State prediction using LSTM with optimized PMU deployment against DoS attacks

被引:1
|
作者
Wang, Chunye [1 ]
Sun, Jian [1 ]
Xu, Xiaoxin [1 ]
Zou, Bin [1 ]
Zhang, Min [2 ]
Tang, Yang [2 ]
Zeng, Min [2 ]
机构
[1] Southwest Univ, Sch Elect & Informat Engn, Chongqing, Peoples R China
[2] State Grid Chongqing Elect Power Co, Chongqing, Peoples R China
基金
中国国家自然科学基金;
关键词
Integer linear programming; DoS attacks; deep learning; state prediction; PLACEMENT;
D O I
10.3233/JIFS-212593
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The denial-of-service (DoS) attacks block the communications of the power grids, which affects the availability of the measurement data for monitoring and control. In order to reduce the impact of DoS attacks on measurement data, it is essential to predict missing measurement data. Predicting technique with measurement data depends on the correlation between measurement data. However, it is impractical to install phasor measurement units (PMUs) on all buses owing to the high cost of PMU installment. This paper initializes the study on the impact of PMU placement on predicting measurement data. Considering the data availability, this paper proposes a scheme for predicting states using the LSTM network while ensuring system observability by optimizing phasor measurement unit (PMU) placement. The optimized PMU placement is obtained by integer programming with the criterion of the node importance and the cost of PMU deployment. There is a strong correlation between the measurement data corresponding to the optimal PMU placement. A Long-Short Term Memory neural network (LSTM) is proposed to learn the strong correlation among PMUs, which is utilized to predict the unavailable measured data of the attacked PMUs. The proposed method is verified on an IEEE 118-bus system, and the advantages compared with some conventional methods are also illustrated.
引用
收藏
页码:5957 / 5971
页数:15
相关论文
共 50 条
  • [21] Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks
    Salim, Mikail Mohammed
    Singh, Sushil Kumar
    Park, Jong Hyuk
    APPLIED SOFT COMPUTING, 2021, 113
  • [22] Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM
    Pawar, Mohandas V.
    J., Anuradha
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (01) : 124 - 153
  • [23] Defense Against SYN Flood DoS Attacks Using Network-based Mitigation Techniques
    Goldschmidt, Patrik
    Kucera, Jan
    2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 772 - 777
  • [24] Short-term wind speed prediction using Bayesian optimized LSTM network
    Sharma, Rohit Kumar
    Namboodiri, Vishnu V.
    Rathore, Santosh Singh
    Goyal, Rahul
    2022 IEEE INTERNATIONAL POWER AND RENEWABLE ENERGY CONFERENCE, IPRECON, 2022,
  • [25] Fault Prediction of Rolling Element Bearings Using the Optimized MCKD-LSTM Model
    Ma, Leilei
    Jiang, Hong
    Ma, Tongwei
    Zhang, Xiangfeng
    Shen, Yong
    Xia, Lei
    MACHINES, 2022, 10 (05)
  • [26] Optimized LSTM for Accurate Smart Grid Stability Prediction Using a Novel Optimization Algorithm
    Karim, Faten Khalid
    Khafaga, Doaa Sami
    El-kenawy, El-Sayed M.
    Eid, Marwa M.
    Ibrahim, Abdelhameed
    Abualigah, Laith
    Khodadadi, Nima
    Abdelhamid, Abdelaziz A.
    FRONTIERS IN ENERGY RESEARCH, 2024, 12
  • [27] Event-Triggered Robust State Estimation for Nonlinear Networked Systems with Measurement Delays against DoS Attacks
    Wang, Min
    Liu, Huabo
    SENSORS, 2023, 23 (14)
  • [28] A Defense Mechanism for EOLSR against DOS Attacks in Ad hoc Networks Using Trust Based System
    Balaji, Banothu
    Khan, Mohammed Hassan
    Murthy, T. S. N.
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 51 - 64
  • [29] Using an identity-based dynamic access control filter (IDF) to defend against DoS attacks
    Wang, CC
    Wu, CHJ
    Irwin, JD
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 639 - 645
  • [30] Cyber Deception Against Battery Drain DoS Attacks in Wireless Sensor Networks Using Signaling Game
    Carole Kombou Sihomnou, Ines
    Benslimane, Abderrahim
    Anwar, Ahmed H.
    Deugoue, Gabriel
    Kamhoua, Charles A.
    IEEE ACCESS, 2025, 13 : 5219 - 5235