Detecting State of Charge False Reporting Attacks via Reinforcement Learning Approach

被引:14
作者
Alomrani, Mhd Ali [1 ]
Tushar, Mosaddek Hossain Kamal [2 ,3 ]
Kundur, Deepa [2 ]
机构
[1] Huawei Noahs Ark lab, Toronto, ON L3R 5Y1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S, Canada
[3] Univ Dhaka, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
基金
加拿大自然科学与工程研究理事会;
关键词
~Cybersecurity; deep learning; reinforcement learning; EV charging; MODEL;
D O I
10.1109/TITS.2023.3281476
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The increased push for green transportation has been apparent to address the alarming increase in atmospheric CO2 levels, especially in the last five years. The success and popularity of Electric Vehicles (EVs) have led many carmakers to shift to developing clean cars in the next decade. Moreover, many countries around the globe have set aggressive EV target adoption numbers, with some even aiming to ban gasoline cars by 2050. Unlike their gasoline-based counterparts, EVs comprise many sensors, communication channels, and decision-making components vulnerable to cyberattacks. Hence, the unprecedented demand for EVs requires developing robust defenses against these increasingly sophisticated attacks. In particular, recently proposed cyberattacks demonstrate how malicious owners may mislead EV charging networks by sending false data to unlawfully receive higher charging priorities, congest charging schedules, and steal power. This paper proposes a learning-based detection model that can identify deceptive electric vehicles. The model is trained on an original dataset using real driving traces and a malicious dataset generated from a reinforcement learning agent. The Reinforcement Learning (RL) agent is trained to create intelligent and stealthy attacks that can evade simple detection rules while also giving a malicious EV high charging priority. We evaluate the effectiveness of the generated attacks compared to handcrafted attacks. Moreover, our detection model trained with RL-generated attacks displays greater robustness to intelligent and stealthy attacks.
引用
收藏
页码:10467 / 10476
页数:10
相关论文
共 50 条
[11]   Multi-Agent Guided Deep Reinforcement Learning Approach Against State Perturbed Adversarial Attacks [J].
Cerci, Cagri ;
Temeltas, Hakan .
IEEE ACCESS, 2024, 12 :156146-156159
[12]   A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks [J].
Ahmad, Rasheed ;
Alsmadi, Izzat ;
Alhamdani, Wasim ;
Tawalbeh, Lo'ai .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
[13]   Optimal redundant transmission scheduling for remote state estimation via reinforcement learning approach [J].
Jia, Yijin ;
Yang, Lixin ;
Zhao, Yao ;
Li, Jun-Yi ;
Lv, Weijun .
NEUROCOMPUTING, 2024, 576
[14]   Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks [J].
Xu, Shiyu ;
Yu, Shi ;
Xiao, Liang ;
Lv, Zefang .
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 :441-452
[15]   Detecting False Arrhythmias Alarms in the ICU Using a Deep Learning Approach [J].
Ardila, Karol ;
Moreno, German ;
Fajardo, Carlos A. ;
Santos, Camilo .
2024 XXIV SYMPOSIUM OF IMAGE, SIGNAL PROCESSING, AND ARTIFICIAL VISION, STSIVA 2024, 2024,
[16]   Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach [J].
El-Toukhy, Ahmed T. ;
Mahmoud, Mohamed ;
Bondok, Atef H. ;
Fouda, Mostafa M. ;
Alsabaan, Maazen .
2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, :708-713
[17]   A Reinforcement Learning Approach for Defending Against Multiscenario Load Redistribution Attacks [J].
Lei, Jieyu ;
Gao, Shibin ;
Shi, Jian ;
Wei, Xiaoguang ;
Dong, Ming ;
Wang, Wenshuang ;
Han, Zhu .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (05) :3711-3722
[18]   Deep Learning for Detecting Network Attacks: An End-to-End Approach [J].
Zou, Qingtian ;
Singhal, Anoop ;
Sun, Xiaoyan ;
Liu, Peng .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 :221-234
[19]   Security State Estimation for Cyber-Physical Systems against DoS Attacks via Reinforcement Learning and Game Theory [J].
Jin, Zengwang ;
Zhang, Shuting ;
Hu, Yanyan ;
Zhang, Yanning ;
Sun, Changyin .
ACTUATORS, 2022, 11 (07)
[20]   False Data Injection Attacks on Reinforcement Learning-Based Charging Coordination in Smart Grids and a Countermeasure [J].
Elshazly, Amr A. ;
Elgarhy, Islam ;
Eltoukhy, Ahmed T. ;
Mahmoud, Mohamed ;
Eberle, William ;
Alsabaan, Maazen ;
Alshawi, Tariq .
APPLIED SCIENCES-BASEL, 2024, 14 (23)