Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids

With the recent advancement in smart grid technology, real-time monitoring of grid is utmost essential. State estimation-based solutions provide a critical tool in monitoring and control of smart grids. Recently there has been an increased focus on false data injection attacks which can circumvent t...

Full description

Saved in:
Bibliographic Details
Published inElectrical engineering Vol. 104; no. 1; pp. 259 - 282
Main Authors Mukherjee, Debottam, Chakraborty, Samrat, Ghosh, Sandip
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2022
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:With the recent advancement in smart grid technology, real-time monitoring of grid is utmost essential. State estimation-based solutions provide a critical tool in monitoring and control of smart grids. Recently there has been an increased focus on false data injection attacks which can circumvent the traditional statistical bad data detection algorithm. Most of the research methodologies focus on the presence of FDIA in measurement set, whereas their exact locations remain unknown. To cater this issue, this paper proposes a deep learning architecture for detection of the exact locations of data intrusions in real-time. This deep learning model in association with traditional bad data detection algorithms is capable of detecting both structured as well as unstructured false data injection attacks. The deep learning architecture is not dependent on statistical assumptions of the measurements, it emphasizes on the inconsistency and co-occurrence dependency of potential attacks in measurement set, thus acting as a multilabel classifier. Such kind of architecture remains model free without any prior statistical assumptions. Extensive research work on IEEE test-bench shows that this scheme is capable of identifying the locations for intrusion under varying noise scenarios. Such kind of an approach shows potential results also in detection of presence of falsified data.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0948-7921
1432-0487
DOI:10.1007/s00202-021-01278-6