Next Article in Journal
Graded Rings Associated with Factorizable Finite Groups
Previous Article in Journal
Improving Wild Horse Optimizer: Integrating Multistrategy for Robust Performance across Multiple Engineering Problems and Evaluation Benchmarks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Benford’s Law in Electric Distribution Network

1
Department of Electric Power Engineering, Faculty of Electrical Engineering and Informatics, Technical University of Košice, 042 00 Košice-Sever, Slovakia
2
Východoslovenská distribučná, a.s., Mlynská 31, 042 91 Košice, Slovakia
*
Author to whom correspondence should be addressed.
Submission received: 20 July 2023 / Revised: 6 September 2023 / Accepted: 8 September 2023 / Published: 10 September 2023
(This article belongs to the Section Engineering Mathematics)

Abstract

:
Benford’s law can be used as a method to detect non-natural changes in data sets with certain properties; in our case, the dataset was collected from electricity metering devices. In this paper, we present a theoretical background behind this law. We applied Benford’s law first digit probability distribution test for electricity metering data sets acquired from smart electricity meters, i.e., the natural data of electricity consumption acquired during a specific time interval. We present the results of Benford’s law distribution for an original measured dataset with no artificial intervention and a set of results for different kinds of affected datasets created by simulated artificial intervention. Comparing these two dataset types with each other and with the theoretical probability distribution provided us the proof that with this kind of data, Benford’s law can be applied and that it can extract the dataset’s artificial manipulation markers. As presented in the results part of the article, non-affected datasets mostly have a deviation from BL theoretical probability values below 10%, rarely between 10% and 20%. On the other side, simulated affected datasets show deviations mostly above 20%, often approximately 70%, but rarely lower than 20%, and this only in the case of affecting a small part of the original dataset (10%), which represents only a small magnitude of intervention.

1. Introduction

In electricity distribution networks, the consumption values measured at certain network nodes follow natural, authentic value distribution when no special conditions are present. However, in cases when special conditions occur in the consumption situation, e.g., some kind of artificial intervention due to macro-economic or micro-economic requirements, or non-technical losses occur due to electricity theft, the character of the consumption values change and the dataset value become unauthentic and unnatural.
Macroeconomic or micro-economic requirements and their effects are important for electricity production planning. Thus, detecting their presence could be a useful tool in helping electricity production planning [1,2].
Technical and non-technical losses make up an important part of costs for electricity distribution. Electricity theft is a significant challenge for companies, utilities, and distributors, where attackers alter usage measurement data collected by conventional and smart meters in a non-natural way. Detecting this kind of loss could provide a useful tool for theft prevention actions [2,3,4,5].
Benford’s law provides a tool for one of the methods to detect such a non-natural change in data sets collected from electricity metering devices. However, Benford’s law, in short BL, has a much wider implementation portfolio, helping fraud detection, e.g., in accounting, bank transaction register, etc. The contribution of this paper is the verification of BL validity for electricity metering data sets (the consumption of the electric power), as well as the verification of first digit distribution deviation when comparing BL first digit distribution in natural and affected datasets [1,3,6,7,8,9,10,11,12,13,14,15].
Within the references survey, we can make some statements:
Smart electricity meters are gradually being installed by distribution companies, and a deeper analysis of the data using Benford’s law has not yet been conducted. However, the application of Benford’s law is in various areas and branches of science, as can be read in some publications [16,17,18].
In [6], the authors describe how Benford’s law can be applied to datasets acquired from different energy systems. Their research results indicate that Benford’s law can be used to detect malicious data injected by hackers into the supervisory control and data acquisition (SCADA) system of a transmission network. The relative square deviation index returns values lower than 0.05 in all tested cases in this study [19,20,21,22,23].
In another paper [10], the authors focused on analyzing electricity consumption data in a company in Fujian Province. They applied Benford’s law to consumption data because the record of electricity consumption data is often uncomprehensive and inaccurate. The proposed algorithm effectively identifies problematic data and estimates overall electricity consumption through limited data, with the deviation rate within an acceptable range [20,21,22,23,24].
In the paper [2], the authors proposed a Distributed Intelligent Framework for Electricity Theft Detection, equipped with Benford’s Analysis for initial diagnostics on smart meter big data. Various samples of data, both normal and manipulated by attackers, were compared. The results indicate that Benford’s law works well for analyzing normal data. However, when manipulated data were subjected to Benford’s law analysis, significant deviations from normal data were observed. This demonstrates the power of Benford’s analysis in detecting potentially manipulated data.
Furthermore, in papers [24,25,26,27,28,29,30,31,32], Benford’s law was applied to:
-
determine whether lists of COVID-19 infection numbers, claiming to be measurements of real events or sizes, were manipulated,
-
analyze lightning data and assess the negative effects with precise parameters of lightning in kA unit,
-
detect image forgery during resizing and compression,
-
detect anomalies in the number of publications per researcher and the number of researchers per publication,
-
analyze the distribution of starting letters in novels and similar studies,
-
evaluate the quality of economic data in companies.
Our motivation for performing our experiments in a described way was to incorporate BL deviation detection in electricity theft methods in opposition to the methods presented in other articles and cited in Section 4 of this article. We also wanted to verify the BL deviation detection sensitivity by affecting different amounts of data in the recorded dataset.
After studying these publications, we assumed that Benford’s law can be verified and applied to analyze data in various directions, but it encounters the issue of reduced accuracy when we have insufficient data amount recorded.
Thus, BL is valid for datasets across different science branches, e.g., sociology, geology, mathematics, geography, economy, medicine, electric power enginnering and many others, one of the aims of this article was to experimentally verify the acquired dataset’s suitability for BL tests. The first part of the experimental phase focused on first digit probability distribution. We found that the acquired datasets comply with BL distribution as shown in graphs and tables with experimental results. It is the task of future studies to extend the experiments for datasets from smart electrometers in larger areas and acquired during longer periods (although presented datasets can be considered as sufficient and relevant).
As a result of the reference survey, we formulated a research gap by the following points:
  • using BL for electricity theft detection methods,
  • verifying the detection sensitivity by affecting different amounts of the original dataset,
  • examining the dataset behavior according to BL by applying different kinds of intervention operations.
The research gap points mirror our contribution in this research field by using the BL electricity theft detection method verified by different simulated intervention operators at different levels of dataset affection.
As stated in [33], one of the basic requirements for datasets to comply with Benford’s Law is the value of the order of magnitude is higher than 3. However, in our experiments, the datasets had this value lower than 3. Despite this fact, the datasets complied with BL in most of our cases. We think that this is an interesting contribution to formerly published facts regarding BL.
However, after we have made a survey of the references available in the world, we have realized that there are only a few articles dealing with datasets acquired in electricity distribution networks. So, we had only limited possibilities to make comparisons with other study cases in this scientific field.
In addition, due to the amount of recorded data, it was impossible to do perform experiments for method sensitivity testing by choosing more levels of affected data amount.
In our article, we first take a look at the basic theory behind the BL with some limitations for datasets under examination and operations used for theft simulation and dataset intervention in general; then, we describe the BL usage in electric power engineering. In Section 5, we describe our experimental datasets; in Section 6, our experimental method is presented. Section 7 presents the results from experimental calculations in tabular and graphical ways. Section 8 and Section 9 include our discussion regarding the presented results and some conclusions.

