Detecting State of Charge False Reporting Attacks via Reinforcement Learning Approach

被引:14
作者
Alomrani, Mhd Ali [1 ]
Tushar, Mosaddek Hossain Kamal [2 ,3 ]
Kundur, Deepa [2 ]
机构
[1] Huawei Noahs Ark lab, Toronto, ON L3R 5Y1, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S, Canada
[3] Univ Dhaka, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
基金
加拿大自然科学与工程研究理事会;
关键词
~Cybersecurity; deep learning; reinforcement learning; EV charging; MODEL;
D O I
10.1109/TITS.2023.3281476
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The increased push for green transportation has been apparent to address the alarming increase in atmospheric CO2 levels, especially in the last five years. The success and popularity of Electric Vehicles (EVs) have led many carmakers to shift to developing clean cars in the next decade. Moreover, many countries around the globe have set aggressive EV target adoption numbers, with some even aiming to ban gasoline cars by 2050. Unlike their gasoline-based counterparts, EVs comprise many sensors, communication channels, and decision-making components vulnerable to cyberattacks. Hence, the unprecedented demand for EVs requires developing robust defenses against these increasingly sophisticated attacks. In particular, recently proposed cyberattacks demonstrate how malicious owners may mislead EV charging networks by sending false data to unlawfully receive higher charging priorities, congest charging schedules, and steal power. This paper proposes a learning-based detection model that can identify deceptive electric vehicles. The model is trained on an original dataset using real driving traces and a malicious dataset generated from a reinforcement learning agent. The Reinforcement Learning (RL) agent is trained to create intelligent and stealthy attacks that can evade simple detection rules while also giving a malicious EV high charging priority. We evaluate the effectiveness of the generated attacks compared to handcrafted attacks. Moreover, our detection model trained with RL-generated attacks displays greater robustness to intelligent and stealthy attacks.
引用
收藏
页码:10467 / 10476
页数:10
相关论文
共 50 条
[31]   A Machine Learning Approach for Detecting GPS Location Spoofing Attacks in Autonomous Vehicles [J].
Filippou, S. ;
Achilleos, A. ;
Zukhraf, S. Z. ;
Laoudias, C. ;
Malialis, K. ;
Michael, M. K. ;
Ellinas, G. .
2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
[32]   An Advanced Approach for Detecting Behavior-Based Intranet Attacks by Machine Learning [J].
Jang, Myongwon ;
Lee, Kyungho .
IEEE ACCESS, 2024, 12 :52480-52495
[33]   Reinforcement Learning-Based Detection for State Estimation Under False Data Injection [J].
Jiang, Weiliang ;
Yang, Wen ;
Zhou, Jiayu ;
Ding, Wenjie ;
Luo, Yue ;
Liu, Yun .
IEEE ACCESS, 2021, 9 :66498-66508
[34]   Defending Against Label-Only Attacks via Meta-Reinforcement Learning [J].
Ye, Dayong ;
Zhu, Tianqing ;
Gao, Kun ;
Zhou, Wanlei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :3295-3308
[35]   Detection and mitigation of distributed denial of service attacks in vehicular ad hoc network using a spatiotemporal deep learning and reinforcement learning approach [J].
Jayakrishna, Naramalli ;
Prasanth, N. Narayanan .
RESULTS IN ENGINEERING, 2025, 26
[36]   TREATING EPILEPSY VIA ADAPTIVE NEUROSTIMULATION: A REINFORCEMENT LEARNING APPROACH [J].
Pineau, Joelle ;
Guez, Arthur ;
Vincent, Robert ;
Panuccio, Gabriella ;
Avoli, Massimo .
INTERNATIONAL JOURNAL OF NEURAL SYSTEMS, 2009, 19 (04) :227-240
[37]   A grey approximation approach to state value function in reinforcement learning [J].
Hwang, Kao-Shing ;
Chen, Yu-Jen ;
Lee, Guar-Yuan .
2007 IEEE INTERNATIONAL CONFERENCE ON INTEGRATION TECHNOLOGY, PROCEEDINGS, 2007, :379-+
[38]   A Reinforcement Learning Approach for Sequential Decision-Making Process of Attacks in Smart Grid [J].
Ni, Zhen ;
Paul, Shuva ;
Zhong, Xiangnan ;
Wei, Qinglai .
2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, :1622-1629
[39]   A deep learning approach for detecting covert timing channel attacks using sequential data [J].
Al-Eidi, Shorouq ;
Darwish, Omar ;
Chen, Yuanzhu ;
Maabreh, Majdi ;
Tashtoush, Yahya .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02) :1655-1665
[40]   An effective technique for detecting minority attacks in NIDS using deep learning and sampling approach [J].
Harini, R. ;
Maheswari, N. ;
Ganapathy, Sannasi ;
Sivagami, M. .
ALEXANDRIA ENGINEERING JOURNAL, 2023, 78 :469-482