A Smart Digital Twin Enabled Security Framework for Vehicle-to-Grid Cyber-Physical Systems

被引:18
作者
Ali, Mansoor [1 ]
Kaddoum, Georges [1 ,2 ]
Li, Wen-Tai [3 ]
Yuen, Chau [4 ]
Tariq, Muhammad [5 ]
Poor, H. Vincent [6 ]
机构
[1] Univ Quebec, Elect Engn Dept, ETS, Montreal, PQ H3C 3P8, Canada
[2] Lebanese Amer Univ, Cyber Secur Syst & Appl AI Res Ctr, Beirut 11022801, Lebanon
[3] Singapore Univ Technol & Design, Dept Engn Prod Dev, Singapore 487372, Singapore
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[5] Natl Univ Comp & Emerging Sci, Dept Elect Engn, Islamabad 44000, Pakistan
[6] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Vehicle-to-grid; Cyberattack; Contingency management; Reliability; Complexity theory; Security; Phasor measurement units; Coordinated cyber attacks; digital twin; cyber-physical systems; long short term memory; deep reinforcement learning; FALSE DATA INJECTION; STATE ESTIMATION; VULNERABILITY ASSESSMENT; NETWORKED MICROGRIDS; ATTACKS; COUNTERMEASURES; ENERGY;
D O I
10.1109/TIFS.2023.3305916
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rapid growth of electric vehicle (EV) penetration has led to more flexible and reliable vehicle-to-grid-enabled cyber-physical systems (V2G-CPSs). However, the increasing system complexity also makes them more vulnerable to cyber-physical threats. Coordinated cyber attacks (CCAs) have emerged as a major concern, requiring effective detection and mitigation strategies within V2G-CPSs. Digital twin (DT) technologies have shown promise in mitigating system complexity and providing diverse functionalities for complex tasks such as system monitoring, analysis, and optimal control. This paper presents a resilient and secure framework for CCA detection and mitigation in V2G-CPSs, leveraging a smart DT-enabled approach. The framework introduces a smarter DT orchestrator that utilizes long short-term memory (LSTM) based actor-critic deep reinforcement learning (LSTM-DRL) in the DT virtual replica. The LSTM algorithm estimates the system states, which are then used by the DRL network to detect CCAs and take appropriate actions to minimize their impact. To validate the effectiveness and practicality of the proposed smart DT framework, case studies are conducted on an IEEE 30 bus system-based V2G-CPS, considering different CCA types such as malicious V2G node or control command attacks. The results demonstrate that the framework is capable of accurately estimating system states, detecting various CCAs, and mitigating the impact of attacks within 5 seconds.
引用
收藏
页码:5258 / 5271
页数:14
相关论文
共 48 条
  • [1] Synchrony in Networked Microgrids Under Attacks
    Abhinav, Shankar
    Modares, Hamidreza
    Lewis, Frank L.
    Ferrese, Frank
    Davoudi, Ali
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (06) : 6731 - 6741
  • [2] Load Forecasting Through Estimated Parametrized Based Fuzzy Inference System in Smart Grids
    Ali, Mansoor
    Adnan, Muhammad
    Tariq, Muhammad
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2021, 29 (01) : 156 - 165
  • [3] [Anonymous], 2016, P IEEE POW EN SOC GE
  • [4] A methodology to prevent cascading contingencies using BESS in a renewable integrated microgrid
    Aziz, Tareq
    Masood, Nahid-Al
    Deeba, Shohana Rahman
    Tushar, Wayes
    Yuen, Chau
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2019, 110 : 737 - 746
  • [5] Real-Time Cascading Failures Prevention for Multiple Contingencies in Smart Grids Through a Multi-Agent System
    Babalola, Adeniyi A.
    Belkacemi, Rabie
    Zarrabian, Sina
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (01) : 373 - 385
  • [6] Adaptive Immune System reinforcement Learning-Based algorithm for real-time Cascading Failures prevention
    Babalola, Adeniyi Abdulrasheed
    Belkacemi, Rabie
    Zarrabian, Sina
    Craven, Robert
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 57 : 118 - 133
  • [7] Blanke M., 2006, DIAGNOSIS FAULT TOLE, V2
  • [8] Detection of Hidden Transformer Tap Change Command Attacks in Transmission Networks
    Chakrabarty, Shantanu
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (06) : 5161 - 5173
  • [9] Toward Threat of Implementation Attacks on Substation Security: Case Study on Fault Detection and Isolation
    Chattopadhyay, Anupam
    Ukil, Abhisek
    Jap, Dirmanto
    Bhasin, Shivam
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) : 2442 - 2451
  • [10] False Data Injection Attacks Induced Sequential Outages in Power Systems
    Che, Liang
    Liu, Xuan
    Li, Zuyi
    Wen, Yunfeng
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2019, 34 (02) : 1513 - 1523