2. The Theory behind Benford’s Law

Simon Newcomb first observed the effects of BL in 1881; however, Frank Benford reinvented and published the BL effects in 1938. Benford elaborated this statistical law in more depth, and he named it “Law of Anomalous Numbers”. Newcomb and Benford discovered this law by observing the wear and tear of logarithmic, square root, and trigonometric table letter pages, where the first pages were worn much more than the latter ones. (assuming the first pages in these tables contained numbers beginning with digits 1, 2, …, etc. digit), i.e., the users of these tables searched corresponding information mostly on first pages [1,9].
Because of these observations, a first significant digit probability can be constructed. Benford also observed various datasets and their behavior. He found a few dataset properties, which made the dataset best suited according to BL.
Intuitively, the probability that the numbers begin with a significant digit is equal for all (decimal) digits. However, a large number of datasets fulfilling requirements described later in this section have this probability unequal, and this probability distribution follows BL; the probability is skewed towards smaller digits.
First, we have to define the term “significant number” [17]: every real number excluding zero and denoting it as x, the first significant decimal number of the real number x, denoted as D1(x), is the unique integer j ∈ {1, 2, …, 9} satisfying conditions [1]
10kj ≤ |x| < 10k(j + 1)
for some (unique) k ∈ Z. Additionally, for every number m ≥ 2, m ∈ N, the m-th significant decimal digit of x is denoted as Dm(x). Ths is defined inductively as a unique integer number j ∈ {0, 1, …, 9} in the following formula [1]:
10 k i = 1 m 1 D i x 10 m 1 + j x < 10 k i = 1 m 1 D i x 10 m 1 + j + 1
for some unique number k ∈ Z; for convenience, Dm(0): = 0 for all m ∈ N. By definition, the first significant digit D1(x) of x! = 0 is never zero. However, when considering the second, third, fourth and so on, these significant digits may be any integers including zeros, i.e., they are defined by the set of {0, 1, …, 9} decimal numbers.
Benford’s law is a statistical law describing what is the probability that a specific digit becomes the first significant digit of the number from a dataset. However, the dataset that follows BL must fulfill the following basic requirements:
  • The dataset must not be radically restricted in value range (e.g., the dataset of people’s height or IQ is a radical restriction because of a very small range of possible values).
  • The dataset must not be influenced by any kind of artificial effects caused by human actions aiming to change the values intentionally.
  • The value range in the dataset must be large enough, e.g., [14]:
Fdiff > 3, according to Fdiff = log(max) − log(min)
where max and min stand for maximal and minimal dataset values, respectively.
4.
The dataset should be large enough.
The Formula (2) describes the calculation of the first significant digit probability according to BL [14]:
Fd = log10(d + 1/d)
where Fd is the probability value. (In the case of decimal numbers, we have to use decimal logarithm), and
d ∈ D = (1, 2… 9)
Then, for digit 1:
F1 = log10(1 + 1/1) = 0.30103
i.e., the probability that the decimal digit 1 is the first significant digit in approximately 30,103% of cases. The sum of all probabilities is 1, i.e., 100% probability for all decimal digits d ∈ D = (1, 2… 9), the digit 0 cannot be the first significant digit, and dataset samples having the value 0 (e.g., 0 or 0.000) are excluded from the dataset because they do not contain a significant digit.
From calculations, we can observe a descending trend of the probability.
The probability distribution mentioned above is valid for decimal number systems; however, BL is not restricted to this system, and it is also applicable for other numeric systems, e.g., octal or hexadecimal numeric systems. Then, we can write the first significant digit probability equation in more general form, assuming that the difference between 2 logarithms equals to the logarithm of the ratio:
Fd = logn(d + 1) − logn(d)
where d denotes a particular digit from a particular numeric system, and n denotes the particular numeric system.

3. Other Observations Regarding Benford’s Law and Operations Performed on Datasets Following This Law

The mathematical operations performed on the datasets can be divided into two groups: operations that do not break the BL validity on a dataset and operations that do break this validity.
  • Conversion from one numeric system into another (base-invariance) means only changing the base of the logarithm.
  • Scale invariance means that the significant digit distribution should be invariant under changes of scale and thus must comply with Benford distribution according to the following definition:
    -
    A probability measure P on (R+, A) with A ⊃ S has scale-invariant significant digits if and only if P(A) = B(A) for every A ∈ S, i.e., if and only if P follows Benford’s law (proof can be found in [17]).
  • Furthermore, the sum-invariance term says that the first digit probability distribution has sum-invariant digits if, in a set of numbers with that distribution, the sums of all entries with the first digit 1 has the same value as each other of the sums for all entries with the remaining first digits. For example, the sum of all the entries with the first two significant digits 1 and 3, respectively, has the same value as the sum of all remaining entries with any other combination of the first two significant digits, etc.
By definition, a random variable X has sum-invariant significant digits if, for every m ∈ N, the value of Exact sum-invariance ESd1, …, dm(X) is independent of d1, …, dm [1,15].

4. Benford Law in Electric Power Engineering

Electricity theft is one of the major contributors to non-technical losses in distribution networks. When this network fulfills the parameters of a smart network, smart electrometers are used for measuring electricity consumption at different points and distribution levels. These smart electrometers are installed not only at the customer’s site but also at higher network levels. From such a network, data can be obtained at different points, and we can obtain an overall image of electricity consumption and losses at a particular locality. However, in the case of traditional networks without smart devices, it is much harder to detect electricity theft. The customer data is also an important issue in this case. Therefore, BL is a promising option for electricity theft detection.
Another typical utilization of BL is electricity consumption prediction and monitoring. Some outer objective factors can influence BL distribution in particular time intervals, e.g., weather, holidays, working schedule during the day, etc. BL can help detect the irregularities in standard prediction of electricity consumption, problems in monitoring. As BL results from mathematical statistics, it can help to predict and future consumption in order to improve planning and managements of electricity production. [2].
BL can also monitor the electricity production process and check the stability or dropouts during these processes. Comparing actual production with expected BL distribution, the electricity production companies can identify places where analysis and data acquisition improvement are needed. This contributes to minimizing energy loss [2].
However, there are a few restrictions using BL in electric power engineering [2,5,11]:
  • Small data sets—In case we have only small data sets as the input of the comparison, these data sets are not statistically significant,
  • Specific data distribution—BL distribution can fail in cases when the first digits of the data are symmetrically distributed around zero, or the first digit probability is distributed evenly by the nature of the data,
  • Data manipulation—This manipulation can be considered natural, and usually, it is introduced by companies intentionally in order to fulfill specific production or distribution process requirements,
  • Deviations from normal processes—In case of irregular and exceptional situations, e.g., electricity supply dropouts, the dataset is influenced.
These restrictions have to be considered when using BL in electric power engineering.
In fact, there are only a few articles dealing with datasets acquired in electricity distribution networks, so we had only limited possibility to compare our methods with methods published so far. There are a few references dealing with other types of datasets, but due to some special aspects of the data from the distribution network (e.g., seasonal character of electricity consumption, electricity theft performed physically or by changing the data after acquisition), the methods in these references cannot be directly compared.
In [34], the theft of electricity detection method was presented based on the electricity network model. Our experiments do not assume any special electricity distribution model because we tried to make our method more general and not related to any grid model or grid extent.
In [33], a novel method for electricity theft is presented based on three three-phase state estimators based on phasor measurement units. This requires extensive changes in the distribution grid. However, the authors do not assume the usage of BL, which does not require any changes in the grid at all.
In [35], a theft detection method is presented, which uses comprehensive features in time and frequency domains with deep neural network-based classification. Again, the BL is not assumed by the authors.
As stated above, approaches including the BL method presented in our paper do not assume any physical changes in the electricity distribution grid nor assume any special measures before data recording because the dataset is ready to use for this method already in the phase of the electricity consumption billing.
In our references survey, we did not encounter any paper dealing with BL deviation experiments by affecting different amounts of the data in the original dataset. We did not find any reference making similar intervention operation tests as we did.

