Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach
Abstract
:1. Introduction
1.1. Related Works and Research Gaps Analysis
1.2. Contributions
- Feature engineering: this paper proposes robust data engineering based on two different stages of image segmentation and feature extraction from data created by transferring the measurements obtained from PMUs to pseudo-colored images. Both data engineering stages include a variety of data processing steps, ranging from different denoising algorithms to outlier removals, scaling, and extraction techniques. The final result of the feature engineering phase will be very relevant, meaningful, and clean data, ready to feed deep learning algorithms. By “robust” data engineering, we refer to the set of algorithmic steps followed to ensure the resilience of the monitoring system against highly dynamic data. In other words, environmental conditions, physical conditions, and adverse disturbances in the system can cause non-stationary noise, distortions, and masking patterns in the data. In this case, the “robustness” of the feature engineering pipeline is taken into account to mitigate/eliminate these outliers. Compared to previous work that depends on automatic deep learning processing, this work introduces additional a priori steps of data abstraction, which simplifies its processing by future learning models.
- Data unavailability and drift: data employed in this case reflect the actual conditions of imbalance and scarcity of specific class patterns, and are also subject to huge data changes. A balancing approach based on the synthetic minority over-sampling technique and adaptive learning algorithms based on a long-term memory network is involved.
- Data complexity: data complexity is first targeted by the designed robust feature engineering, then by the deep learning architecture of non-linear abstractions.
- Attack mitigation experiments: multiple scenarios were built on data used to create similar attacks with different procedures, emulating real cases of false data injection where the model can be evaluated in both attack and non-attack scenarios.
1.3. Outlines
2. Data Engineering and Attack Design
2.1. Dataset Description
2.2. Adversarial Attack Design
2.2.1. Untargeted Adversarial Attack Design
2.2.2. Targeted Adversarial Attack Design
2.3. Dataset Processing
3. Methods, Experiments, and Results Discussion
3.1. Methods
3.2. Experimental Scenarios
3.3. Results and Discussion
4. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Vahidi, S.; Ghafouri, M.; Au, M.; Kassouf, M.; Mohammadi, A.; Debbabi, M. Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities. IEEE Commun. Surv. Tutor. 2023, 25, 1294–1335. [Google Scholar] [CrossRef]
- Bu, S.; Meegahapola, L.G.; Wadduwage, D.P.; Foley, A.M. Stability and Dynamics of Active Distribution Networks (ADNs) with D-PMU Technology: A Review. IEEE Trans. Power Syst. 2022, 38, 2791–2804. [Google Scholar] [CrossRef]
- Berghout, T.; Benbouzid, M.; Muyeen, S.M. Machine Learning for Cybersecurity in Smart Grids: A Comprehensive Review-Based Study on Methods, Solutions, and Prospects. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100547. [Google Scholar] [CrossRef]
- Inayat, U.; Zia, M.F.; Mahmood, S.; Berghout, T.; Benbouzid, M. Cybersecurity Enhancement of Smart Grid: Attacks, Methods, and Prospects. Electronics 2022, 11, 3854. [Google Scholar] [CrossRef]
- Baba, M.; Nor, N.B.M.; Sheikh, A.; Nowakowski, G.; Masood, F.; Rehman, M.; Irfan, M.; Arefin, A.A.; Kumar, R.; Momin, B. A Review of the Importance of Synchrophasor Technology, Smart Grid, and Applications. Bull. Pol. Acad. Sci. Tech. Sci. 2022, 70, e143826. [Google Scholar] [CrossRef]
- Paramo, G.; Bretas, A.; Meyn, S. Research Trends and Applications of PMUs. Energies 2022, 15, 5329. [Google Scholar] [CrossRef]
- Zhang, M.; Shen, C.; He, N.; Han, S.; Li, Q.; Wang, Q.; Guan, X. False Data Injection Attacks against Smart Gird State Estimation: Construction, Detection and Defense. Sci. China Technol. Sci. 2019, 62, 2077–2087. [Google Scholar] [CrossRef]
- Ravinder, M.; Kulkarni, V. A Review on Cyber Security and Anomaly Detection Perspectives of Smart Grid. In Proceedings of the 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 23–25 January 2023; pp. 692–697. [Google Scholar] [CrossRef]
- Lal, M.D.; Varadarajan, R. A Review of Machine Learning Approaches in Synchrophasor Technology. IEEE Access 2023, 11, 33520–33541. [Google Scholar] [CrossRef]
- Zhang, Y.; Shi, X.; Zhang, H.; Cao, Y.; Terzija, V. Review on Deep Learning Applications in Frequency Analysis and Control of Modern Power System. Int. J. Electr. Power Energy Syst. 2022, 136, 107744. [Google Scholar] [CrossRef]
- Bitirgen, K.; Filik, Ü.B. A Hybrid Deep Learning Model for Discrimination of Physical Disturbance and Cyber-Attack Detection in Smart Grid. Int. J. Crit. Infrastruct. Prot. 2023, 40, 100582. [Google Scholar] [CrossRef]
- Mississippi State University Critical Infrastructure Protection Center, Industrial Control System Cyber Attack Dataset. Available online: https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets (accessed on 24 April 2023).
