Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Smart power grid privacy protection and electricity stealing detection method based on block chain

A smart grid and privacy protection technology, applied in digital data protection, neural learning methods, biological neural network models, etc., can solve problems such as damage, smart meters are vulnerable to attacks, and economic losses of power companies and legitimate users, so as to ensure data security The effect of completeness

Pending Publication Date: 2022-04-08
ZHEJIANG GONGSHANG UNIVERSITY
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] On the other hand, because the smart meters in the smart grid are vulnerable to attacks, illegal users continue to steal electricity in order to obtain more economic benefits
However, power theft is a very serious problem for the entire power system. It will cause huge economic losses to power companies and legal users, and at the same time interfere with the normal operation of the power grid and even cause equipment failure or damage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart power grid privacy protection and electricity stealing detection method based on block chain
  • Smart power grid privacy protection and electricity stealing detection method based on block chain
  • Smart power grid privacy protection and electricity stealing detection method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] The present invention will be described in further detail below through examples, and the following examples are explanations of the present invention and the present invention is not limited to the following examples.

[0104] Embodiments of the invention include:

[0105] (1) The lightweight data aggregation method based on the consortium blockchain satisfies resource-constrained smart meters in practical applications, and realizes privacy protection and integrity protection in smart grid communications.

[0106] (2) The electricity theft detection method based on the convolutional neural network, using the safe, efficient, and traceable user group data provided in (1), establishes a model to analyze the electricity consumption data and detect the user's electricity consumption behavior, and realizes the detection of theft. Discovery of electrical behavior and secure transfer of results.

[0107] (3) Based on the blockchain-based electricity theft behavior processing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a smart power grid privacy protection and electricity stealing detection method based on a block chain. The method is reasonable in design, high in practicability, safe and efficient. The method comprises the following steps: 1) initializing a system; 2) requesting for data aggregation; 3) replying a data aggregation request; 4) generating a user report; 5) aggregating the security data; 6) data aggregation recovery; and 7) the control center CC detects and analyzes the power consumption data so as to detect the electricity stealing behavior of the user. According to the method, the intelligent electric meter with limited resources in practical application can be met, privacy protection and integrity protection in intelligent power grid communication are achieved, safe, efficient and traceable user group data are utilized, electricity consumption data are analyzed to detect the electricity consumption behavior of a user, the electricity stealing behavior is found, and a result is safely transmitted.

Description

technical field [0001] The invention relates to a block chain-based smart grid privacy protection and electricity theft detection method. Background technique [0002] In order to protect the privacy of users, many power grid privacy protection schemes use the semantically secure Paillier encryption algorithm to encrypt the ciphertext. However, the Paillier algorithm has a large amount of calculation, which increases the calculation burden of smart meters, and is not suitable for resource-restricted applications. limited smart meters. Although some solutions for privacy-preserving data aggregation in smart grids have been proposed, most of the existing works are based on computational overhead operations, and these methods are not suitable for smart meters with limited computing power and resource constraints. [0003] However, the above solutions all have the problem that it is difficult to find an aggregator that all users trust, and there are great challenges in the avai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q50/06G06Q30/00G06N3/08G06N3/04G06F21/62G06F21/60G06F21/31
Inventor 李暮琪鲍海勇
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products