A Trojan Attack Against Smart Grid Federated Learning and Countermeasures

被引:0
|
作者
Bondok, Atef H. [1 ]
Badr, Mahmoud M. [2 ,3 ]
Mahmoud, Mohamed M. E. A. [4 ]
El-Toukhy, Ahmed T. [5 ,6 ]
Alsabaan, Maazen [7 ]
Amsaad, Fathi [8 ]
Ibrahem, Mohamed I. [3 ,9 ]
机构
[1] Eastern Connecticut State Univ, Dept Comp Sci, Willimantic, CT 06226 USA
[2] SUNY Polytech Inst, Coll Engn, Dept Network & Comp Secur, Utica, NY 13502 USA
[3] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11672, Egypt
[4] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[5] Univ South Carolina Aiken, Dept Comp Sci & Engn, Aiken, SC 29801 USA
[6] Al Azhar Univ, Fac Engn, Dept Elect Engn, Cairo 11884, Egypt
[7] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11451, Saudi Arabia
[8] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
[9] Augusta Univ, Sch Comp & Cyber Sci, Augusta, GA 30912 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Electricity; Trojan horses; Training; Data models; Servers; Detectors; Smart grids; Privacy; Federated learning; Load modeling; security; smart power grid; Trojan attacks; ELECTRICITY THEFT DETECTION; EFFICIENT; SCHEME; SECURE;
D O I
10.1109/ACCESS.2024.3515099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In smart power grid, consumers can hack their smart meters to report low electricity consumption readings to reduce their bills launching electricity theft cyberattacks. This study investigates a Trojan attack in federated learning of a detector for electricity theft. In this attack, dishonest consumers train the detector on false data to later bypass detection, without degrading the detector's overall performance. We propose three defense strategies: Redundancy, Med-Selection and Combined-Selection. In the Redundancy approach, redundant consumers with similar consumption patterns are included in the federated learning process, so their correct data offsets the attackers' false data when the local models are aggregated. Med-Selection selects the median model parameters of consumers with similar usage patterns to reduce outlier influence. In Combined-Selection, we compare gradients from consumers with same consumption patterns to the median of all local models, leveraging the fact that honest consumers' gradients are closer to the median while malicious ones deviate. Our experiments using real-world data show the Trojan attack's success rate can reach 90%. However, our defense methods reduce the attack success rate to about 7%, 4%, and 3.3% for Redundancy, Med-Selection, and Combined-Selection, respectively, when 10% of consumers are malicious.
引用
收藏
页码:191828 / 191846
页数:19
相关论文
共 50 条
  • [21] Evaluation of Communication Delay Based Attack Against the Smart Grid
    De Pace, Gabriel
    Wang, Zhenhua
    Benin, Joseph
    He, Haibo
    Sun, Yan
    2020 IEEE KANSAS POWER AND ENERGY CONFERENCE (KPEC), 2020,
  • [22] Repetitive Backdoor Attacks and Countermeasures for Smart Grid Reinforcement Incremental Learning
    Eltoukhy, Ahmed T.
    Badr, Mahmoud M.
    Elgarhy, Islam
    Mahmoud, Mohamed
    Alsabaan, Maazen
    Alshawi, Tariq
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (03): : 3089 - 3104
  • [23] Shadow backdoor attack: Multi-intensity backdoor attack against federated learning
    Ren, Qixian
    Zheng, Yu
    Yang, Chao
    Li, Yue
    Ma, Jianfeng
    COMPUTERS & SECURITY, 2024, 139
  • [24] Federated Learning-Based Intrusion Detection Method for Smart Grid
    Bin Dongmei
    Li Xin
    Yang Chunyan
    Han Songming
    Ling Ying
    2023 2ND ASIA CONFERENCE ON ALGORITHMS, COMPUTING AND MACHINE LEARNING, CACML 2023, 2023, : 316 - 322
  • [25] FedGrid: A Secure Framework with Federated Learning for Energy Optimization in the Smart Grid
    Gupta, Harshit
    Agarwal, Piyush
    Gupta, Kartik
    Baliarsingh, Suhana
    Vyas, O. P.
    Puliafito, Antonio
    ENERGIES, 2023, 16 (24)
  • [27] SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid
    Zhang, Zhenyong
    Deng, Ruilong
    Tian, Youliang
    Cheng, Peng
    Ma, Jianfeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 581 - 596
  • [28] AAIA: an efficient aggregation scheme against inverting attack for federated learning
    Yang, Zhen
    Yang, Shisong
    Huang, Yunbo
    Martinez, Jose-Fernan
    Lopez, Lourdes
    Chen, Yuwen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 919 - 930
  • [29] Dual-domain based backdoor attack against federated learning
    Li, Guorui
    Chang, Runxing
    Wang, Ying
    Wang, Cong
    NEUROCOMPUTING, 2025, 623
  • [30] LFighter: Defending against the label-flipping attack in federated learning
    Jebreel, Najeeb Moharram
    Domingo-Ferrer, Josep
    Sanchez, David
    Blanco-Justicia, Alberto
    NEURAL NETWORKS, 2024, 170 : 111 - 126