5. Dataset for Our Experiments

Let us summarize the requirements for dataset collection for which first digit probability distribution should follow BL distribution [15,16,17]:
  • The data in the dataset must come from the same situation/effect or should describe the same parameter,
  • There should be no limits on minimum and maximum values,
  • The dataset should be statistically random; the data must not be generated according to pre-defined rules or equations (serial or telephone number, any identification numbers, etc.),
  • The dataset should include smaller than bigger values, the mean value should be smaller than the median, and the dataset should have positive skewness,
  • The values in the dataset should be on the same scale,
  • The values should have at least two orders.
In our experiments, we have collected a dataset of electricity consumption values in cooperation with a local electricity distribution company in east Slovakia-Východoslovenská distribučná a.s. The measuring points were placed in the Košice–Pereš locality, in the low-voltage distribution grid. We have used 48 “smart”.
The values were measured remotely and stored in a local database on the server. The measurements were made in the time range from 1 January 2021 0:15:00 until 1 April 2022 0:00:00, while the data were measured and stored each 15 min. The overall number of measured and stored values in our experimental dataset is 43,676.
Each record in the database has the same attributes: the date and time of the data acquisition, the place of the electrometer (a node in the distribution grid), the consumption value, and the identification number of the electrometer.
The original datasets came from real-world measurements and were recorded during normal electricity distribution grid operation. As the dataset owner stated, the electricity theft in this part of the grid during the acquisition period was very unlike due to the measures that the company made in the last years. This was also the reason why we chose this locality for our experimental data acquisition. The data deviation due to electricity theft is hard to characterize in a general way, especially when the theft is made by a physical attack on the distribution grid. These events can have very random characters and affect different amounts of data in a dataset. However, we assume that the illegally connected electricity consumption node behaves in a non-natural way. When we assume a non-physical attack to the grid made by accounting data falsification, this causes the injection of non-natural dataset parts into the original dataset. This is, of course, the target case for BL.
We assumed the original dataset affection at different magnitudes to better model real-world electricity theft cases and also due to the comparison with different affection magnitude levels.

6. The Methods Used in Our Experiment

One part of the experiments focused on BL deviation detection sensitivity. Therefore, we have chosen different levels of false data injection magnitude into the original dataset. By assumption, a higher magnitude of the injection should cause higher values of the first digit probability deviation compared to theoretical values of BL.
In addition, in the real world, the magnitude of a dataset attack is unknown and cannot be predicted, though it can be limited to maximal magnitude. E.g., we do not assume 100% of affected values in the dataset. We decided to choose relatively evenly distributed levels of data affection magnitude to cover the whole magnitude spectrum.
We have prepared a validation method for BL distribution for first digit probability in the dataset and for the violation of this distribution due to artificial intervention simulated by the following operations:
  • Adding +1 to dataset values,
  • Division of the dataset values by 2,
  • Multiplication of the dataset value by 2.
In addition, supplementary violation operations were performed on the dataset, where:
  • 75% of the overall dataset values were affected (32,757 values were replaced by pseudo-random numbers),
  • 50% of the overall dataset values were affected (21,838 values were replaced by pseudo-random numbers),
  • 25% of the overall dataset values were affected (10,919 values were replaced by pseudo-random numbers),
  • and 10% of the overall dataset values were affected (4367 values were replaced by pseudo-random numbers).
Before performing the violation operations, we multiplied all the values in the dataset by 1000 to perform data scaling and in order to obtain all the values greater than 1. BL distribution is not affected by scaling operation.
Modeling errors have various aspects in our experiments. First, there are errors influencing the grid from which we acquired the original dataset. This error can be divided into several parts:
  • Environmental and social errors, which means that the dataset can be influenced by seasonal factors, e.g., weather in general, outside temperature, etc., and the social behavior of electricity consumers. All these aspects of course change the original dataset in unnatural way, causing its corruption and deviation from BL distribution. This aspect was significantly canceled by proper selection of data recording interval.
  • Data quality includes measurement accuracy and completeness.
  • A single recording method can be another source of inaccuracies in data values.
Then, the simulation of false data can introduce further errors in the experimental results. We have tried to partially avoid this by choosing different levels and kinds of original data intervention.
In summary, we can draw the following methodology flowchart (Figure 1):
The methodology flowchart above begins with electricity consumption value acquisition from smart electrometers. Then, the original dataset BL distribution calculation is performed and we obtain the deviations of probabilities. For considering the particular dataset as capable of further experiments, the deviations in this step must as minimal as possible, otherwise the dataset does not follow BL distribution. The original dataset is affected by particular simulated intervention operations at different dataset amounts. As a result, we obtain again the BL distribution deviations. In the last step we compare the unaffected and affected dataset deviation from BL distribution. High values of these differences are markers of successful simulated intervention detection, i.e., (a) the intervention simulation model is detectable by BL, (b) the dataset and similar dataset types naturally follow BL distribution, (c) BL can be used for false data detection for such kind of datasets.

7. The Results of the Experiments

The following figures and tables demonstrate the results of our experimental calculations of the first digit probability distribution according to BL and affected probability distribution as described above. Each graph (figure) and table pair show the results for five different electrometers, i.e., five different nodes in the electricity distribution grid in combination with the above-described different dataset violation operations. Appropriate node and operation combination describes the caption of the figure and the table and the accompanying description.

7.1. Violation Operation–Division by Two

This section shows the results for the violation operation–two divide the whole dataset of values.
Table 1 and Table 2 and Figure 2 and Figure 3 show the results of the experiment in tabular and graphical form. The 1st column and the x-axis in the graph represent the first significant digit under examination. The 2nd columns represent the number of samples in the dataset with the corresponding first significant digit. The 3rd column and the blue bar in the graph represent the same number of values in the dataset expressed in percentage. We have inserted also 4th column and orange as the theoretical values of the probability distribution according to the BL. To make comparison possible, we have calculated the difference between theoretical and calculated distribution (5th columns and the red bar) expressed in percentage. This column values show the suitability of the input dataset for the verification experiment, because the lower the values in this column, the more the input dataset follows the BL probability distribution. If the values were too high, the input dataset does not fulfill the requirements for BL datasets.
The 6th column and yellow bar represent values for probability distribution after violation operation in percentage. This column indicates the violation operation effect, which is also expressed in the last tabular column and violet bar.
High values in these last two columns (violation indicator columns) indicate the presence of the violation in comparison to the original unaffected dataset.
As we can see, the violation indication columns include relatively high differences, especially for the fifth digit. We can consider this as the original dataset violation marker.
In Table 3 and Figure 4, we can see the dataset violation markers, e.g., for digit 5.
As for measuring node No. 1 in the electricity distribution network, the original dataset values follow the BL first digit probability distribution according to the theoretical probability distribution. The highest deviations are 4–5% for digits 2 and 4.
We can say that for node No. 2, the original dataset values also follow the BL first digit probability distribution according to the theoretical probability distribution. The highest deviations are 2–4% for digits 1, 2 and 7.
However, despite these deviations, we can consider the dataset from both nodes as capable of fraud detection by BL because of quite a good match of the probability distribution to the theoretical distribution values.
In Table 3, the experimental results for the other three nodes can be found; however, we have aggregated these results in one table. The differences between theoretical probability distribution values and measured original dataset value first digit probability distribution values were slightly higher than for nodes No. 1 and No. 2. The particular differences were up to 7%. For none of our dataset values, however, this difference was higher than 10%.

