Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.6.13

Detection and Trust Evaluation of the SGN Malicious node  

Al Yahmadi, Faisal (Military Technological College)
Ahmed, Muhammad R (Military Technological College)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.6, 2021 , pp. 89-100 More about this Journal
Abstract
Smart Grid Network (SGN) is a next generation electrical power network which digitizes the power distribution grid and achieves smart, efficient, safe and secure operations of the electricity. The backbone of the SGN is information communication technology that enables the SGN to get full control of network station monitoring and analysis. In any network where communication is involved security is essential. It has been observed from several recent incidents that an adversary causes an interruption to the operation of the networks which lead to the electricity theft. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we have introduced a machine learning based SVM method that detects malicious nodes in a smart grid network. The algorithm collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) classifies nodes into Normal or malicious nodes giving the statues of 1 for normal nodes and status of -1 for malicious -abnormal-nodes. Once the malicious nodes have been detected, we have done a trust evaluation based on the nodes history and recorded data. In the simulation, we have observed that our detection rate is almost 98% where the false alarm rate is only 2%. Moreover, a Trust value of 50 was achieved. As a future work, countermeasures based on the trust value will be developed to solve the problem remotely.
Keywords
Smart Grid Networks; Security; Malicious; Attacks; Support Vector Machine; turst evaluation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Q. Pu et al., "Detection Mechanism of FDI Attack Feature Based on Deep Learning," in 2018 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Oct. 2018, pp. 1761-1765. doi: 10.1109/SmartWorld.2018.00297.   DOI
2 S. P. Nandanoori, S. Kundu, S. Pal, K. Agarwal, and S. Choudhury, "Model-Agnostic Algorithm for Real-Time Attack Identification in Power Grid using Koopman Modes," in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Nov. 2020, pp. 1-6. doi: 10.1109/SmartGridComm47815.2020.9303022.   DOI
3 J. Sullivan, "Neural Network from Scratch: Perceptron Linear Classifier," John Sullivan, Aug. 16, 2017. https://jtsulliv.github.io/perceptron/ (accessed Jan. 13, 2021).
4 "Bill Calculator." https://mzec.nama.om/enus/Pages/billcalculator.aspx (accessed Mar. 19, 2021).
5 Y. S. Patil and S. V. Sankpal, "EGSP: Enhanced Grid Sensor Placement Algorithm for Energy Theft Detection in Smart Grids," in 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), Mar. 2019, pp. 1-5. doi: 10.1109/I2CT45611.2019.9033759.   DOI
6 A. Sanjab, W. Saad, I. Guvenc, A. Sarwat, and S. Biswas, "Smart Grid Security: Threats, Challenges, and Solutions," arXiv:1606.06992 [cs, math], Jun. 2016, Accessed: Mar. 06, 2021. [Online]. Available: http://arxiv.org/abs/1606.06992
7 A. Takiddin, M. Ismail, U. Zafar, and E. Serpedin, "Robust Electricity Theft Detection Against Data Poisoning Attacks in Smart Grids," IEEE Transactions on Smart Grid, pp. 1-1, 2020, doi: 10.1109/TSG.2020.3047864.   DOI
8 J. Jiang and Y. Qian, "Defense Mechanisms against Data Injection Attacks in Smart Grid Networks," IEEE Communications Magazine, vol. 55, no. 10, pp. 76-82, Oct. 2017, doi: 10.1109/MCOM.2017.1700180.   DOI
9 L. Zhang, X. Shen, F. Zhang, M. Ren, B. Ge, and B. Li, "Anomaly Detection for Power Grid Based on Time Series Model," in 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Aug. 2019, pp. 188-192. doi: 10.1109/CSE/EUC.2019.00044.   DOI
10 X. Xia, Y. Xiao, W. Liang, and M. Zheng, "GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids," IEEE Transactions on Network Science and Engineering, vol. 7, no. 2, pp. 805-816, Apr. 2020, doi: 10.1109/TNSE.2018.2855139.   DOI
11 Y. He, G. J. Mendis, and J. Wei, "Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism," IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2505-2516, Sep. 2017, doi: 10.1109/TSG.2017.2703842.   DOI
12 "Figure 1. Graphical presentation of the support vector machine...," ResearchGate. https://www.researchgate.net/figure/Graphicalpresentation-of-the-support-vector-machine-classifier-with-a-non-linear-kernel_fig1_299529384 (accessed Jan. 13, 2021).
