y. Ho, “Vulnerability assessment and defensetechnology for smart home cybersecurity considering pricing cy-berattacks,” in Proceedings of IEEE/ACM International Conference onComputer-Aided Design (ICCAD), 2014, pp. 183–190.

[2] A. Mohsenian-Rad, V. Wong, J. Jatskevich, R. Schober, and A. Leon-Garcia, “Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid,”IEEE Transactions on Smart Grid, vol. 1, no. 3, pp. 320–331, 2010.

[3] R. Khan and J. Khan, “A heterogeneous wimax-wlan network for amicommunications in the smart grid,” in Proceedings of IEEE InternationalConference on Smart Grid Communications, 2012, pp. 710–715.

[4] R. R. Mohassel, A. Fung, F. Mohammadi, and K. Raahemifar, “Asurvey on advanced metering infrastructure,” International Journal ofElectrical Power & Energy Systems, vol. 63, pp. 473–484, 2014.

[5] X. Chen, T. Wei, and S. Hu, “Uncertainty-aware household appliancescheduling considering dynamic electricity pricing in smart home,”IEEE Transactions on Smart Grid, vol. 4, no. 2, pp. 932–941, 2013.

[6] [Online]. Available: http://www.ti.com/solution/docs/appsolution.tsp?appId=407

[7] [Online]. Available: http://www.cnn.com/2013/08/02/tech/innovation/hackable-homes/

[8] [Online]. Available: http://www.nbcnews.com/tech/internet/smart-refrigerators-hacked-send-out-spam-report-n11946

[9] [Online]. Available: http://money.cnn.com/2014/09/24/technology/security/bash-bug/

[10] H. Li and Z. Han, “Manipulating the electricity power market viajamming the price signaling in smart grid,” in Proceedings of IEEEGLOBECOM Workshops, 2011, pp. 1168–1172.

Page 14: 10.1109/TDSC.2015.2427841, IEEE Transactions on …in this infrastructure. In the home area networks, the wireless communication such as WiFi, 802.11, ZigBee and Homeplug are ... the

1545-5971 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. Seehttp://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI10.1109/TDSC.2015.2427841, IEEE Transactions on Dependable and Secure Computing

IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 14

TABLE 3Comparisons of different techniques for the 5-customer testcase.

No Defense Bollinger Bands Based Method The Heuristic Method POMDP Based MethodPAR Increase 31.9% 3.85% 5.67% 2.95%

Normalized Bill Increase 1 0.106 0.167 0.0848Labor Cost - $4050 $2400 $2600

TABLE 4Comparisons of different techniques for the 500-customer testcase.

No Defense Bollinger Bands Based Method The Heuristic Method POMDP Based MethodPAR Increase 31.3% 4.57% 8.40% 3.42%

Normalized Bill Increase 1 0.127 0.313 0.118Labor Cost - $413850 $239000 $258500

[11] L. Xie, Y. Mo, and B. Sinopoli, “False data injection attacks in electric-ity markets,” in Proceedings of IEEE International Conference on SmartGrid Communications, 2010, pp. 226–231.

[12] C. Liao, C.-W. Ten, and S. Hu, “Strategic FRTU deployment consid-ering cybersecurity in secondary distribution network,” IEEE Transac-tions on Smart Grid, vol. 4, no. 3, pp. 1264–1274, Sept 2013.

[13] O. Kosut, L. Jia, R. Thomas, and L. Tong, “Malicious data attacks onsmart grid state estimation: Attack strategies and countermeasures,”in Proceedings of IEEE International Conference on Smart Grid Communi-cations, 2010, pp. 220–225.

[14] Z. Lu, W. Wang, and C. Wang, “From jammer to gambler modelingand detection of jamming attacks against time-critical traffic,” inProceedings of IEEE INFOCOM, 2011, pp. 1871–1879.

[15] L. Liu, M. Esmalifalak, Q. Ding, V. Emesih, and Z. Han, “Detectingfalse data injection attacks on power grid by sparse optimization,”IEEE Transactions on Smart Grid, vol. 5, no. 2, pp. 612–621, March 2014.

[16] K. Manandhar, X. Cao, F. Hu, and Y. Liu, “Detection of faults andattacks including false data injection attack in smart grid usingkalman filter,” IEEE Transactions on Control of Network Systems, vol. 1,no. 4, pp. 370–379, Dec 2014.

