Browse > Article
http://dx.doi.org/10.3837/tiis.2021.06.013

Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid  

Prasanna Srinivasan, V (Department of Information Technology, R.M.D Engineering College)
Balasubadra, K (Department of Information Technology, R.M.D Engineering College)
Saravanan, K (Department of Information Technology, R.M.D Engineering College)
Arjun, V.S (Montreal Institute of Learning Algorithm (MILA))
Malarkodi, S (Photon Infotech)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.6, 2021 , pp. 2168-2187 More about this Journal
Abstract
The smart grid replaces the traditional power structure with information inventiveness that contributes to a new physical structure. In such a field, malicious information injection can potentially lead to extreme results. Incorrect, FDI attacks will never be identified by typical residual techniques for false data identification. Most of the work on the detection of FDI attacks is based on the linearized power system model DC and does not detect attacks from the AC model. Also, the overwhelming majority of current FDIA recognition approaches focus on FDIA, whilst significant injection location data cannot be achieved. Building on the continuous developments in deep learning, we propose a Deep Learning based Locational Detection technique to continuously recognize the specific areas of FDIA. In the development area solver gap happiness is a False Data Detector (FDD) that incorporates a Convolutional Neural Network (CNN). The FDD is established enough to catch the fake information. As a multi-label classifier, the following CNN is utilized to evaluate the irregularity and cooccurrence dependency of power flow calculations due to the possible attacks. There are no earlier statistical assumptions in the architecture proposed, as they are "model-free." It is also "cost-accommodating" since it does not alter the current FDD framework and it is only several microseconds on a household computer during the identification procedure. We have shown that ANN-MLP, SVM-RBF, and CNN can conduct locational detection under different noise and attack circumstances through broad experience in IEEE 14, 30, 57, and 118 bus systems. Moreover, the multi-name classification method used successfully improves the precision of the present identification.
Keywords
Deep learning; False Data Injection Attack; Internet of Things; Machine learning; Multi-label Classification; Power System; Smart grid;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Deng, G. Xiao, R. Lu, H. Liang, and A.V. Vasilakos, "False data injection on state estimation in power systems-Attacks, impacts, and defense: A survey," IEEE Transaction on Industrial Information, 13(2), pp. 411-423, 2016.
2 Feng, X., Hui, H., Liang, Z., Guo, W., Que, H., Feng, H. & Ding, Y., "A Novel Electricity Theft Detection Scheme Based on Text Convolutional Neural Networks," Energies, 13(21), 5758, 2020.   DOI
3 Q. Yang, J. Yang, W. Yu, D. An, N. Zhang, and W. Zhao, "On false data-injection attacks against power system state estimation: Modeling and countermeasures," IEEE Transactions on Parallel Distributed Systems, 25(3), pp. 717-729, 2013.   DOI
4 Z. Chen, W. Hu, J. Wang, S. Zhao, B. Amos, G. Wu, and D. Siewiorek, "An empirical study of latency in an emerging class of edge computing applications for wearable cognitive assistance," in Proc. of the Second ACM/IEEE Symposium on Edge Computing, pp. 1-14, 2017.
5 D.W. Roop, "Power system SCADA and smart grids [book reviews]," IEEE Power and Energy Magazine, 14(1), pp. 115-116, ISBN 9780367658847, 2015.   DOI
6 V. Kekatos, G.B. Giannakis, "Distributed robust power system state estimation," IEEE Transaction on Power Systems, 28(2), pp. 1617-1626, 2012.   DOI
7 S. Gao, L. Xie, "Solar-Lezama, A., Serpanos, D., &Shrobe, H. "Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems," in Proc. of 2015 54th IEEE conference on decision and control (CDC), pp. 2613-2620, 2015.
8 Rashid, M. M., Kamruzzaman, J., Hassan, M. M., Imam, T., & Gordon, S., "Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques," International Journal of Environmental Research and Public Health, 17(24), 9347, 2020.   DOI
9 F. Li, R. Xie, B. Yang, L. Guo, P. Ma, J. Shi, and W. Song, "Detection and identification of cyber and physical attacks on distribution power grids with pvs: An online high-dimensional data-driven approach," IEEE Journal of Emerging and Selected Topicsin Power Electronics, 2019.
10 S.A. Foroutan, and F.R. Salmasi, "Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method," IET Cyber-Physical Systems: Theory & Applications, 2(4), pp. 161-171, 2017.   DOI
11 T.L. Lin, T.L. Ding, C.Y. Fan, and W.C. Chen, "Error concealment algorithm based on sparse optimization," Multimedia Tools and Applications, 76(1), pp. 397-413, 2017.   DOI
12 M. Ganjkhani, S.N. Fallah, S. Badakhshan, S. Shamshirband, and K.W. Chau, "A novel detection algorithm to identify false data injection attacks on power system state estimation," Energies, 12(11), pp. 2209, 2019.   DOI
13 Q. Yang, D. Li, W. Yu, Y. Liu, D. An, X. Yang, and J. Lin, "Toward data integrity attacks against optimal power flow in smart grid," IEEE Internet of Things Magazine, 4(5), pp. 1726-1738, 2017.   DOI
14 D. Xue, X. Jing, and H. Liu, "Detection of false data injection attacks in smart grid utilizing ELM-based OCON framework," IEEE Access, 7, pp. 31762-31773, 2019.   DOI
15 X. Cheng, Y. Zhang, Y. Chen, Y. Wu, and Y. Yue, "Pest identification via deep residual learning in complex background," Computers and Electronics in Agriculture, 141, pp. 351-356, 2017.   DOI
16 Yang, J., Xi, M., Jiang, B., Man, J., Meng, Q., & Li, B., "FADN: Fully connected attitude detection network based on industrial video," IEEE Transactions on Industrial Informatics, 17(3), 2011-2020, 2020.