13 ETV 2 NITTTRCHD, Cyber Security in Smart Grid: Overview Session 1 Module 15 by Janorious Rabeela, (Jan. 04, 2019). Accessed: Feb. 16, 2021. [Online Video]. Available: https://www.youtube.com/watch?v=bvGrh7lITeE
14 M. Jouini, L. B. A. Rabai, and A. B. Aissa, "Classification of Security Threats in Information Systems," Procedia Computer Science, vol. 32, pp. 489-496, Jan. 2014, doi: 10.1016/j.procs.2014.05.452.   DOI
15 E. Drayer and T. Routtenberg, "Detection of False Data Injection Attacks in Smart Grids Based on Graph Signal Processing," IEEE Systems Journal, vol. 14, no. 2, pp. 1886-1896, Jun. 2020, doi: 10.1109/JSYST.2019.2927469.   DOI
16 X. Xia, Y. Xiao, and W. Liang, "ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid," IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 445-458, Feb. 2019, doi: 10.1109/TIFS.2018.2854703.   DOI
17 W. Zhe, C. Wei, and L. Chunlin, "DoS attack detection model of smart grid based on machine learning method," in 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), Jul. 2020, pp. 735-738. doi: 10.1109/ICPICS50287.2020.9202401.   DOI
18 S. S. Keerthi and C.-J. Lin, "Asymptotic Behaviors of Support Vector Machines with Gaussian Kernel," Neural Computation, vol. 15, no. 7, pp. 1667-1689, Jul. 2003, doi: 10.1162/089976603321891855.   DOI
19 C. Kaygusuz, L. Babun, H. Aksu, and A. S. Uluagac, "Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques," in 2018 IEEE International Conference on Communications (ICC), May 2018, pp. 1-6. doi: 10.1109/ICC.2018.8423022.   DOI
20 S. Tan, W. Song, M. Stewart, J. Yang, and L. Tong, "Online Data Integrity Attacks Against Real-Time Electrical Market in Smart Grid," IEEE Transactions on Smart Grid, vol. 9, no. 1, pp. 313-322, Jan. 2018, doi: 10.1109/TSG.2016.2550801.   DOI
21 G. C. Calafiore and L. E. Ghaoui, Optimization Models. Cambridge University Press, 2014.
22 R. Grosse, "Lecture 3: Linear Classification," p. 10.
23 "Pages - Home." https://mzec.nama.om/enus/Pages/home.aspx (accessed Mar. 19, 2021).
24 F. Aloul, A. R. Al-Ali, R. Al-Dalky, M. Al-Mardini, and W. El-Hajj, "Smart Grid Security: Threats, Vulnerabilities and Solutions," SGCE, pp. 1-6, 2012, doi: 10.12720/sgce.1.1.1-6.
25 "Fig. 4. SVM classification with a hyperplane that maximizes the...," ResearchGate. https://www.researchgate.net/figure/SVM-classificationwith-a-hyperplane-that-maximizes-the-separating-margin-between-the-two_fig3_221926953 (accessed Jan. 13, 2021).
26 N. Cristianini, J. Shawe-Taylor, and D. of C. S. R. H. J. Shawe-Taylor, An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge University Press, 2000.
27 M. Uma and G. Padmavathi, "A Survey on Various Cyber Attacks and Their Classification," p. 7, 2013.
28 D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. Rohde, "Protecting Smart Grid Automation Systems Against Cyberattacks," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 782-795, Dec. 2011, doi: 10.1109/TSG.2011.2159999.   DOI