DOI QR코드

DOI QR Code

Detection and Trust Evaluation of the SGN Malicious node

  • Received : 2021.06.05
  • Published : 2021.06.30

Abstract

Smart Grid Network (SGN) is a next generation electrical power network which digitizes the power distribution grid and achieves smart, efficient, safe and secure operations of the electricity. The backbone of the SGN is information communication technology that enables the SGN to get full control of network station monitoring and analysis. In any network where communication is involved security is essential. It has been observed from several recent incidents that an adversary causes an interruption to the operation of the networks which lead to the electricity theft. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we have introduced a machine learning based SVM method that detects malicious nodes in a smart grid network. The algorithm collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) classifies nodes into Normal or malicious nodes giving the statues of 1 for normal nodes and status of -1 for malicious -abnormal-nodes. Once the malicious nodes have been detected, we have done a trust evaluation based on the nodes history and recorded data. In the simulation, we have observed that our detection rate is almost 98% where the false alarm rate is only 2%. Moreover, a Trust value of 50 was achieved. As a future work, countermeasures based on the trust value will be developed to solve the problem remotely.

Keywords

References

  1. M. Uma and G. Padmavathi, "A Survey on Various Cyber Attacks and Their Classification," p. 7, 2013.
  2. ETV 2 NITTTRCHD, Cyber Security in Smart Grid: Overview Session 1 Module 15 by Janorious Rabeela, (Jan. 04, 2019). Accessed: Feb. 16, 2021. [Online Video]. Available: https://www.youtube.com/watch?v=bvGrh7lITeE
  3. D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. Rohde, "Protecting Smart Grid Automation Systems Against Cyberattacks," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 782-795, Dec. 2011, doi: 10.1109/TSG.2011.2159999.
  4. F. Aloul, A. R. Al-Ali, R. Al-Dalky, M. Al-Mardini, and W. El-Hajj, "Smart Grid Security: Threats, Vulnerabilities and Solutions," SGCE, pp. 1-6, 2012, doi: 10.12720/sgce.1.1.1-6.
  5. M. Jouini, L. B. A. Rabai, and A. B. Aissa, "Classification of Security Threats in Information Systems," Procedia Computer Science, vol. 32, pp. 489-496, Jan. 2014, doi: 10.1016/j.procs.2014.05.452.
  6. A. Sanjab, W. Saad, I. Guvenc, A. Sarwat, and S. Biswas, "Smart Grid Security: Threats, Challenges, and Solutions," arXiv:1606.06992 [cs, math], Jun. 2016, Accessed: Mar. 06, 2021. [Online]. Available: http://arxiv.org/abs/1606.06992
  7. A. Takiddin, M. Ismail, U. Zafar, and E. Serpedin, "Robust Electricity Theft Detection Against Data Poisoning Attacks in Smart Grids," IEEE Transactions on Smart Grid, pp. 1-1, 2020, doi: 10.1109/TSG.2020.3047864.
  8. L. Zhang, X. Shen, F. Zhang, M. Ren, B. Ge, and B. Li, "Anomaly Detection for Power Grid Based on Time Series Model," in 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Aug. 2019, pp. 188-192. doi: 10.1109/CSE/EUC.2019.00044.
  9. J. Jiang and Y. Qian, "Defense Mechanisms against Data Injection Attacks in Smart Grid Networks," IEEE Communications Magazine, vol. 55, no. 10, pp. 76-82, Oct. 2017, doi: 10.1109/MCOM.2017.1700180.
  10. W. Zhe, C. Wei, and L. Chunlin, "DoS attack detection model of smart grid based on machine learning method," in 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), Jul. 2020, pp. 735-738. doi: 10.1109/ICPICS50287.2020.9202401.
  11. X. Xia, Y. Xiao, W. Liang, and M. Zheng, "GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids," IEEE Transactions on Network Science and Engineering, vol. 7, no. 2, pp. 805-816, Apr. 2020, doi: 10.1109/TNSE.2018.2855139.
  12. S. P. Nandanoori, S. Kundu, S. Pal, K. Agarwal, and S. Choudhury, "Model-Agnostic Algorithm for Real-Time Attack Identification in Power Grid using Koopman Modes," in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Nov. 2020, pp. 1-6. doi: 10.1109/SmartGridComm47815.2020.9303022.
  13. E. Drayer and T. Routtenberg, "Detection of False Data Injection Attacks in Smart Grids Based on Graph Signal Processing," IEEE Systems Journal, vol. 14, no. 2, pp. 1886-1896, Jun. 2020, doi: 10.1109/JSYST.2019.2927469.
  14. Y. S. Patil and S. V. Sankpal, "EGSP: Enhanced Grid Sensor Placement Algorithm for Energy Theft Detection in Smart Grids," in 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), Mar. 2019, pp. 1-5. doi: 10.1109/I2CT45611.2019.9033759.
  15. X. Xia, Y. Xiao, and W. Liang, "ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid," IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 445-458, Feb. 2019, doi: 10.1109/TIFS.2018.2854703.
  16. C. Kaygusuz, L. Babun, H. Aksu, and A. S. Uluagac, "Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques," in 2018 IEEE International Conference on Communications (ICC), May 2018, pp. 1-6. doi: 10.1109/ICC.2018.8423022.
  17. Q. Pu et al., "Detection Mechanism of FDI Attack Feature Based on Deep Learning," in 2018 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Oct. 2018, pp. 1761-1765. doi: 10.1109/SmartWorld.2018.00297.
  18. S. Tan, W. Song, M. Stewart, J. Yang, and L. Tong, "Online Data Integrity Attacks Against Real-Time Electrical Market in Smart Grid," IEEE Transactions on Smart Grid, vol. 9, no. 1, pp. 313-322, Jan. 2018, doi: 10.1109/TSG.2016.2550801.
  19. Y. He, G. J. Mendis, and J. Wei, "Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism," IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2505-2516, Sep. 2017, doi: 10.1109/TSG.2017.2703842.
  20. N. Cristianini, J. Shawe-Taylor, and D. of C. S. R. H. J. Shawe-Taylor, An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge University Press, 2000.
  21. S. S. Keerthi and C.-J. Lin, "Asymptotic Behaviors of Support Vector Machines with Gaussian Kernel," Neural Computation, vol. 15, no. 7, pp. 1667-1689, Jul. 2003, doi: 10.1162/089976603321891855.
  22. "Fig. 4. SVM classification with a hyperplane that maximizes the...," ResearchGate. https://www.researchgate.net/figure/SVM-classificationwith-a-hyperplane-that-maximizes-the-separating-margin-between-the-two_fig3_221926953 (accessed Jan. 13, 2021).
  23. G. C. Calafiore and L. E. Ghaoui, Optimization Models. Cambridge University Press, 2014.
  24. J. Sullivan, "Neural Network from Scratch: Perceptron Linear Classifier," John Sullivan, Aug. 16, 2017. https://jtsulliv.github.io/perceptron/ (accessed Jan. 13, 2021).
  25. R. Grosse, "Lecture 3: Linear Classification," p. 10.
  26. "Figure 1. Graphical presentation of the support vector machine...," ResearchGate. https://www.researchgate.net/figure/Graphicalpresentation-of-the-support-vector-machine-classifier-with-a-non-linear-kernel_fig1_299529384 (accessed Jan. 13, 2021).
  27. "Pages - Home." https://mzec.nama.om/enus/Pages/home.aspx (accessed Mar. 19, 2021).
  28. "Bill Calculator." https://mzec.nama.om/enus/Pages/billcalculator.aspx (accessed Mar. 19, 2021).