- Chawla, A.; Agrawal, P.; Panigrahi, B.K.; Paul, K. Deep-Learning-Based Data-Manipulation Attack Resilient Supervisory Backup Protection of Transmission Lines. Neural Comput. Appl. 2023, 35, 4835–4854. [Google Scholar] [CrossRef]
- Al-Hinai, A.S. Voltage Collapse Prediction for Interconnected Power Systems. Master’s Thesis, West Virginia University, Morgantown, WV, USA, 2000. [Google Scholar]
- Jahangir, H.; Lakshminarayana, S.; Maple, C.; Epiphaniou, G. A Deep Learning-Based Solution for Securing the Power Grid against Load Altering Threats by IoT-Enabled Devices. IEEE Internet Things J. 2023, 10, 10687–10697. [Google Scholar] [CrossRef]
- IEEE 14-Bus System. Available online: https://icseg.iti.illinois.edu/ieee-14-bus-system/#:~:text=The (accessed on 5 May 2022).
- Pai, A. Energy Function Analysis for Power System Stability; Springer Science & Business Media: Berlin/Heidelberg, Germany, 1989. [Google Scholar]
- Radhoush, S.; Vannoy, T.; Liyanage, K.; Whitaker, B.M.; Nehrir, H. Distribution System State Estimation and False Data Injection Attack Detection with a Multi-Output Deep Neural Network. Energies 2023, 16, 2288. [Google Scholar] [CrossRef]
- Dolatabadi, S.H.; Ghorbanian, M.; Siano, P.; Hatziargyriou, N.D. An Enhanced IEEE 33 Bus Benchmark Test System for Distribution System Studies. IEEE Trans. Power Syst. 2021, 36, 2565–2572. [Google Scholar] [CrossRef]
- Lal, A. IEEE 69 Bus System. Available online: https://www.mathworks.com/matlabcentral/fileexchange/88111-ieee-69-bus-system (accessed on 25 April 2023).
- Raghuvamsi, Y.; Teeparthi, K. Detection and Reconstruction of Measurements against False Data Injection and DoS Attacks in Distribution System State Estimation: A Deep Learning Approach. Measurement 2023, 210, 112565. [Google Scholar] [CrossRef]
- Vaagensmith, B.; Ulrich, J.; Welch, J.; McJunkin, T.; Rieger, C. IEEE 13 Bus Benchmark Model for Real-Time Cyber-Physical Control and Power Systems Studies. In Proceedings of the 2019 Resilience Week (RWS), San Antonio, TX, USA, 4–7 November 2019; pp. 112–120. [Google Scholar]
- IEEE 37-Bus Test System. Available online: http://ewh.ieee.org/soc/pes/dsacom/testfeeders/ (accessed on 25 April 2023).
