Machine Learning for Cybersecurity Protection of Power Grid Control Infrastructures

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Power Electronics".

Deadline for manuscript submissions: closed (15 November 2023) | Viewed by 2269

Special Issue Editors


E-Mail Website
Guest Editor
Institut de Recherche Dupuy de Lôme (UMR CNRS 6027 IRDL), University of Brest, 29238 Brest, France
Interests: fault detection and diagnosis; failure prognosis; cyberattack detection; fault-resilient control; machine learning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Laboratory of Automation and Manufacturing Engineering, University of Batna 2, Batna 05000, Algeria
Interests: fault diagnosis; prognostics and health management; predictive maintenance; condition monitoring; cybersecurity; machine learning

Special Issue Information

Dear Colleagues,

The increased interconnectivity of modern power grids through cyber-physical systems has made them vulnerable to cyberattacks, which can disrupt their operation and cause widespread outages. Given the potential for such attacks to cause significant damage to life and the economy, protecting power grids from cyberthreats is a high-priority issue. In this context, this Special Issue seeks to highlight the use of machine learning, which has proven effective in detecting and mitigating data anomalies, as a means of addressing cyberthreats against power grids. The issue will feature up-to-date research articles on machine learning implementation and achievements in cyberthreat detection and mitigation in power grids.

Topics of interest include, but are not limited to, the following areas:

  • Cybersecurity dataset generation;
  • Power grid vulnerability diagnosis;
  • Cybersecurity testing;
  • Privacy protection and federated networks;
  • Anomaly detection;
  • Intrusion detection systems;
  • Wide-area monitoring and protection systems;
  • SCADA systems;
  • Control systems;
  • Recognition and avoidance of phishing;
  • Malware identification;
  • Intrusion prevention systems;
  • Denial of services attacks;
  • Time synchronization attacks against phasor measurement units;
  • Time delay attack;
  • Attacks in wireless sensor grids;
  • Stealthy cyberattack detection;
  • Electricity theft detection;
  • Black box attacks;
  • Line failure attack detection;
  • Automatic attack filtering.

Prof. Dr. Mohamed Benbouzid
Dr. Tarek Berghout
Prof. Dr. Yassine Amirat
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 3218 KiB  
Article
Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach
by Tarek Berghout, Mohamed Benbouzid and Yassine Amirat
Electronics 2023, 12(12), 2554; https://doi.org/10.3390/electronics12122554 - 06 Jun 2023
Cited by 3 | Viewed by 1579
Abstract
In an attempt to provide reliable power distribution, smart grids integrate monitoring, communication, and control technologies for better energy consumption and management. As a result of such cyberphysical links, smart grids become vulnerable to cyberattacks, highlighting the significance of detecting and monitoring such [...] Read more.
In an attempt to provide reliable power distribution, smart grids integrate monitoring, communication, and control technologies for better energy consumption and management. As a result of such cyberphysical links, smart grids become vulnerable to cyberattacks, highlighting the significance of detecting and monitoring such attacks to uphold their security and dependability. Accordingly, the use of phasor measurement units (PMUs) enables real-time monitoring and control, providing informed-decisions data and making it possible to sense abnormal behavior indicative of cyberattacks. Similar to the ways it dominates other fields, deep learning has brought a lot of interest to the realm of cybersecurity. A common formulation for this issue is learning under data complexity, unavailability, and drift connected to increasing cardinality, imbalance brought on by data scarcity, and fast change in data characteristics, respectively. To address these challenges, this paper suggests a deep learning monitoring method based on robust feature engineering, using PMU data with greater accuracy, even within the presence of cyberattacks. The model is initially investigated using condition monitoring data to identify various disturbances in smart grids free from adversarial attacks. Then, a minimally disruptive experiment using adversarial attack injection with various reality-imitating techniques is conducted, inadvertently damaging the original data and using it to retrain the deep network, boosting its resistance to manipulations. Compared to previous studies, the proposed method demonstrated promising results and better accuracy, making it a potential option for smart grid condition monitoring. The full set of experimental scenarios performed in this study is available online. Full article
Show Figures

Figure 1

Back to TopTop