A Smart Digital Twin Enabled Security Framework for Vehicle-to-Grid Cyber-Physical Systems

被引:34
作者
Ali, Mansoor [1 ]
Kaddoum, Georges [1 ,2 ]
Li, Wen-Tai [3 ]
Yuen, Chau [4 ]
Tariq, Muhammad [5 ]
Poor, H. Vincent [6 ]
机构
[1] Univ Quebec, Elect Engn Dept, ETS, Montreal, PQ H3C 3P8, Canada
[2] Lebanese Amer Univ, Cyber Secur Syst & Appl AI Res Ctr, Beirut 11022801, Lebanon
[3] Singapore Univ Technol & Design, Dept Engn Prod Dev, Singapore 487372, Singapore
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[5] Natl Univ Comp & Emerging Sci, Dept Elect Engn, Islamabad 44000, Pakistan
[6] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Vehicle-to-grid; Cyberattack; Contingency management; Reliability; Complexity theory; Security; Phasor measurement units; Coordinated cyber attacks; digital twin; cyber-physical systems; long short term memory; deep reinforcement learning; FALSE DATA INJECTION; STATE ESTIMATION; VULNERABILITY ASSESSMENT; NETWORKED MICROGRIDS; ATTACKS; COUNTERMEASURES; ENERGY;
D O I
10.1109/TIFS.2023.3305916
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rapid growth of electric vehicle (EV) penetration has led to more flexible and reliable vehicle-to-grid-enabled cyber-physical systems (V2G-CPSs). However, the increasing system complexity also makes them more vulnerable to cyber-physical threats. Coordinated cyber attacks (CCAs) have emerged as a major concern, requiring effective detection and mitigation strategies within V2G-CPSs. Digital twin (DT) technologies have shown promise in mitigating system complexity and providing diverse functionalities for complex tasks such as system monitoring, analysis, and optimal control. This paper presents a resilient and secure framework for CCA detection and mitigation in V2G-CPSs, leveraging a smart DT-enabled approach. The framework introduces a smarter DT orchestrator that utilizes long short-term memory (LSTM) based actor-critic deep reinforcement learning (LSTM-DRL) in the DT virtual replica. The LSTM algorithm estimates the system states, which are then used by the DRL network to detect CCAs and take appropriate actions to minimize their impact. To validate the effectiveness and practicality of the proposed smart DT framework, case studies are conducted on an IEEE 30 bus system-based V2G-CPS, considering different CCA types such as malicious V2G node or control command attacks. The results demonstrate that the framework is capable of accurately estimating system states, detecting various CCAs, and mitigating the impact of attacks within 5 seconds.
引用
收藏
页码:5258 / 5271
页数:14
相关论文
共 48 条
[1]   Synchrony in Networked Microgrids Under Attacks [J].
Abhinav, Shankar ;
Modares, Hamidreza ;
Lewis, Frank L. ;
Ferrese, Frank ;
Davoudi, Ali .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (06) :6731-6741
[2]   Load Forecasting Through Estimated Parametrized Based Fuzzy Inference System in Smart Grids [J].
Ali, Mansoor ;
Adnan, Muhammad ;
Tariq, Muhammad ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2021, 29 (01) :156-165
[3]   A methodology to prevent cascading contingencies using BESS in a renewable integrated microgrid [J].
Aziz, Tareq ;
Masood, Nahid-Al ;
Deeba, Shohana Rahman ;
Tushar, Wayes ;
Yuen, Chau .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2019, 110 :737-746
[4]   Real-Time Cascading Failures Prevention for Multiple Contingencies in Smart Grids Through a Multi-Agent System [J].
Babalola, Adeniyi A. ;
Belkacemi, Rabie ;
Zarrabian, Sina .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (01) :373-385
[5]   Adaptive Immune System reinforcement Learning-Based algorithm for real-time Cascading Failures prevention [J].
Babalola, Adeniyi Abdulrasheed ;
Belkacemi, Rabie ;
Zarrabian, Sina ;
Craven, Robert .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 57 :118-133
[6]  
Blanke M., 2006, Diagnosis and fault-tolerant control
[7]   Detection of Hidden Transformer Tap Change Command Attacks in Transmission Networks [J].
Chakrabarty, Shantanu ;
Sikdar, Biplab .
IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (06) :5161-5173
[8]   Toward Threat of Implementation Attacks on Substation Security: Case Study on Fault Detection and Isolation [J].
Chattopadhyay, Anupam ;
Ukil, Abhisek ;
Jap, Dirmanto ;
Bhasin, Shivam .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (06) :2442-2451
[9]   False Data Injection Attacks Induced Sequential Outages in Power Systems [J].
Che, Liang ;
Liu, Xuan ;
Li, Zuyi ;
Wen, Yunfeng .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2019, 34 (02) :1513-1523
[10]  
Chen B., 2013, PROC IEEE POWER ENER, P1