[17] [Online]. Available: http://www.comed.com/[18] L. Liu, Y. Zhou, Y. Liu, and S. Hu, “Dynamic programming based

game theoretic algorithm for economical multi-user smart homescheduling,” in Proceedings of IEEE Midwest Symposium on Circuits andSystems (MWSCAS), 2014, pp. 362–365.

[19] Y. Liu, S. Hu, H. Huang, R. Ranjan, A. Zomaya, and L. Wang, “Gametheoretic market driven smart home scheduling considering energybalancing,” Accepted to IEEE Systems Journal.

[20] J. Rosen, “Existence and uniqueness of equilibrium points for concaven-person games,” Econometrica, vol. 33, no. 3, pp. 520–534, 1965.

[21] Y. Jin, “Personal communication.”[22] [Online]. Available: http://www.powersmartpricing.org/[23] C.-C. Chang and C.-J. Lin, “LIBSVM: A library for support vector

machines,” ACM Transactions on Intelligent Systems and Technology,vol. 2, pp. 27:1–27:27, 2011.

[24] L. P. Kaelbling, M. L. Littman, and A. Cassandra, “Planning and actingin partially observable stochastic domains,” Artificial Intelligence, vol.101, no. 1, pp. 99–134, 1998.

[25] [Online]. Available: http://cs.brown.edu/research/ai/pomdp/index.html

[26] Y. Guo, C.-W. Ten, S. Hu, and W. Weaver, “Preventive maintenancefor advanced metering infrastructure against malware propagation,”in Manuscript.

[27] [Online]. Available: http://www.pomdp.org/code/index.shtml[28] [Online]. Available: http://www.city-data.com/forum/house/

503817-question-re-electrician-labor-charges.html[29] C. Lento, N. Gradojevic, and C. Wright, “Investment information

content in bollinger bands?” Applied Financial Economics Letters, vol. 3,no. 4, pp. 263–267, 2007.

Yang Liu received his B.S. degree in Telecommu-nications Engineering, Huazhong University of Sci-ence and Technology, Wuhan, China in 2011. He iscurrently working toward his Ph.D. degree in Electri-cal Engineering, Michigan Technological University,Houghton, MI, USA. His research focuses on smarthome system, cyber-physical systems, and big dataanalysis.

Shiyan Hu (SM’10) received his Ph.D. in ComputerEngineering from Texas A&M University in 2008.He is currently an Associate Professor in the De-partment of Electrical and Computer Engineering atMichigan Technological University. He has been aVisiting Professor at IBM Research (Austin) duringSummer 2010. His research interests are in thearea of Computer-Aided Design of VLSI Circuits andSmart Home Cybersecurity, and he has publishedover 80 technical papers in the refereed journalsand conferences. He is a recipient of ACM SIGDA

Richard Newton DAC Scholarship (as the faculty advisor), a recipient ofFaculty Invitation Fellowship from Japan Society for the Promotion of Sci-ence (JSPS), and a recipient of the National Science Foundation (NSF)CAREER Award. He is an Associate Editor or Guest Editor for IEEE Trans-actions on Circuits and Systems (II), IEEE Transactions on Computers,IEEE Transactions on CAD, IEEE Transactions on Industrial Informatics andACM Transactions on Embedded Computing Systems. He has served asGeneral Chair, TPC Chair, TPC Subcommittee Chair, Sesssion Chair andTPC Member for various conferences for more than 70 times.

Tsung-Yi Ho (SM’10) received his Ph.D. in Elec-trical Engineering from National Taiwan Universityin 2005. He is a Professor with the Department ofComputer Science of National Chiao Tung Univer-sity, Hsinchu, Taiwan. From 2007 to 2014, he waswith National Cheng Kung University, Tainan, Tai-wan. He currently serves as an ACM DistinguishedSpeaker, a Distinguished Visitor of the IEEE Com-puter Society, the Chair of the IEEE Computer So-ciety Tainan Chapter, the Chair of the ACM SIGDATaiwan Chapter, and Associate Editor of the ACM

Journal on Emerging Technologies in Computing Systems and IEEE Trans-actions on Computer-Aided Design of Integrated Circuits and Systems,IEEE Transactions on Very Large Scale Integration Systems, and GuestEditor of IEEE Design & Test of Computers.