Novel cyber-physical architecture for optimal operation of renewable-based smart city considering false data injection attacks: Digital twin technologies for smart city infrastructure management

被引:6
作者
Yong, Yan [1 ]
Ye, Kunhui [1 ]
机构
[1] Chongqing Univ, Sch Management Sci & Real Estate, Chongqing 400044, Peoples R China
关键词
Optimal scheduling; False data injection attacks; Smart cities; Dragonfly optimization technique; Cybersecurity; ENERGY MANAGEMENT; DEEP; MICROGRIDS;
D O I
10.1016/j.seta.2024.103733
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Smart grid is considered a cyber-physical system, which is a combination of physical devices and computational processes. Since there are lots of interactions between the cyber layer and the physical layer, the operation, management, and security of the entire system are crucial topics that must be taken into account. In this regard, this paper tackles two problems in AC MGs, as a special case of smart cities. Firstly, a framework is proposed to solve the optimal scheduling problem in these systems. In this stage, the optimal management and scheduling of the system are structured and modeled as an optimization problem. The dragonfly is utilized as a powerful optimization technique to solve this optimization problem. It is worth noting that in this paper different renewable energy sources, as well as batteries are considered. Since cyber-attacks are among the greatest threats to the system and can cause disruption and outage in smart grids, in this paper a deep-learning-based method called long short-term memory along with the concept of prediction interval is utilized to develop a cyber-attack detection model for false data injection attacks on smart meters. The proposed cyber-attack detection model is first trained using historical data and then is used in real-time for detection. In order to investigate the effectiveness of the proposed optimal scheduling scheme, the modified IEEE 33-bus test system is utilized. Also, for testing the proposed cyber-attack detection model a real-world dataset is used. The simulation results show the great performance and effectiveness of both proposed methodologies. It should be noted that all model are simulated in digital twin simulator. The novel LSTM-based cyber-attack detection model enhances security in electric grids, demonstrating remarkable accuracy.
引用
收藏
页数:10
相关论文
共 23 条
[1]   A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids [J].
Aflaki, Arshia ;
Gitizadeh, Mohsen ;
Razavi-Far, Roozbeh ;
Palade, Vasile ;
Ghasemi, Ali Akbar .
ENERGIES, 2021, 14 (18)
[2]   Energy management and operation modelling of hybrid AC-DC microgrid [J].
Baboli, Payam Teimourzadeh ;
Shahparasti, Mahdi ;
Moghaddam, Mohsen Parsa ;
Haghifam, Mahmoud Reza ;
Mohamadian, Mustafa .
IET GENERATION TRANSMISSION & DISTRIBUTION, 2014, 8 (10) :1700-1711
[3]   Artificial intelligence on economic evaluation of energy efficiency and renewable energy technologies [J].
Chen, Cheng ;
Hu, Yuhan ;
Karuppiah, Marimuthu ;
Kumar, Priyan Malarvizhi .
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 47
[4]   Renewable energy sources from the perspective of blockchain integration: From theory to application [J].
Gawusu, Sidique ;
Zhang, Xiaobing ;
Ahmed, Abubakari ;
Jamatutu, Seidu Abdulai ;
Miensah, Elvis Djam ;
Amadu, Ayesha Algade ;
Junior Osei, Frimpong Atta .
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 52
[5]   A Secured Energy Management Architecture for Smart Hybrid Microgrids Considering PEM-Fuel Cell and Electric Vehicles [J].
Gong, Xuan ;
Dong, Feifei ;
Mohamed, Mohamed A. ;
Abdalla, Omer M. ;
Ali, Ziad M. .
IEEE ACCESS, 2020, 8 :47807-47823
[6]   Hydrogen energy storage integrated battery and supercapacitor based hybrid power system: A statistical analysis towards future research directions [J].
Hannan, M. A. ;
Abu, Sayem M. ;
Al-Shetwi, Ali Q. ;
Mansor, M. ;
Ansari, M. N. M. ;
Muttaqi, Kashem M. ;
Dong, Z. Y. .
INTERNATIONAL JOURNAL OF HYDROGEN ENERGY, 2022, 47 (93) :39523-39548
[7]   Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism [J].
He, Youbiao ;
Mendis, Gihan J. ;
Wei, Jin .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2505-2516
[8]  
Hink RCB, 2014, INT SYMP RESIL CONTR
[9]   ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing [J].
Ho, Jun-Won ;
Wright, Matthew ;
Das, Sajal K. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) :494-510
[10]  
Hochreiter S, 1997, NEURAL COMPUT, V9, P1735, DOI [10.1162/neco.1997.9.8.1735, 10.1007/978-3-642-24797-2, 10.1162/neco.1997.9.1.1]