- Biswal, M.; Misra, S.; Tayeen, A.S. Black Box Attack on Machine Learning Assisted Wide Area Monitoring and Protection Systems. In Proceedings of the 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 17–20 February 2020. [Google Scholar] [CrossRef]
- Berghout, T. Training a Deep Network for Adversarial Attacks Mitigation: The Case of Smart Grids. Zenodo 2023. [Google Scholar] [CrossRef]
- Biswal, M.; Misra, S.; Tayeen, A.S. Black Box Attack on Machine Learning Assisted Wide Area Monitoring and Protection Systems. Dryad 2021. [Google Scholar] [CrossRef]
- Iandola, F.N.; Han, S.; Moskewicz, M.W.; Ashraf, K.; Dally, W.J.; Keutzer, K. SqueezeNet: AlexNet-Level Accuracy with 50× Fewer Parameters and <0.5MB Model Size. In Proceedings of the ICLR 2017 Conference, Toulon, France, 24–26 April 2017. [Google Scholar]
- Goodfellow, I.J.; Shlens, J.; Szegedy, C. Explaining and Harnessing Adversarial Examples. arXiv 2014, arXiv:1412.6572. [Google Scholar]
- Kurakin, A.; Goodfellow, I.; Bengio, S. Adversarial Examples in the Physical World. arXiv 2016, arXiv:1607.02533v4. [Google Scholar]
- Murali, V.; Sudeep, P.V. Image Denoising Using DnCNN: An Exploration Study. In Advances in Communication Systems and Networks; Springer: Singapore, 2020; pp. 847–859. [Google Scholar]
- Dhanachandra, N.; Manglem, K.; Chanu, Y.J. Image Segmentation Using K -Means Clustering Algorithm and Subtractive Clustering Algorithm. Procedia Comput. Sci. 2015, 54, 764–771. [Google Scholar] [CrossRef] [Green Version]
- Dalal, N.; Triggs, B. Histograms of Oriented Gradients for Human Detection. In Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), San Diego, CA, USA, 20–25 June 2005; Volume 1, pp. 886–893. [Google Scholar]
- Donoho, D.L. De-Noising by Soft-Thresholding. IEEE Trans. Inf. Theory 1995, 41, 613–627. [Google Scholar] [CrossRef] [Green Version]
- Johnstone, I.M.; Silverman, B.W. Needles and Straw in Haystacks: Empirical Bayes Estimates of Possibly Sparse Sequences. Ann. Stat. 2004, 32, 1594–1649. [Google Scholar] [CrossRef] [Green Version]
- Blázquez-García, A.; Conde, A.; Mori, U.; Lozano, J.A. A Review on Outlier/Anomaly Detection in Time Series Data. arXiv 2020, arXiv:2002.04236v1. [Google Scholar] [CrossRef]
- Chawla, N.V.; Bowyer, K.W.; Hall, L.O.; Kegelmeyer, W.P. SMOTE: Synthetic Minority Over-Sampling Technique. J. Artif. Intell. Res. 2002, 16, 321–357. [Google Scholar] [CrossRef]
- Tharwat, A. Classification Assessment Methods. Appl. Comput. Inform. 2021, 17, 168–192. [Google Scholar] [CrossRef]
Ref. | Feature Engineering | Complexity | Unavailability | Drift | Attack | Dataset/System | Tools |
---|---|---|---|---|---|---|---|
[11] | ✗ | ✓ | ✗ | ✓ |
|
|
|
[13] | ✗ | ✓ | ✗ | ✓ |
|
|
|
[15] | ✗ | ✓ | ✗ | ✗ |
|
| |
[18] | ✗ | ✓ | ✗ | ✗ |
|
| |
[21] | ✗ | ✓ | ✗ | ✗ |
|
| |
This work | ✓ | ✓ | ✓ | ✓ |
|
|
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Berghout, T.; Benbouzid, M.; Amirat, Y. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach. Electronics 2023, 12, 2554. https://doi.org/10.3390/electronics12122554
Berghout T, Benbouzid M, Amirat Y. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach. Electronics. 2023; 12(12):2554. https://doi.org/10.3390/electronics12122554
Chicago/Turabian StyleBerghout, Tarek, Mohamed Benbouzid, and Yassine Amirat. 2023. "Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach" Electronics 12, no. 12: 2554. https://doi.org/10.3390/electronics12122554