7.2. Violation Operation–Adding Integer Number to the Dataset Values

This section shows the results for the violation operation–adding an integer number (in our case, adding one value) to the whole dataset.
In Table 4 and Figure 4, we can see the results for measuring node No. 1.
In Table 5 and Figure 5, node No. 2 results are depicted.
Table 4 and Table 5 and Figure 4 and Figure 5 show the results of the experiment for adding integer value one to the whole original dataset. The columns in the table and graph follow the same meaning as described in Section 7.1. High values in these last two columns (violation indicator columns) indicate the presence of the violation in comparison to the original unaffected dataset.
As we can see, the violation indication columns include relatively high differences, especially for lower digits as one or two. We can consider this as the original dataset violation marker.
In Table 6, we can see aggregated violation operation results for nodes 3, 4, and 5. Again, the difference in the probability distribution compared to the BL can be seen, especially for lower digits, so we can reliably identify the violation markers.

7.3. Violation Operation–Multiplying the Dataset Values by Integer Number

This section represents the results in the case of multiplication of the dataset values by integer number. All the values in the dataset are affected. The Table 7 and Figure 6 above show the results for the measuring node No. 1.
Table 7 and Table 8 and Figure 6 and Figure 7 show the results of the experiment for multiplying by integer value two the complete original dataset. The columns in the table and graph follow the same meaning as described in Section 7.1. High values in these last two columns (violation indicator columns) indicate the presence of the violation in comparison to the original unaffected dataset.
As we can see, the violation indication columns include relatively high differences, especially for almost all digits except the digit 1. We can consider this as the original dataset violation marker.
In Table 9, the experimental results for nodes 3, 4, and 5 can be found. As in previous cases, we can find violation markers especially for lower digits and they correspond to the markers for nodes 1 and 2.
The Table 8 and Figure 7 show the results for the measuring node No. 2.

7.4. Violation Operation–Affection 75% of Dataset Values

This section represents the results when a data violation affects only 75% of the original dataset values. The data violation operation is made by setting the affected values to an integer number; in our case, it was the value of 2.
The Table 10 and Figure 8 below show the results for the measuring node No. 1.
In the Table 11 and Figure 9, the results for measuring node No. 2 are depicted. In Table 12, the aggregated results can be found for nodes 3, 4, and 5.
Table 10 and Table 11 and Figure 8 and Figure 9 show the results of the experiment, which affected the original dataset only partially, which is a first approximation of the real-world case. In this experiment, we have changed 75% of the original dataset values to a fixed integer number 2. However, 75% is a high percentage when talking about fraud, but we have chosen this percentage for comparison reasons. The columns in the table and graph follow the same meaning as described in Section 7.1. The selected integer number for dataset violation operation also explains the high difference between theoretical probability distribution and calculated probability values especially in the case of the 2 digit. This indicates the presence of the violation in comparison to the original unaffected dataset. We can consider this as the original dataset violation marker. However, assuming other value for partial replacement in the original dataset, the high difference markers could shift to these other value/values.

7.5. Violation Operation–Affection 50% of Dataset Values

This section represents the results when a data violation affects only 50% of the original dataset values. The data violation operation is made by setting the affected values to an integer number; in our case, it was the value of 1.
The Table 13 and Figure 10 below show the results for measuring node No. 1. Additionally, in the Table 14 and Figure 11 the results for the measuring node No. 2 are depicted. In Table 15, the aggregated results can be found for nodes 3, 4, and 5.
Table 13 and Table 14 and Figure 10 and Figure 11 depict the results of the experiment, which affected the original dataset only partially, which simulates the real-world case (assuming a fraud attempt, the original set would be affected only partially). In this experiment, we have changed 50% of the original dataset values to a fixed integer number 1. We have chosen other integer numbers in order to verify the probability difference shift to a particular digit. The columns in the table and graph follow the same meaning as described in Section 7.1. The selected integer number for dataset violation operation also explains the high difference between theoretical probability distribution and calculated probability values especially in the case of the 1 digit. This indicates the presence of the violation in comparison to the original unaffected dataset. We can consider this as the original dataset violation marker. However, the difference is not as high as in the case when 75% of values have changed.

7.6. Violation Operation–Affection 25% of Dataset Values

This section represents the results when a data violation affects only 25% of the original dataset values. The data violation operation is made by setting the affected values to an integer number; in our case, it was the value of 1.
Table 16 and Table 17, and Figure 12 and Figure 13 depict the results of the experiment, which affected the original dataset only partially, which simulates the real-world case (assuming a fraud attempt, the original set would be affected only partially). In this experiment, we have changed 25% of the original dataset values to a fixed integer number 1. We have chosen other integer numbers in order to verify the probability difference shift to a particular digit. The columns in the table and graph follow the same meaning as described in Section 7.1. The selected integer number for dataset violation operation also explains the high difference between theoretical probability distribution and calculated probability values especially in the case of the 1 digit. This indicates the presence of the violation in comparison to the original unaffected dataset. We can consider this as the original dataset violation marker. However, the difference is not as high (see Table 18) as in the case when 75% of values have changed.

7.7. Violation Operation–Affect Only 10% of Dataset Values

This section represents the results when a data violation affects only 10% of the original dataset values. The data violation operation is made by setting the affected values to an integer number; in our case, it was the value of 1.
Table 19 and Table 20 and Figure 14 and Figure 15 depict the results of the experiment, which affected the original dataset only partially, which simulates the real-world case (assuming a fraud attempt, the original set would be affected only partially). In this experiment, we have changed 10% of the original dataset values to a fixed integer number 1. We have chosen other integer numbers in order to verify the probability difference shift to a particular digit. The columns in the table and graph follow the same meaning as described in Section 7.1. The selected integer number for dataset violation operation also explains the high difference between theoretical probability distribution and calculated probability values especially in the case of the 1 digit. This indicates the presence of the violation in comparison to the original unaffected dataset (see Table 21). We can consider this as the original dataset violation marker. However, the difference is not as high as in the case when 75% of values have changed.
The raw measured data from electrometers are subject to secrecy due to the legal reasons valid in the Slovak Republic. In addition, the datasets are huge (they have a magnitude of more than 40,000 data samples for each of the 10 nodes under examination), and it is not possible to share the data even from one node acquired during one measurement time interval in such a limited extent within the article. However, we can provide an anonymized sample of these data in the table below—Table 22.

