Detecting State of Charge False Reporting Attacks via Reinforcement Learning Approach

被引:14
作者
Alomrani, Mhd Ali [1 ]
Tushar, Mosaddek Hossain Kamal [2 ,3 ]
Kundur, Deepa [2 ]
机构
[1] Huawei Noahs Ark lab, Toronto, ON L3R 5Y1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S, Canada
[3] Univ Dhaka, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
基金
加拿大自然科学与工程研究理事会;
关键词
~Cybersecurity; deep learning; reinforcement learning; EV charging; MODEL;
D O I
10.1109/TITS.2023.3281476
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The increased push for green transportation has been apparent to address the alarming increase in atmospheric CO2 levels, especially in the last five years. The success and popularity of Electric Vehicles (EVs) have led many carmakers to shift to developing clean cars in the next decade. Moreover, many countries around the globe have set aggressive EV target adoption numbers, with some even aiming to ban gasoline cars by 2050. Unlike their gasoline-based counterparts, EVs comprise many sensors, communication channels, and decision-making components vulnerable to cyberattacks. Hence, the unprecedented demand for EVs requires developing robust defenses against these increasingly sophisticated attacks. In particular, recently proposed cyberattacks demonstrate how malicious owners may mislead EV charging networks by sending false data to unlawfully receive higher charging priorities, congest charging schedules, and steal power. This paper proposes a learning-based detection model that can identify deceptive electric vehicles. The model is trained on an original dataset using real driving traces and a malicious dataset generated from a reinforcement learning agent. The Reinforcement Learning (RL) agent is trained to create intelligent and stealthy attacks that can evade simple detection rules while also giving a malicious EV high charging priority. We evaluate the effectiveness of the generated attacks compared to handcrafted attacks. Moreover, our detection model trained with RL-generated attacks displays greater robustness to intelligent and stealthy attacks.
引用
收藏
页码:10467 / 10476
页数:10
相关论文
共 50 条
[21]   An Approach for Training Moral Agents via Reinforcement Learning [J].
Gu T. ;
Gao H. ;
Li L. ;
Bao X. ;
Li Y. .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (09) :2039-2050
[22]   AI Driven Approach for Detecting False Data Injection Attacks Targeting Water-Energy Nexus [J].
Abughali, Ahmed ;
Alansari, Mohamad ;
Al-Sumaiti, Ameena S. .
2023 IEEE IAS GLOBAL CONFERENCE ON RENEWABLE ENERGY AND HYDROGEN TECHNOLOGIES, GLOBCONHT, 2023,
[23]   A Novel Approach to EEG Neurofeedback via Reinforcement Learning [J].
Bhargava, Aman ;
O'Shaughnessy, Kyle ;
Mann, Steve .
2020 IEEE SENSORS, 2020,
[24]   Detecting False Data Injections in Images Collected by Drones: A Deep Learning Approach [J].
Nait-Abdesselam, Farid ;
Titouna, Chafiq ;
Khokhar, Ashfaq .
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, :263-268
[25]   Constructivist Approach to State Space Adaptation in Reinforcement Learning [J].
Guerian, Maxime ;
Cardozo, Nicolas ;
Dusparic, Ivana .
2019 IEEE 13TH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS (SASO), 2019, :52-61
[26]   Graph Neural Network-Based Approach for Detecting False Data Injection Attacks on Voltage Stability [J].
Fahim, Shahriar Rahman ;
Atat, Rachad ;
Kececi, Cihat ;
Takiddin, Abdulrahman ;
Ismail, Muhammad ;
Davis, Katherine R. ;
Serpedin, Erchin .
IEEE OPEN ACCESS JOURNAL OF POWER AND ENERGY, 2025, 12 :12-23
[27]   An adaptive testing item selection strategy via a deep reinforcement learning approach [J].
Wang, Pujue ;
Liu, Hongyun ;
Xu, Mingqi .
BEHAVIOR RESEARCH METHODS, 2024, 56 (08) :8695-8714
[28]   A Recursive State Estimation Approach to Mitigate False Data Injection Attacks in Power Systems [J].
Sreenath, J. G. ;
Meghwani, A. ;
Chakrabarti, S. ;
Rajawat, K. ;
Srivastava, S. C. .
2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,
[29]   Routing Recovery for UAV Networks with Deliberate Attacks: A Reinforcement Learning based Approach [J].
He, Sijie ;
Jia, Ziye ;
Dong, Chao ;
Wang, Wei ;
Cao, Yilu ;
Yang, Yang ;
Wu, Qihui .
IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, :952-957
[30]   A Machine Learning Approach for Detecting GPS Location Spoofing Attacks in Autonomous Vehicles [J].
Filippou, S. ;
Achilleos, A. ;
Zukhraf, S. Z. ;
Laoudias, C. ;
Malialis, K. ;
Michael, M. K. ;
Ellinas, G. .
2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,