Abstract
Advances in edge computing are powering the development and deployment of Internet of Things (IoT) systems to provide advanced services and resource efficiency. However, large‐scale IoT‐based load‐altering attacks (LAAs) can seriously impact power grid operations, such as destabilising the grid's control loops. Timely detection and identification of any compromised nodes are essential to minimise the adverse effects of these attacks on power grid operations. In this work, two data‐driven algorithms are proposed to detect and identify compromised nodes and the attack parameters of the LAAs. The first method, based on the Sparse Identification of Nonlinear Dynamics approach, adopts a sparse regression framework to identify attack parameters that best describe the observed dynamics. The second method, based on physics‐informed neural networks, employs neural networks to infer the attack parameters from the measurements. Both algorithms are presented utilising edge computing for deployment over decentralised architectures. Extensive simulations are performed on IEEE 6‐, 14‐, and 39‐bus systems to verify the effectiveness of the proposed methods. Numerical results confirm that the proposed algorithms outperform existing approaches, such as those based on unscented Kalman filter, support vector machines, and neural networks (NN), and effectively detect and identify locations of attack in a timely manner
Original language | English |
---|---|
Pages (from-to) | 203-218 |
Number of pages | 16 |
Journal | IET Smart Grid |
Volume | 5 |
Issue number | 3 |
Early online date | 15 Apr 2022 |
DOIs | |
Publication status | Published - 1 Jun 2022 |
Externally published | Yes |
Bibliographical note
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly citedFunder
This work has been supported in part by the PETRAS National Centre of Excellence for IoT Systems Cybersecurity, which has been funded by the UK EPSRC under grant number EP/S035362/1. The research of H. Vincent Poor was supported in part by grants from the C3.ai Digital Transformation Institute, the Princeton E-ffiliates Partnership, and the U.S. National Science Foundation (Grant ECCS-2039716).Funding
This work has been supported in part by the PETRAS National Centre of Excellence for IoT Systems Cybersecurity, which has been funded by the UK EPSRC under grant number EP/S035362/1. The research of H. Vincent Poor was supported in part by grants from the C3.ai Digital Transformation Institute, the Princeton E-ffiliates Partnership, and the U.S. National Science Foundation (Grant ECCS-2039716).
Funders | Funder number |
---|---|
C3.ai Digital Transformation Institute | |
National Science Foundation | ECCS‐2039716 |
Engineering and Physical Sciences Research Council | EP/S035362/1 |
Keywords
- QA76
- TJ
- TK