8. Discussion

For all of the randomly selected datasets of real-world values, we can say that they follow the first-digit probability distribution according to the BL. If there were high differences compared to the theoretical values, that particular dataset could not be used in our verification experiments because it would probably be already affected by some artificial effect. From this point of view, the random dataset selection proved that the nature of our datasets predicts the effective application of BL for fraud detection.
The data violation experiments involving some kind of arithmetic operation presented us with relatively high difference values for the first digit probability distribution, especially with peaks in distribution graphs for some of the datasets. This can be considered as a particular influence on the arithmetical operation.
For the experiment series with changing only a part of the dataset, we wanted to prove and compare the effectiveness of fraud detection by BL. We have chosen a whole range of changed dataset sizes, and we have gradually lowered this size to the most probable fraud scenario when only smaller parts of the dataset are changed. However, the larger sizes were applied for comparison reasons. Especially for 10% changed dataset values, the violation markers are not so prominent, and the marker detection algorithm should be more sensitive.
The presented experimental work can be extended in almost any direction. The random dataset selection should be given with particular rules on how to decide if the scenario is capable of fraud detection by BL. A much wider range of arithmetic operations and operands could be used. Some of these operations indicated special violation markers, and any further work could explore the possibility of detecting the violation operation given the different markers.
The partially changed dataset could involve a more refined examination of the changed dataset difference markers’ dependency on the changed dataset size. This could have a high profit for the fraud detection process, and this detection algorithm could be refined.
Finally, the application of machine learning algorithms could be useful for the fraud detection process. This possibility is discussed, e.g., in [36]. Detecting the deviations from BL distribution is a typical task for supervised kind of machine learning. During training phase, the artificial intelligence agent is trained to recognize BL and non-BL distribution datasets. Then, a pattern recognition process takes place and as a result we find the decision if the provided unknown dataset complies with BL first digit distribution.

9. Conclusions

Benford’s law is one of the methods to detect non-natural changes in data sets collected from electricity metering devices. In this paper, we tried to verify BL’s first digit probability distribution for electricity metering data sets, i.e., the data of electricity consumption. We have presented BL distribution for original dataset with no artificial intervention and a set of results for different kinds of affected datasets with artificial intervention. We also proposed further investigation directions and ideas.
We found out that, surprisingly, the datasets with a lower order of magnitude also comply with BL distribution. We also verified the datasets acquired in electricity distribution grids against BL’s first-digit probability distribution according to BL. There are some references focusing on this kind of dataset, but we have not found any that deal with this dataset’s origin to this extent. We also used specific models of original dataset intervention, as discussed in the experimental part of the article, that were never published.
The results of our research indicate that Benford’s Law (BL) can be applied for detecting data anomalies compared to the original unaffected dataset. Similar to previous studies [22,23,24,25,26,27,28,29,30,31,32,33,34], our research also confirms that the more data is manipulated, the more accurate the results become. Therefore, using BL for minor data changes is not recommended. The outcomes, as seen in previous research, would be distorted and imprecise. In previous studies, the authors also recommended augmenting the results of data analysis using BL with additional conditions that would more effectively reveal potential discrepancies with the unaltered data.
The published article and research gap are summarized below in Table 23:
In conclusion, it is important to focus on facts that have not yet been examined in the publications [24,25,26,27,28,29,30,31,32,33,34], as mentioned in the introduction. We have also performed an investigation focusing on the gaps identified in the reviewed references:
-
The data examined in this manuscript are unique as they come from an operation distribution system. Because this kind of data is not always freely accessible, they have not been extensively explored in other publications. Therefore, one of the contributions of our study is the validation of Benford’s law in this specific domain. Publication [2] focuses on the analysis of electric meter data, but it uses different methods for detecting electricity theft. However, the model presented in [2] is highly sensitive to changes in input data, whereas our results are more accurate. The accuracy of error detection can be further enhanced by additional conditions defined by the distribution company and by further investigation of the method sensitivity and accurate detection threshold determination.
-
Previous research did not focus on the impact of data sensitivity as it is in our paper. We also examined the quantity of pseudo-random numbers within the overall dataset, gradually altering 10%, 25%, 50%, and 75% of the overall dataset values. Our research results demonstrate whether and how the quantity of altered data affects the overall dataset values.
-
We also artificially modified the data in several ways, including 1. Adding +1 to dataset values; 2. Division of the dataset values by 2, 3; Multiplication of the dataset value by 2. Such diversity of changes in previous research references in the field of electricity consumption data has not yet been explored nor verified.
-
The data in our study did not always have a range of values for orders of magnitude that exceeded three. After studying various publications, the authors recommended an order of magnitude for datasets exceeding 3. In our case, this value was not always higher than three, which is again an area that has not been explored. Our research shows the possibility of using Benford’s law even with a dataset order of magnitude slightly lower than three.

Author Contributions

Conceptualization, J.P.; methodology, J.P.; software, A.H.; validation, A.H. and J.P.; formal analysis, M.P. and J.Z.; investigation, J.P. and J.Z.; resources, J.D.; data curation, J.D.; writing—J.P.; writing—J.P., M.P. and J.Z.; visualization, A.H.; supervision, J.P.; project administration, J.P.; funding acquisition, J.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Ministry of Education, Science, Research and Sport of the Slovak Republic in the framework of project KEGA No. 013TUKE-4/2021.

Data Availability Statement

Data in this paper are publicly unavailable due to privacy restrictions.

