A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids

被引:5
|
作者
Beg, Omar A. [1 ]
Khan, Asad Ali [2 ]
Rehman, Waqas Ur [3 ]
Hassan, Ali [4 ]
机构
[1] Univ Texas Permian Basin, Dept Elect Engn, Odessa, TX 79762 USA
[2] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[3] Missouri Univ Sci & Technol, Dept Elect & Comp Engn, Rolla, MO 65409 USA
[4] Univ Michigan, Dept Elect & Comp Engn, Dearborn, MI USA
关键词
cyber-attacks; false data injection; microgrids; artificial intelligence; detection; mitigation; neural networks; smart grids; ARTIFICIAL-INTELLIGENCE; POWER-SYSTEMS; CHALLENGES; NETWORKS; SECURITY; STRATEGY;
D O I
10.3390/en16227644
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
In this paper, the application and future vision of Artificial Intelligence (AI)-based techniques in microgrids are presented from a cyber-security perspective of physical devices and communication networks. The vulnerabilities of microgrids are investigated under a variety of cyber-attacks targeting sensor measurements, control signals, and information sharing. With the inclusion of communication networks and smart metering devices, the attack surface has increased in microgrids, making them vulnerable to various cyber-attacks. The negative impact of such attacks may render the microgrids out-of-service, and the attacks may propagate throughout the network due to the absence of efficient mitigation approaches. AI-based techniques are being employed to tackle such data-driven cyber-attacks due to their exceptional pattern recognition and learning capabilities. AI-based methods for cyber-attack detection and mitigation that address the cyber-attacks in microgrids are summarized. A case study is presented showing the performance of AI-based cyber-attack mitigation in a distributed cooperative control-based AC microgrid. Finally, future potential research directions are provided that include the application of transfer learning and explainable AI techniques to increase the trust of AI-based models in the microgrid domain.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Kalman Filters Based Distributed Cyber-Attack Mitigation Layers for DC Microgrids
    El-Ebiary, Ahmed H.
    Attia, Mahmoud A.
    Awad, Fathy H.
    Marei, Mostafa I.
    Mokhtar, Mohamed
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2024, 71 (03) : 1358 - 1370
  • [2] A Stealth Cyber-Attack Detection Strategy for DC Microgrids
    Sahoo, Subham
    Mishra, Sukumar
    Peng, Jimmy Chih-Hsien
    Dragicevic, Tomislav
    [J]. IEEE TRANSACTIONS ON POWER ELECTRONICS, 2019, 34 (08) : 8162 - 8174
  • [3] Secure MPC/ANN-Based False Data Injection Cyber-Attack Detection and Mitigation in DC Microgrids
    Habibi, Mohammad Reza
    Baghaee, Hamid Reza
    Blaabjerg, Frede
    Dragicevic, Tomislav
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1487 - 1498
  • [4] Distributed Cyber-Attack Detection in the Secondary Control of DC Microgrids
    Gallo, A. J.
    Turan, M. S.
    Nahata, P.
    Boem, F.
    Parisini, T.
    Ferrari-Trecate, G.
    [J]. 2018 EUROPEAN CONTROL CONFERENCE (ECC), 2018, : 351 - 356
  • [5] A Distributed Cyber-Attack Detection Scheme With Application to DC Microgrids
    Gallo, Alexander Julian
    Turan, Mustafa Sahin
    Boem, Francesca
    Parisini, Thomas
    Ferrari-Trecate, Giancarlo
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3800 - 3815
  • [6] Model-based Cyber-attack Detection for Voltage Source Converters in Island Microgrids
    Zhang, Jinan
    Ye, Jin
    Guo, Lulu
    [J]. 2021 IEEE ENERGY CONVERSION CONGRESS AND EXPOSITION (ECCE), 2021, : 1413 - 1418
  • [7] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    [J]. 系统仿真技术, 2017, 13 (02) : 90 - 104
  • [8] A model predictive approach for cyber-attack detection and mitigation in control systems
    Rosich, Albert
    Voos, Holger
    Li, Yumei
    Darouach, Mohamed
    [J]. 2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 6621 - 6626
  • [9] Cyber-attack detection based on controlled invariant sets
    Rosich, Albert
    Voos, Holger
    Darouach, Mohamed
    [J]. 2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 2176 - 2181
  • [10] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01) : 260 - 280