{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T01:35:18Z","timestamp":1774056918398,"version":"3.50.1"},"reference-count":51,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T00:00:00Z","timestamp":1707436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In Internet of Things-based smart grids, smart meters record and report a massive number of power consumption data at certain intervals to the data center of the utility for load monitoring and energy management. Energy theft is a big problem for smart meters and causes non-technical losses. Energy theft attacks can be launched by malicious consumers by compromising the smart meters to report manipulated consumption data for less billing. It is a global issue causing technical and financial damage to governments and operators. Deep learning-based techniques can effectively identify consumers involved in energy theft through power consumption data. In this study, a hybrid convolutional neural network (CNN)-based energy-theft-detection system is proposed to detect data-tampering cyber-attack vectors. CNN is a commonly employed method that automates the extraction of features and the classification process. We employed CNN for feature extraction and traditional machine learning algorithms for classification. In this work, honest data were obtained from a real dataset. Six attack vectors causing data tampering were utilized. Tampered data were synthetically generated through these attack vectors. Six separate datasets were created for each attack vector to design a specialized detector tailored for that specific attack. Additionally, a dataset containing all attack vectors was also generated for the purpose of designing a general detector. Furthermore, the imbalanced dataset problem was addressed through the application of the generative adversarial network (GAN) method. GAN was chosen due to its ability to generate new data closely resembling real data, and its application in this field has not been extensively explored. The data generated with GAN ensured better training for the hybrid CNN-based detector on honest and malicious consumption patterns. Finally, the results indicate that the proposed general detector could classify both honest and malicious users with satisfactory accuracy.<\/jats:p>","DOI":"10.3390\/s24041148","type":"journal-article","created":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T08:12:03Z","timestamp":1707466323000},"page":"1148","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4278-7123","authenticated-orcid":false,"given":"Muhammed Zekeriya","family":"Gunduz","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Vocational School of Technical Sciences, Bing\u00f6l University, Bing\u00f6l 12000, T\u00fcrkiye"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6113-4649","authenticated-orcid":false,"given":"Resul","family":"Das","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Technology Faculty, Firat University, Elaz\u0131\u011f 23119, T\u00fcrkiye"}]}],"member":"1968","published-online":{"date-parts":[[2024,2,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"327","DOI":"10.5505\/pajes.2017.89106","article-title":"Internet of things (IoT): Evolution, components and applications fields","volume":"24","author":"Gunduz","year":"2018","journal-title":"Pamukkale Univ. J. Eng. Sci."},{"key":"ref_2","first-page":"122","article-title":"Analysis of cyber-attacks in IoT-based critical infrastructures","volume":"8","author":"Das","year":"2019","journal-title":"Int. J. Inf. Secur. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.jnca.2016.08.012","article-title":"Communication technologies for smart grid applications: A survey","volume":"74","author":"Emmanuel","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","article-title":"Cyber security challenges for IoT-based smart grid networks","volume":"25","author":"Kimani","year":"2019","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_5","first-page":"970","article-title":"Communication Infrastructure and Cyber-Security in Smart Grids","volume":"10","author":"Gunduz","year":"2020","journal-title":"J. Inst. Sci. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2440","DOI":"10.1016\/j.egyr.2023.01.085","article-title":"Key communication technologies, applications, protocols and future guides for IoT-assisted smart grid systems: A review","volume":"9","author":"Qays","year":"2023","journal-title":"Energy Rep."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sahoo, S., Nikovski, D., Muso, T., and Tsuru, K. (2015, January 18\u201320). Electricity theft detection using smart meter data. Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA.","DOI":"10.1109\/ISGT.2015.7131776"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"159291","DOI":"10.1109\/ACCESS.2021.3131220","article-title":"Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods","volume":"9","author":"Althobaiti","year":"2021","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Takiddin, A., Ismail, M., and Serpedin, E. (September, January 29). Detection of Electricity Theft False Data Injection Attacks in Smart Grids. Proceedings of the 2022 30th European Signal Processing Conference (EUSIPCO), Belgrade, Serbia.","DOI":"10.23919\/EUSIPCO55093.2022.9909779"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Badr, M.M., Ibrahem, M.I., Kholidy, H.A., Fouda, M.M., and Ismail, M. (2023). Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems. Energies, 16.","DOI":"10.3390\/en16062852"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2593","DOI":"10.1109\/TSG.2018.2805723","article-title":"Deep Learning-Based Socio-Demographic Information Identification From Smart Meter Data","volume":"10","author":"Wang","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"112423","DOI":"10.1016\/j.rser.2022.112423","article-title":"Comprehensive survey and taxonomies of false data injection attacks in smart grids: Attack models, targets, and impacts","volume":"163","author":"Reda","year":"2022","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"98679","DOI":"10.1109\/ACCESS.2021.3092645","article-title":"Using GANCNN and ERNET for Detection of Non Technical Losses to Secure Smart Grids","volume":"9","author":"Javaid","year":"2021","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"108638","DOI":"10.1016\/j.compeleceng.2023.108638","article-title":"False data injection attack in smart grid cyber physical system: Issues, challenges, and future direction","volume":"107","author":"Habib","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"59558","DOI":"10.1109\/ACCESS.2023.3284681","article-title":"Electricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids","volume":"11","author":"Badr","year":"2023","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"100547","DOI":"10.1016\/j.ijcip.2022.100547","article-title":"Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects","volume":"38","author":"Berghout","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1109\/TSG.2018.2807925","article-title":"Detection of Non-Technical Losses Using Smart Meter Data and Supervised Learning","volume":"10","author":"Buzau","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"47541","DOI":"10.1109\/ACCESS.2022.3171262","article-title":"Real-Time Detection of False Readings in Smart Grid AMI Using Deep and Ensemble Learning","volume":"10","author":"Abdulaal","year":"2022","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"39638","DOI":"10.1109\/ACCESS.2022.3166146","article-title":"Electricity Theft Detection in Smart Grids Based on Deep Neural Network","volume":"10","author":"Lepolesa","year":"2022","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"107094","DOI":"10.1016\/j.comnet.2019.107094","article-title":"Cyber-security on smart grid: Threats and potential solutions","volume":"169","author":"Gunduz","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4189","DOI":"10.1109\/JSYST.2020.3030238","article-title":"Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings","volume":"15","author":"Takiddin","year":"2021","journal-title":"IEEE Syst. J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"108948","DOI":"10.1016\/j.ijepes.2023.108948","article-title":"Data-driven intelligent method for detection of electricity theft","volume":"148","author":"Chen","year":"2023","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1109\/TSG.2015.2425222","article-title":"Electricity Theft Detection in AMI Using Customers\u2019 Consumption Patterns","volume":"7","author":"Jokar","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/TII.2016.2543145","article-title":"Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid","volume":"12","author":"Jindal","year":"2016","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"106904","DOI":"10.1016\/j.epsr.2020.106904","article-title":"Ensemble machine learning models for the detection of energy theft","volume":"192","author":"Gunturi","year":"2021","journal-title":"Electr. Power Syst. Res."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Alromih, A., Clark, J.A., and Gope, P. (2021, January 25\u201328). Electricity Theft Detection in the Presence of Prosumers Using a Cluster-based Multi-feature Detection Model. Proceedings of the 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aachen, Germany.","DOI":"10.1109\/SmartGridComm51999.2021.9632322"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"106258","DOI":"10.1016\/j.epsr.2020.106258","article-title":"Detection and identification of energy theft in advanced metering infrastructures","volume":"182","author":"Souza","year":"2020","journal-title":"Electr. Power Syst. Res."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ullah, A., Javaid, N., Samuel, O., Imran, M., and Shoaib, M. (2020, January 15\u201319). CNN and GRU based Deep Neural Network for Electricity Theft Detection to Secure Smart Grid. Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus.","DOI":"10.1109\/IWCMC48107.2020.9148314"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Nabil, M., Ismail, M., Mahmoud, M., Shahin, M., Qaraqe, K., and Serpedin, E. (2018, January 20\u201324). Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters. Proceedings of the 2018 24th International Conference on Pattern Recognition (ICPR), Beijing, China.","DOI":"10.1109\/ICPR.2018.8545748"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1606","DOI":"10.1109\/TII.2017.2785963","article-title":"Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids","volume":"14","author":"Zheng","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Hasan, M.N., Toma, R.N., Nahid, A.A., Islam, M.M.M., and Kim, J.M. (2019). Electricity Theft Detection in Smart Grid Systems: A CNN-LSTM Based Approach. Energies, 12.","DOI":"10.3390\/en12173310"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Adil, M., Javaid, N., Qasim, U., Ullah, I., Shafiq, M., and Choi, J.G. (2020). LSTM and Bat-Based RUSBoost Approach for Electricity Theft Detection. Appl. Sci., 10.","DOI":"10.3390\/app10124378"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/s12046-020-01512-0","article-title":"Detection of electricity theft using data processing and LSTM method in distribution systems","volume":"45","author":"Kocaman","year":"2020","journal-title":"S\u0101dhan\u0101"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.ijepes.2018.03.031","article-title":"Clustering-based novelty detection for identification of non-technical losses","volume":"101","author":"Viegas","year":"2018","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"e9938475","DOI":"10.1155\/2021\/9938475","article-title":"Energy Theft Detection in an Edge Data Center Using Deep Learning","volume":"2021","author":"Cheng","year":"2021","journal-title":"Math. Probl. Eng."