17 G. Liang, J. Zhao, F. Luo, S.R. Weller, and Z.Y. Dong, "A review of false data injection attacks against modern power systems," IEEE Transactions on Smart Grid, 8(4), pp. 1630-1638, 2016.   DOI
18 R. Xu, R. Wang, Z. Guan, L. Wu, J. Wu, and X. Du, "Achieving efficient detection against false data injection attacks in smart grid," IEEE Access, 5, pp.13787-13798, 2017.   DOI
19 Chandel, P., & Thakur, T., "Smart Meter Data Analysis for Electricity Theft Detection using Neural Networks," Advances in Science, Technology and Engineering Systems Journal, 4(4), 161-168, 2019.   DOI
20 J. Fan, Y. Khazbak, J. Tian, T. Liu, and G. Cao, "Mitigating stealthy false data injection attacks against state estimation in smart grid," in Proc. of 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1-9, 2018.
21 S. Tripathi, and S. De, "Data-driven optimizations in IoT: A new frontier of challenges and opportunities," CSI Transactions on ICT, 7(1), pp. 35-43, 2019.   DOI
22 D. Ding, Q.L. Han, Y. Xiang, X. Ge, X.M. Zhang, "A survey on security control and attack detection for industrial cyber-physical systems," Neurocomputing, 275, pp. 1674-1683, 2018.   DOI
23 G. Gui, H. Pan, Z. Lin, Y. Li, and Z. Yuan, "Data-driven support vector machine with optimization techniques for structural health monitoring and damage detection," KSCE Journal of Civil Engineering, 21(2), pp.523-534, 2017.   DOI
24 G. Liang, S.R. Weller, J. Zhao, F. Luo, and Z.Y. Dong, "The 2015 Ukraine Blackout: Implications for false data injection attacks," IEEE Transactions on Power Systems, 32(4), pp. 3317-3318, 2016.   DOI
25 J. Sakhnini, H. Karimipour, and A. Dehghantanha, "Smart grid cyber-attacks detection using supervised learning and heuristic feature selection," in Proc. of 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), pp. 108-112, 2019.
26 K. Gopalakrishnan, S.K. Khaitan, A. Choudhary, A. Agrawal, "Deep convolutional neural networks with transfer learning for computer vision-based data-driven pavement distress detection," Construction and Building Materials, 157, pp. 322-330, 2017.   DOI
27 A. Ashok, M. Govindarasu, and V. Ajjarapu, "Online detection of stealthy false data injection attacks in power system state estimation," IEEE Transactions on Smart Grid, 9(3), pp. 1636-1646, 2016.   DOI
28 G. Liang, J. Zhao, F. Luo, S.R. Weller, and Z.Y. Dong, "A review of false data injection attacks against modern power systems," IEEE Transactions on Smart Grid, 8(4), pp.1630-1638, 2016.   DOI
29 G. Folino, and P. Sabatino, "Ensemble based collaborative and distributed intrusion detection systems: A survey," Journal of Network and Computer Applications, 66, pp. 1-16, 2016.   DOI
30 G. Xu, M. Liu, Z. Jiang, W. Shen, and C. Huang, "Online fault diagnosis method based on transfer convolutional neural networks," IEEE Transactions on Instrumentation Measurement, 69(2),pp. 509-520, 2019.   DOI
31 P. Liu, P. Yang, W.Z. Song, Y. Yan, and X.Y. Li, "Real-time identification of rogue WiFi connections using environment-independent physical features," in Proc. of IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 190-198, 2019.
32 L. Zhang, G. Wang, and G.B. Giannakis, "Real-time power system state estimation and forecasting via deep unrolled neural networks," IEEE Transactions on Signal Processing, 67(15), pp. 4069-4077, 2019.   DOI
33 Guevara, L., & Auat Cheein, F., "The Role of 5G Technologies: Challenges in Smart Cities and Intelligent Transportation Systems," Sustainability, 12(16), 6469, 2020.   DOI
34 T. Zhou, D. Peng, C. Xu, W. Zhang, and J. Shen, "Adaptive particle filter based on Kullback-Leibler distance for underwater terrain aided navigation with multi-beam sonar," IET Radar Sonar Navigation, 12(4), pp. 433-441, 2018.   DOI
35 X. Wang, X. Luo, Y. Zhang, and X. Guan, "Detection and isolation of false data injection attacks in smart grids via nonlinear interval observer," IEEE Internet of Things Magazine, 6(4), pp. 6498-6512, 2019.   DOI
36 R. Xu, R. Wang, Z. Guan, L. Wu, J. Wu, and X. Du, "Achieving efficient detection against false data injection attacks in smart grid," IEEE Access, 5, pp. 13787-13798, 2017.   DOI
37 B. Li, T. Ding, C. Huang, J. Zhao, Y. Yang, and Y. Chen, "Detecting False Data Injection Attacks Against Power System State Estimation with Fast Go-Decomposition Approach," IEEE Transactions on Industrial Information, 15(5), pp. 2892-2904, 2018.
38 G. Liang, S.R. Weller, F. Luo, J. Zhao, and Z.Y. Dong, "Generalized FDIA-based cyber topology attack with application to the Australian electricity market trading mechanism," IEEE Transactions on Smart Grid, 9(4), pp. 3820-3829, 2017.   DOI