Acknowledgments

All support given during the work on this paper is covered by the author’s contribution or funding sections.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Berger, A. A basic theory of Benford’s Law. Probab. Surv. 2011, 8, 1–126. [Google Scholar] [CrossRef]
  2. Wei, L.; Sundararajan, A.; Sarwat, A.I.; Biswas, S.; Ibrahim, E. A distributed intelligent framework for electricity theft detection using benford’s law and stackelberg game. In Proceedings of the 2017 Resilience Week (RWS), Wilmington, DE, USA, 18–22 September 2017; pp. 5–11. [Google Scholar] [CrossRef]
  3. Pietronero, L.; Tosatti, E.; Tosatti, V.; Vespignani, A. Explaining the uneven distribution of numbers in nature: The laws of Benford and Zipf. Phys. A 2001, 293, 297–304. [Google Scholar] [CrossRef]
  4. Jolion, J.-M. Images and Benford’s Law. J. Math. Imaging Vis. 2001, 14, 73–81. [Google Scholar] [CrossRef]
  5. Durtschi, C.; Hillison, W.; Pacini, C. The Effective Use of Benford’s Law to Assist in Detecting Fraud in Accounting Data. J. Forensic Acc. 2004, 5, 14–34. [Google Scholar]
  6. Milano, F.; Gómez-Expósito, A. Detection of Cyber-Attacks of Power Systems through Benford’s Law. IEEE Trans. Smart Grid 2021, 12, 2741–2744. [Google Scholar] [CrossRef]
  7. Cella, R.; Zanolla, E. Benford’s Law and transparency: An analysis of municipal expenditure. Braz. Bus. Rev. 2018, 15, 331–347. [Google Scholar] [CrossRef]
  8. Hürlimann, W. Benford’s Law in Scientific Research. Int. J. Sci. Eng. Res. 2015, 6, 143–148. [Google Scholar]
  9. Burns, B. Sensitivity to statistical regularities: People (largely) follow Benford’s law. Proc. Annu. Meet. Cogn. Sci. Soc. 2009, 31, 2872–2877. [Google Scholar]
  10. Yang, Y. Evaluation and correction of electricity consumption statistics based on Benford-Zipf. In IOP Conference Series: Earth and Environmental Science; IOP Publishing: Bristol, UK, 2021; Volume 692. [Google Scholar] [CrossRef]
  11. Miller, S. Benford’s Law: Theory and Applications; Princeton University Press: Princeton, NJ, USA, 2015; p. 116. ISBN 9781400866595. [Google Scholar]
  12. Nigrini, M. A taxpayer compliance application of Benford’s Law. J. Am. Tax. Assoc. Sar. 1996, 18, 72. Available online: https://0-www-proquest-com.brum.beds.ac.uk/scholarly-journals/taxpayer-compliance-application-benfords-law/docview/211023799/se-2 (accessed on 7 July 2023).
  13. Ley, E. On the Peculiar Distribution of the U.S. Stock Indexes’ Digits. Am. Stat. 1996, 50, 311–313. [Google Scholar] [CrossRef]
  14. Raimi, R. The Peculiar Distribution of First Digits. Sci. Am. 1969, 221, 109–120. [Google Scholar] [CrossRef]
  15. Burke, J.; Kincanon, E. Benford’s law and physical constants: The distribution of initial digits. Am. J. Phys. 1991, 59, 952. [Google Scholar] [CrossRef]
  16. Ralph, A.R. The first digit problem. Am. Math. Mon. 2018, 83, 521–538. [Google Scholar] [CrossRef]
  17. Nigrini, M.J.; Miller, S. Data Diagnostics Using Second-Order Tests of Benford’s Law. Audit. J. Pract. Theory 2009, 28, 305–324. [Google Scholar] [CrossRef]
  18. Benford, F. The Law of Anomalous Numbers. Proc. Am. Philos. Soc. 1938, 78, 551–572. [Google Scholar]
  19. Koch, C.; Okamura, K. Benford’s Law and COVID-19 Reporting; SSRN Scholarly Paper ID 3586413; Social Science Research Network: Rochester, NY, USA, 2020; p. 17. [Google Scholar] [CrossRef]
  20. Farhadi, N. Can we rely on COVID-19 data? An assessment of data from over 200 countries worldwide. Sage Prog. 2021, 104, 368504211021232, Erratum in: Sci. Prog. 2021, 104, 368504211030581. [Google Scholar] [CrossRef]
  21. Berger, A.; Hill, T.P. Benford’s Law Strikes Back: No Simple Explanation in Sight for Mathematical Gem. Math. Intell. 2011, 33, 85–91. [Google Scholar] [CrossRef]
  22. Crocetti, E.; Randi, G. Using the Benford’s Law as a First Step to Assess the Quality of the Cancer Registry Data. Front. Public Health 2016, 4, 225. [Google Scholar] [CrossRef]
  23. Butgereit, L. COVID-19 New Cases Measurements and Benford’s Law with Specific Focus on South Africa. In Proceedings of the 2021 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa, 5–6 August 2021; pp. 1–5. [Google Scholar] [CrossRef]
  24. Manoochehrnia, P.; Rachidi, F.; Rubinstein, M.; Schulz, W.; Diendorfer, G. Benford’s Law and Its Application to Lightning Data. IEEE Trans. Electromagn. Compat. 2010, 52, 956–961. [Google Scholar] [CrossRef]
  25. Mansouri, E.; Mostajabi, A.; Schulz, W.; Diendorfer, G.; Rubinstein, M.; Rachidi, F. On the Use of Benford’s Law to Assess the Quality of the Data Provided by Lightning Locating Systems. Atmosphere 2022, 13, 552. [Google Scholar] [CrossRef]
  26. Sheng, G.; Li, T.; Su, Q.; Chen, B.; Tang, Y. Detection of content-aware image resizing based on Benford’s law. Soft. Comput. 2017, 21, 5693–5701. [Google Scholar] [CrossRef]
  27. Fu, D.; Shi, Y.; Su, W. A generalized Benford’s law for JPEG coefficients and its applications in image forensics. In Proceedings of the SPIE, 9th Conference on Security, Steganigraphy, and Watermarking of Multimedia Contents, San Jose, CA, USA, 29 January–1 February 2007. [Google Scholar] [CrossRef]
  28. Wells, K.; Chiverton, J.; Partridge, M.; Barry, M.; Kadhem, H.; Ott, B. Quantifying the Partial Volume Effect in PET Using Benford’s Law. IEEE Trans. Nucl. Sci. 2007, 54, 1616–1625. [Google Scholar] [CrossRef]
  29. Tošić, A.; Vičič, J. Use of Benford’s law on academic publishing networks. J. Informetr. 2021, 15, 101163. [Google Scholar] [CrossRef]
  30. Yan, X.; Yang, S.G.; Kim, B.J.; Minnhagen, P. Benford’s Law and First Letter of Word. Phys. A 2018, 512, 305–315. [Google Scholar] [CrossRef]
  31. Huang, Y.; Niu, Z.; Yang, C. Testing firm-level data quality in China against Benford’s Law. Econ. Lett. 2020, 192, 109182. [Google Scholar] [CrossRef]
  32. Parnak, A.; Baleghi, Y.; Kazemitabar, J. A Novel Forgery Detection Algorithm Based on Mantissa Distribution in Digital Images. In Proceedings of the 6th International Conference on Signal Processing and Intelligent Systems (ICSPIS), Sadjad University, Mashhad, Iran, 23–24 December 2020. [Google Scholar] [CrossRef]
  33. Souza, M.A.; Pereira JL, R.; Alves, G.O.; Oliveira, B.C.; Melo, I.D.; Garcia, P.A.N. Detection and identification of energy theft in advanced metering infrastructures. Electr. Power Syst. Res. 2020, 182, 106258. [Google Scholar] [CrossRef]
  34. Kossovsky, A.E. On the Mistaken Use of the Chi-Square Test in Benford’s Law. Stats 2021, 4, 419–453. [Google Scholar] [CrossRef]
  35. Lepolesa, L.J.; Achari, S.; Cheng, L. Electricity Theft Detection in Smart Grids Based on Deep Neural Network. IEEE Access 2022, 10, 39638–39655. [Google Scholar] [CrossRef]
  36. Orozco, E.; Qi, R.; Zheng, J. Feature Engineering for Semi-supervised Electricity Theft Detection in AMI. In Proceedings of the 2023 IEEE Green Technologies Conference (GreenTech), Denver, CO, USA, 19–21 April 2023; pp. 128–133. [Google Scholar] [CrossRef]
Figure 1. Methodology flowchart.
Figure 1. Methodology flowchart.
Mathematics 11 03863 g001
Figure 2. Comparison of probability distribution before and after violation operation–division by two.
Figure 2. Comparison of probability distribution before and after violation operation–division by two.
Mathematics 11 03863 g002
Figure 3. Comparison of probability distribution before and after violation operation–adding integer number.
Figure 3. Comparison of probability distribution before and after violation operation–adding integer number.
Mathematics 11 03863 g003
Figure 4. Comparison of probability distribution before and after violation operation–adding integer number.