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Na, L., Xiaohui, X., Xiaoqin, M., Xiangfu, M., and Peisen, Y. (2021, January 23\u201325). Fake Data Injection Attack Detection in AMI System Using a Hybrid Method. Proceedings of the 2021 IEEE Sustainable Power and Energy Conference (iSPEC), Nanjing, China.","DOI":"10.1109\/iSPEC53008.2021.9735875"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Viegas, J.L., Vieira, S.M., Sousa, J.M.C., Mel\u00edcio, R., and Mendes, V.M.F. (2015, January 19\u201322). Electricity demand profile prediction based on household characteristics. Proceedings of the 2015 12th International Conference on the European Energy Market (EEM), Lisbon, Portugal.","DOI":"10.1109\/EEM.2015.7216746"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/TPWRD.2009.2030890","article-title":"Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines","volume":"25","author":"Nagi","year":"2010","journal-title":"IEEE Trans. Power Deliv."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Ismail, M., Shahin, M., Shaaban, M.F., Serpedin, E., and Qaraqe, K. (2018, January 15\u201318). Efficient detection of electricity theft cyber attacks in AMI networks. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.","DOI":"10.1109\/WCNC.2018.8377010"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Zheng, K., Wang, Y., Chen, Q., and Li, Y. (2017, January 4\u20137). Electricity theft detecting based on density-clustering method. Proceedings of the 2017 IEEE Innovative Smart Grid Technologies\u2014Asia (ISGT-Asia), Auckland, New Zealand.","DOI":"10.1109\/ISGT-Asia.2017.8378347"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1043593","DOI":"10.3389\/fenrg.2022.1043593","article-title":"Novel FDIs-based data manipulation and its detection in smart meters\u2019 electricity theft scenarios","volume":"10","author":"Munawar","year":"2022","journal-title":"Front. Energy Res."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1257","DOI":"10.1049\/gtd2.12386","article-title":"Electric theft detection in advanced metering infrastructure using Jaya optimized combined Kernel-Tree boosting classifier\u2014A novel sequentially executed supervised machine learning approach","volume":"16","author":"Hussain","year":"2022","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1016\/j.egyr.2022.11.072","article-title":"Electricity-theft detection for smart grid security using smart meter data: A deep-CNN based approach","volume":"9","author":"Haq","year":"2023","journal-title":"Energy Rep."},{"key":"ref_44","unstructured":"(2024, January 01). Irish Social Science Data Archive: Dublin, Ireland. Available online: https:\/\/www.ucd.ie\/issda\/data."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"107085","DOI":"10.1016\/j.ijepes.2021.107085","article-title":"Convolutional neural network applied to detect electricity theft: A comparative study on unbalanced data handling techniques","volume":"131","author":"Pereira","year":"2021","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Orozco, E., Qi, R., and Zheng, J. (2023, January 19\u201321). Feature Engineering for Semi-supervised Electricity Theft Detection in AMI. Proceedings of the 2023 IEEE Green Technologies Conference (GreenTech), Denver, CO, USA.","DOI":"10.1109\/GreenTech56823.2023.10173841"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Ayaz, I., Kutlu, F., and C\u00f6mert, Z. (2023). DeepMaizeNet: A novel hybrid approach based on CBAM for implementing the doubled haploid technique. Agron. J.","DOI":"10.1002\/agj2.21396"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"9771","DOI":"10.1007\/s10462-023-10395-6","article-title":"Games of GANs: Game-Theoretical models for generative adversarial networks","volume":"56","author":"Boroomand","year":"2023","journal-title":"Artif. Intell. Rev."},{"key":"ref_49","first-page":"163","article-title":"An effective DNN-based Approach for Detecting Energy Theft in Smart Grids through User Consumption Patterns","volume":"12","year":"2023","journal-title":"Turk. J. Nat. Sci."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"2502928","DOI":"10.1109\/TIM.2021.3127649","article-title":"Performance Analysis of Electricity Theft Detection for the Smart Grid: An Overview","volume":"71","author":"Yan","year":"2022","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1109\/JIOT.2020.3026692","article-title":"Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks","volume":"8","author":"Ibrahem","year":"2021","journal-title":"IEEE Internet Things J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/4\/1148\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:57:52Z","timestamp":1760104672000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/4\/1148"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,9]]},"references-count":51,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["s24041148"],"URL":"https:\/\/doi.org\/10.3390\/s24041148","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,9]]}}}