Home Technology Vector correlation learning and pairwise optimization feature selection for false data injection attack detection in smart grid
Article
Licensed
Unlicensed Requires Authentication

Vector correlation learning and pairwise optimization feature selection for false data injection attack detection in smart grid

  • Ziya Xing ORCID logo EMAIL logo and Boyu Liu
Published/Copyright: August 15, 2022

Abstract

This paper mainly studies vector-related learning and pairwise optimization feature selection for false data injection attack detection in smart grid. In order to provide experimental detection of false data injection attacks, this article will conduct a detailed analysis of the power system segmentation. This paper comprehensively considers the similarity of nodes, security control and confidentiality strategies to complete the optimal partition. Next, we preprocess the measurement data. In order to improve the adaptability of the algorithm structure to the grid structure and further improve the accuracy and convergence speed of the algorithm output, a differential evolution algorithm with swarm intelligence is proposed. Obtain a higher-precision state estimate useful for detecting bad data. In the experiment of this article, if false data account for 20% of all data, the detection accuracy exceeds 75%. As the number of experimental groups increases, the detection accuracy of only one type of false data that does not meet the rules will continue to increase, but the detection accuracy of other types of false data will not change much, but the overall detection accuracy will become higher. Experimental results show that the detection framework can not only effectively detect and identify false data injection attacks on multiple bus nodes, but also has high detection accuracy and can effectively recover false data.


Corresponding author: Ziya Xing, State Grid Henan Electric Power Company, Zhengzhou 450000, Henan, China, E-mail:

  1. Author contributions: All the authors have accepted responsibility for the entire content of this submitted manuscript and approved submission.

  2. Research funding: None declared.

  3. Conflict of interest statement: The authors declare no conflicts of interest regarding this article.

References

1. Chen, J, Liang, G, Cai, Z, Hu, C, Xu, Y, Luo, F, et al.. Impact analysis of false data injection attacks on power system static security assessment. J Mod Power Syst 2016;4:496–505. https://doi.org/10.1007/s40565-016-0223-6.Search in Google Scholar

2. Moussa, B, Robillard, C, Zugenmaier, A, Kassouf, M, Debbabi, M, Assi, C. Securing the precision time protocol (PTP) against fake timestamps. IEEE Commun Lett 2019;23:278–81. https://doi.org/10.1109/lcomm.2018.2883287.Search in Google Scholar

3. Moslemi, R, Mesbahi, A, Mohammadpour Velni, J. Design of robust profitable false data injection attacks in multi-settlement electricity markets. IET Gener, Transm Distrib 2018;12:1263–70. https://doi.org/10.1049/iet-gtd.2017.0294.Search in Google Scholar

4. Mingdan, SI, Qingshan, LI. L2, 1-norm regularized matrix completion for attack detection in collaborative filtering recommender systems. Chin J Electron 2019;28:906–15. https://doi.org/10.1049/cje.2019.06.010.Search in Google Scholar

5. Yang, Q. A robust recommended system based on attack detection. Concurr Comput Pract Ex 2019;31:e4660.1–9. https://doi.org/10.1002/cpe.4660.Search in Google Scholar

6. Yang, PH, Yen, SM. Memory attestation of wireless sensor nodes through trusted remote agents. IET Inf Secur 2017;11:338–44. https://doi.org/10.1049/iet-ifs.2016.0556.Search in Google Scholar

7. Zhou, Q. Supervised approach for detecting average over popular items attack in collaborative recommender systems. IET Inf Secur 2016;10:134–41. https://doi.org/10.1049/iet-ifs.2015.0067.Search in Google Scholar

8. Liang, G, Weller, SR, Zhao, J, Luo, F, Zhao, YD. The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans Power Syst 2017;32:3317–8. https://doi.org/10.1109/tpwrs.2016.2631891.Search in Google Scholar

9. Zhang, R, Venkitasubramaniam, P. False data injection and detection in LQG systems: a game theoretic approach. IEEE Trans Control Netw Syst 2020;7:338–48. https://doi.org/10.1109/tcns.2019.2910459.Search in Google Scholar

10. Tanioka, T, Takase, K, Yasuhara, Y. Efficacy and safety in intramuscular injection techniques using ultrasonographic data. J Health 2018;10:334–50. https://doi.org/10.4236/health.2018.103027.Search in Google Scholar

11. Lobanov, PD, Usov, EV, Butov, AA, Pribaturin, NA, Mosunova, NA, Strizhov, VF, et al.. Experimental investigation of the impulse gas injection into liquid and the use of experimental data for verification of the HYDRA-IBRAE/LM thermohydraulic code. Therm Eng 2017;64:770–6. https://doi.org/10.1134/s004060151710007x.Search in Google Scholar

12. Cerqueira, M, Sousa Neves, J, Santos Faria, D, Teixeira, F, Afonso, MC, Costa, JA. SAT0510Painful shoulder: relevance of clinical and sonographic data on corticosteroid injection outcome. Ann Rheum Dis 2016;75:854.2–854.10.1136/annrheumdis-2016-eular.5610Search in Google Scholar

13. Ma, J, Chen, HH, Song, L, Li, Y. Residential load scheduling in smart grid: a cost efficiency perspective. IEEE Trans Smart Grid 2016;7:771–84.10.1109/TSG.2015.2419818Search in Google Scholar

14. Bharathi, C, Rekha, D, Vijayakumar, V. Genetic algorithm based demand side management for smart grid. Wireless Pers Commun 2017;93:481–502. https://doi.org/10.1007/s11277-017-3959-z.Search in Google Scholar

15. Ma, K, Yao, T, Yang, J, Guan, X. Residential power scheduling for demand response in smart grid. Int J Electr Power Energy Syst 2016;78:320–5. https://doi.org/10.1016/j.ijepes.2015.11.099.Search in Google Scholar

16. Wei, W, Liu, F, Mei, S. Energy pricing and dispatch for smart grid retailers under demand response and market price uncertainty. IEEE Trans Smart Grid 2017;6:1364–74.10.1109/TSG.2014.2376522Search in Google Scholar

17. Mahmood, K, Chaudhry, SA, Naqvi, H, Shon, T, Ahmad, HF. A lightweight message authentication scheme for smart grid communications in power sector. Comput Electr Eng 2016;52:114–24. https://doi.org/10.1016/j.compeleceng.2016.02.017.Search in Google Scholar

18. Nadeem, J, Sakeena, J, Wadood, A, Imran, A, Ahmad, A, Atif, A, et al.. A hybrid genetic wind driven heuristic optimization algorithm for demand side management in smart grid. Energies 2017;10:1–27.10.3390/en10030319Search in Google Scholar

Received: 2022-05-12
Accepted: 2022-07-15
Published Online: 2022-08-15

© 2022 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 13.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/ijeeps-2022-0148/html
Scroll to top button