Figure 4. Comparison of probability distribution before and after violation operation–adding integer number.
Mathematics 11 03863 g004
Figure 5. Comparison of probability distribution before and after violation operation–adding an integer number.
Figure 5. Comparison of probability distribution before and after violation operation–adding an integer number.
Mathematics 11 03863 g005
Figure 6. Comparison of probability distribution before and after violation operation–multiplying by integer number.
Figure 6. Comparison of probability distribution before and after violation operation–multiplying by integer number.
Mathematics 11 03863 g006
Figure 7. Comparison of probability distribution before and after violation operation–adding integer number.
Figure 7. Comparison of probability distribution before and after violation operation–adding integer number.
Mathematics 11 03863 g007
Figure 8. Comparison of probability distribution before and after violation operation–affecting 75% of dataset values.
Figure 8. Comparison of probability distribution before and after violation operation–affecting 75% of dataset values.
Mathematics 11 03863 g008
Figure 9. Comparison of probability distribution before and after violation operation–affecting 75% of dataset values.
Figure 9. Comparison of probability distribution before and after violation operation–affecting 75% of dataset values.
Mathematics 11 03863 g009
Figure 10. Comparison of probability distribution before and after violation operation–affecting 50% of dataset values.
Figure 10. Comparison of probability distribution before and after violation operation–affecting 50% of dataset values.
Mathematics 11 03863 g010
Figure 11. Comparison of probability distribution before and after violation operation–affecting 50% of dataset values.
Figure 11. Comparison of probability distribution before and after violation operation–affecting 50% of dataset values.
Mathematics 11 03863 g011
Figure 12. Comparison of probability distribution before and after violation operation–affecting 25% of dataset values.
Figure 12. Comparison of probability distribution before and after violation operation–affecting 25% of dataset values.
Mathematics 11 03863 g012
Figure 13. Comparison of probability distribution before and after violation operation–affecting 50% of dataset values.
Figure 13. Comparison of probability distribution before and after violation operation–affecting 50% of dataset values.
Mathematics 11 03863 g013
Figure 14. Comparison of probability distribution before and after violation operation–affecting 10% of dataset values.
Figure 14. Comparison of probability distribution before and after violation operation–affecting 10% of dataset values.
Mathematics 11 03863 g014
Figure 15. Comparison of probability distribution before and after violation operation–affecting 50% of dataset values.
Figure 15. Comparison of probability distribution before and after violation operation–affecting 50% of dataset values.
Mathematics 11 03863 g015
Table 1. Node No. 1 without and with violation operations.
Table 1. Node No. 1 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
113,60531.151330.10301.048323.40756.6955
2594313.607617.60914.001524.08306.4739
342809.799912.49392.694012.68260.1887
4651814.92429.69105.23328.67561.0154
540009.15887.91811.240631.151323.2331
637808.65506.69471.96040.00006.6947
717594.02765.79921.77160.00005.7992
823705.42665.11530.31130.00005.1153
914193.24914.57571.32670.00004.5757
Table 2. Node No. 2 without and with violation operations.
Table 2. Node No. 2 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
111,84727.137830.10302.96524.858525.2445
2593213.588417.60914.020827.12479.5156
3505411.577112.49390.916713.58181.0880
4458710.50749.69100.816411.57161.8806
541089.41017.91811.492010.50232.5842
636148.27856.69471.58399.40562.7109
735988.24195.79922.442725.16554.9375
828146.44605.11531.330719.91752.3084
921014.81274.57570.237016.52044.0266
Table 3. Nodes No. 3, No. 4, and No. 5—the difference between original and affected dataset.
Table 3. Nodes No. 3, No. 4, and No. 5—the difference between original and affected dataset.
DigitNode.
No. 3
Violation Delta
%
Node.
No. 4
Violation Delta
%
Node.
No. 5
Violation Delta
%
13.31581.87011.8937
27.38840.86837.4681
35.75798.39410.6547
42.59722.11090.6062
529.418229.469916.5620
66.69476.69476.6947
75.79925.79925.7992
85.11535.11535.1153
94.57574.57574.5757
Table 4. Node No. 1 without and with violation operations.
Table 4. Node No. 1 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
113,60531.151330.10301.04833.253526.8495
2594313.607617.60914.001531.149813.5407
342809.799912.49392.694013.60701.1131
4651814.92429.69105.23329.79940.1084
540009.15887.91811.240614.92357.0054
637808.65506.69471.96049.15832.4637
717594.02765.79921.77168.65462.8554
823705.42665.11530.31134.02741.0879
914193.24914.57571.32675.42630.8506
Table 5. Node No. 2 without and with violation operations.
Table 5. Node No. 2 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
111,84727.137830.10302.96524.858525.2445
2593213.588417.60914.020827.12479.5156
3505411.577112.49390.916713.58181.0880
4458710.50749.69100.816411.57161.8806
541089.41017.91811.492010.50232.5842
636148.27856.69471.58399.40562.7109
735988.24195.79922.44278.27462.4754
828146.44605.11531.33078.23793.1227
921014.81274.57570.23706.44291.8671
Table 6. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
Table 6. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
DigitNode.
No. 3
Violation Delta
%
Node.
No. 4
Violation Delta
%
Node.
No. 5
Violation Delta
%
127.650928.255325.5353
219.727219.74556.5140
311.89256.09534.5017
40.65860.07241.1113
50.99217.79999.1095
63.40003.95180.9892
71.58863.26002.2304
82.58983.55830.1881
95.26035.45721.2673
Table 7. Node No. 1 without and with violation operations.
Table 7. Node No. 1 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
113,60531.151330.10301.048330.5170.414
2594313.607617.60914.001531.15113.542
342809.799912.49392.69400.00012.494
4651814.92429.69105.233213.6083.917
540009.15887.91811.24060.0007.918
637808.65506.69471.96049.8003.105
717594.02765.79921.77160.0005.799
823705.42665.11530.311314.9249.809
914193.24914.57571.32670.0004.576
Table 8. Node No. 2 without and with violation operations.
Table 8. Node No. 2 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
111,84727.137830.10302.965237.18937.0863
2593213.588417.60914.020827.13789.5287
3505411.577112.49390.91670.000012.4939
4458710.50749.69100.816413.58843.8974
541089.41017.91811.49200.00007.9181
636148.27856.69471.583911.57714.8825
735988.24195.79922.44270.00005.7992
828146.44605.11531.330710.50745.3921
921014.81274.57570.23700.00004.5757
Table 9. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
Table 9. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
DigitNode.
No. 3
Violation Delta
%
Node.
No. 4
Violation Delta
%
Node.
No. 5
Violation Delta
%
127.650928.255325.5353
219.727219.74556.5140
311.89256.09534.5017
40.65860.07241.1113
50.99217.79999.1095
63.40003.95180.9892
71.58863.26002.2304
82.58983.55830.1881
95.26035.45721.2673
Table 10. Node No. 1 without and with violation operations.
Table 10. Node No. 1 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
113,60531.151330.10301.04834.412025.6910
2594313.607617.60914.001588.607070.9979
342809.799912.49392.69401.236411.2575
4651814.92429.69105.23322.33317.3579
540009.15887.91811.24060.89527.0229
637808.65506.69471.96040.93645.7582
717594.02765.79921.77160.42365.3756
823705.42665.11530.31130.69834.4169
914193.24914.57571.32670.45794.1178
