A Trojan Attack Against Smart Grid Federated Learning and Countermeasures

被引:0
|
作者
Bondok, Atef H. [1 ]
Badr, Mahmoud M. [2 ,3 ]
Mahmoud, Mohamed M. E. A. [4 ]
El-Toukhy, Ahmed T. [5 ,6 ]
Alsabaan, Maazen [7 ]
Amsaad, Fathi [8 ]
Ibrahem, Mohamed I. [3 ,9 ]
机构
[1] Eastern Connecticut State Univ, Dept Comp Sci, Willimantic, CT 06226 USA
[2] SUNY Polytech Inst, Coll Engn, Dept Network & Comp Secur, Utica, NY 13502 USA
[3] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11672, Egypt
[4] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[5] Univ South Carolina Aiken, Dept Comp Sci & Engn, Aiken, SC 29801 USA
[6] Al Azhar Univ, Fac Engn, Dept Elect Engn, Cairo 11884, Egypt
[7] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11451, Saudi Arabia
[8] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
[9] Augusta Univ, Sch Comp & Cyber Sci, Augusta, GA 30912 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Electricity; Trojan horses; Training; Data models; Servers; Detectors; Smart grids; Privacy; Federated learning; Load modeling; security; smart power grid; Trojan attacks; ELECTRICITY THEFT DETECTION; EFFICIENT; SCHEME; SECURE;
D O I
10.1109/ACCESS.2024.3515099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In smart power grid, consumers can hack their smart meters to report low electricity consumption readings to reduce their bills launching electricity theft cyberattacks. This study investigates a Trojan attack in federated learning of a detector for electricity theft. In this attack, dishonest consumers train the detector on false data to later bypass detection, without degrading the detector's overall performance. We propose three defense strategies: Redundancy, Med-Selection and Combined-Selection. In the Redundancy approach, redundant consumers with similar consumption patterns are included in the federated learning process, so their correct data offsets the attackers' false data when the local models are aggregated. Med-Selection selects the median model parameters of consumers with similar usage patterns to reduce outlier influence. In Combined-Selection, we compare gradients from consumers with same consumption patterns to the median of all local models, leveraging the fact that honest consumers' gradients are closer to the median while malicious ones deviate. Our experiments using real-world data show the Trojan attack's success rate can reach 90%. However, our defense methods reduce the attack success rate to about 7%, 4%, and 3.3% for Redundancy, Med-Selection, and Combined-Selection, respectively, when 10% of consumers are malicious.
引用
收藏
页码:191828 / 191846
页数:19
相关论文
共 50 条
  • [41] A Smart Trojan Circuit and Smart Attack Method in AES Encryption Circuits
    Yoshimura, Masayoshi
    Ogita, Amy
    Hosokawa, Toshinori
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2013, : 278 - 283
  • [42] Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid
    Kang, WenJie
    Zhu, PeiDong
    Liu, XuChong
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1027 - 1032
  • [43] Transferable Adversarial Attack Against Deep Reinforcement Learning-Based Smart Grid Dynamic Pricing System
    Ren, Yan
    Zhang, Heng
    Yang, Wen
    Li, Ming
    Zhang, Jian
    Li, Hongran
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (06) : 9015 - 9025
  • [44] Federated Learning for Personalized Recommendation in Securing Power Traces in Smart Grid Systems
    Rajesh, M.
    Ramachandran, Sitharthan
    Vengatesan, K.
    Dhanabalan, Shanmuga Sundar
    Nataraj, Sathees Kumar
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 88 - 95
  • [45] EMPOWERING PROSUMER COMMUNITIES IN SMART GRID WITH WIRELESS COMMUNICATIONS AND FEDERATED EDGE LEARNING
    Taik, Afaf
    Nour, Boubakr
    Cherkaoui, Soumaya
    IEEE WIRELESS COMMUNICATIONS, 2021, 28 (06) : 26 - 33
  • [46] Secure and Efficient Federated Learning for Smart Grid With Edge-Cloud Collaboration
    Su, Zhou
    Wang, Yuntao
    Luan, Tom H.
    Zhang, Ning
    Li, Feng
    Chen, Tao
    Cao, Hui
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (02) : 1333 - 1344
  • [47] Data integrity attack detection in smart grid: A deep learning approach
    Basodi S.
    Tan S.
    Song W.
    Pan Y.
    International Journal of Security and Networks, 2020, 15 (01) : 15 - 24
  • [48] Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure
    Roy, Prithwiraj
    Bhattacharjee, Shameek
    Abedzadeh, Sahar
    Das, Sajal K.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 618 - 635
  • [49] Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures
    Chen, Hongyi
    Su, Jinshu
    Qiao, Linbo
    Zhang, Yi
    Xin, Qin
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 465 - 477
  • [50] A Novel Trojan Attack against Co-learning Based ASR DNN System
    Li, Mingxuan
    Wang, Xiao
    Huo, Dongdong
    Wang, Han
    Liu, Chao
    Wang, Yazhe
    Wang, Yu
    Xu, Zhen
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 907 - 912