Table 11. Node No. 2 without and with violation operations.
Table 11. Node No. 2 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
111,84727.137830.10302.96524.892825.2102
2593213.588417.60914.02082.054715.5544
3505411.577112.49390.91672.171510.3224
4458710.50749.69100.81642.31817.3729
541089.41017.91811.49202.26095.6573
636148.27856.69471.58392.16924.5254
735988.24195.79922.44272.38913.4101
828146.44605.11531.33071.89663.2186
921014.81274.57570.237079.847075.2712
Table 12. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
Table 12. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
DigitNode.
No. 3
Violation Delta
%
Node.
No. 4
Violation Delta
%
Node.
No. 5
Violation Delta
%
122.760320.610125.4483
212.709413.949414.2320
39.849410.47169.9227
47.64416.19614.2807
56.81457.10056.1391
65.35075.92295.0050
75.02535.27024.6887
82.72262.68303.8171
95.26035.457273.5335
Table 13. Node No. 1 without and with violation operations.
Table 13. Node No. 1 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
113,60531.151330.10301.048381.149851.0468
2594313.607617.60914.00153.805313.8038
342809.799912.49392.69402.278110.2157
4651814.92429.69105.23324.08465.6064
540009.15887.91811.24062.95594.9623
637808.65506.69471.96042.13394.5608
717594.02765.79921.77161.05784.7414
823705.42665.11530.31131.47683.6385
914193.24914.57571.32671.05783.5180
Table 14. Node No. 2 without and with violation operations.
Table 14. Node No. 2 without and with violation operations.
DigitNumber of valuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
111,84727.137830.10302.965216.250113.8529
2593213.588417.60914.02085.605312.0038
3505411.577112.49390.91674.64557.8484
4458710.50749.69100.81644.18055.5105
541089.41017.91811.49203.74304.1751
636148.27856.69471.58393.43153.2632
735988.24195.79922.44274.01331.7859
828146.44605.11531.33073.29401.8212
921014.81274.57570.237054.836850.2610
Table 15. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
Table 15. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
DigitNode.
No. 3
Violation Delta
%
Node.
No. 4
Violation Delta
%
Node.
No. 5
Violation Delta
%
113.132612.364817.8697
25.43779.11129.5223
37.61938.31257.5072
46.03220.61800.4777
56.20786.51364.4013
64.59515.37042.8734
74.62234.90343.4798
80.22930.02432.4021
947.876447.218248.5335
Table 16. Node No. 1 without and with violation operations.
Table 16. Node No. 1 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
113,60531.151330.10301.048356.152426.0494
2594313.607617.60914.00158.92068.6885
342809.799912.49392.69405.01907.4749
4651814.92429.69105.23328.00931.6817
540009.15887.91811.24066.77291.1452
637808.65506.69471.96046.32180.3728
717594.02765.79921.77162.83232.9668
823705.42665.11530.31133.72531.3899
914193.24914.57571.32672.24622.3296
Table 17. Node No. 2 without and with violation operations.
Table 17. Node No. 2 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
111,84727.137830.10302.965222.02508.0780
2593213.588417.60914.02089.74927.8600
3505411.577112.49390.91678.15494.3390
4458710.50749.69100.81647.38522.3058
541089.41017.91811.49206.48261.4355
636148.27856.69471.58395.76110.9336
735988.24195.79922.44275.93750.1383
828146.44605.11531.33074.67990.4354
921014.81274.57570.237029.824825.2490
Table 18. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
Table 18. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
DigitNode.
No. 3
Violation Delta
%
Node.
No. 4
Violation Delta
%
Node.
No. 5
Violation Delta
%
13.89642.333011.6512
20.40065.25495.8590
35.56566.64335.1832
43.89154.12303.6184
55.25995.80751.9560
63.36794.72850.0984
73.92864.61671.9344
83.43413.05440.4697
922.876422.206623.5335
Table 19. Node No. 1 without and with violation operations.
Table 19. Node No. 1 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
113,60531.151330.10301.048341.150311.0473
2594313.607617.60914.001511.76905.8401
342809.799912.49392.69407.95214.5418
4651814.92429.69105.233212.09422.4032
540009.15887.91811.24068.26580.3477
637808.65506.69471.96047.77811.0834
717594.02765.79921.77163.55362.2456
823705.42665.11530.31134.62520.4901
914193.24914.57571.32672.81171.7640
Table 20. Node No. 2 without and with violation operations.
Table 20. Node No. 2 without and with violation operations.
DigitNumber of ValuesNumber of Values in %BLDelta %Violation
%
Violation Delta
%
111,84727.137830.10302.965224.93645.1666
2593213.588417.60914.020811.78565.8235
3505411.577112.49390.916710.27602.2178
4458710.50749.69100.81649.36430.3267
541089.41017.91811.49208.26710.3490
636148.27856.69471.58397.39660.7020
735988.24195.79922.44277.40581.6066
828146.44605.11531.33075.75190.6367
921014.81274.57570.237014.816210.2404
Table 21. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
Table 21. Nodes No. 3, No. 4, and No. 5—difference between original and affected dataset.
DigitNode.
No. 3
Violation Delta
%
Node.
No. 4
Violation Delta
%
Node.
No. 5
Violation Delta
%
13.16702.88518.6377
24.35261.33172.5374
34.44143.95752.6322
43.46565.24366.1621
54.97605.38590.6718
62.93754.30220.8825
73.58064.32341.3039
84.00653.98020.1569
97.87507.19188.5815
Table 22. Anonymized sample of the raw power consumption data in node No. 1—a distributing transformer 22/0.4 kV.
Table 22. Anonymized sample of the raw power consumption data in node No. 1—a distributing transformer 22/0.4 kV.
TimestampPower [kW]
1 January 2021 00:15:00142.800
1 January 2021 00:30:00150.400
1 January 2021 00:45:00146.000
1 January 2021 01:00:00129.600
1 January 2021 01:15:00138.000
1 January 2021 01:30:00126.400
1 January 2021 01:45:00124.800
1 January 2021 02:00:00123.600
1 January 2021 02:15:00119.600
Table 23. Contributions and research gaps.
Table 23. Contributions and research gaps.
Published Article ContributionsResearch Gap
BL is a suitable method for original dataset unnatural alterationOnly a minimal amount of research was performed to validate BL for electricity consumption data
Articles propose algorithms that identify problematic data and estimate overall electricity consumption through limited datasetsDataset magnitude determination for applicability of BL
BL validity for datasets in different science areasExperimental research gap for electricity theft detection methods. The lack of sensitivity verification affects different amounts of data in the recorded dataset. The lack of BL validity verification affects different types of alteration operators.
One of the basic requirements for datasets to comply with Benford’s Law is the value of the order of magnitude is higher than 3Verification gap for this requirement in electricity consumption data, where this order of magnitude is often lower than 3.
References provide some simulation tests for altered datasets and the detection of these alterationsNo reference tests the sensitivity and alteration detection threshold in combination with different alteration operations.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Petráš, J.; Pavlík, M.; Zbojovský, J.; Hyseni, A.; Dudiak, J. Benford’s Law in Electric Distribution Network. Mathematics 2023, 11, 3863. https://0-doi-org.brum.beds.ac.uk/10.3390/math11183863

AMA Style

Petráš J, Pavlík M, Zbojovský J, Hyseni A, Dudiak J. Benford’s Law in Electric Distribution Network. Mathematics. 2023; 11(18):3863. https://0-doi-org.brum.beds.ac.uk/10.3390/math11183863

Chicago/Turabian Style

Petráš, Jaroslav, Marek Pavlík, Ján Zbojovský, Ardian Hyseni, and Jozef Dudiak. 2023. "Benford’s Law in Electric Distribution Network" Mathematics 11, no. 18: 3863. https://0-doi-org.brum.beds.ac.uk/10.3390/math11183863

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop