State prediction using LSTM with optimized PMU deployment against DoS attacks

被引:1
|
作者
Wang, Chunye [1 ]
Sun, Jian [1 ]
Xu, Xiaoxin [1 ]
Zou, Bin [1 ]
Zhang, Min [2 ]
Tang, Yang [2 ]
Zeng, Min [2 ]
机构
[1] Southwest Univ, Sch Elect & Informat Engn, Chongqing, Peoples R China
[2] State Grid Chongqing Elect Power Co, Chongqing, Peoples R China
基金
中国国家自然科学基金;
关键词
Integer linear programming; DoS attacks; deep learning; state prediction; PLACEMENT;
D O I
10.3233/JIFS-212593
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The denial-of-service (DoS) attacks block the communications of the power grids, which affects the availability of the measurement data for monitoring and control. In order to reduce the impact of DoS attacks on measurement data, it is essential to predict missing measurement data. Predicting technique with measurement data depends on the correlation between measurement data. However, it is impractical to install phasor measurement units (PMUs) on all buses owing to the high cost of PMU installment. This paper initializes the study on the impact of PMU placement on predicting measurement data. Considering the data availability, this paper proposes a scheme for predicting states using the LSTM network while ensuring system observability by optimizing phasor measurement unit (PMU) placement. The optimized PMU placement is obtained by integer programming with the criterion of the node importance and the cost of PMU deployment. There is a strong correlation between the measurement data corresponding to the optimal PMU placement. A Long-Short Term Memory neural network (LSTM) is proposed to learn the strong correlation among PMUs, which is utilized to predict the unavailable measured data of the attacked PMUs. The proposed method is verified on an IEEE 118-bus system, and the advantages compared with some conventional methods are also illustrated.
引用
收藏
页码:5957 / 5971
页数:15
相关论文
共 50 条
  • [31] Prediction Using Cuckoo Search Optimized Echo State Network
    Bala, Abubakar
    Ismail, Idris
    Ibrahim, Rosdiazli
    Sait, Sadiq M.
    Salami, Hamza Onoruoiza
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (11) : 9769 - 9778
  • [32] Prediction Using Cuckoo Search Optimized Echo State Network
    Abubakar Bala
    Idris Ismail
    Rosdiazli Ibrahim
    Sadiq M. Sait
    Hamza Onoruoiza Salami
    Arabian Journal for Science and Engineering, 2019, 44 : 9769 - 9778
  • [33] A Hybrid Model for Bitcoin Prices Prediction using Hidden Markov Models and Optimized LSTM Networks
    Abu Hashish, Iman
    Forni, Fabio
    Andreotti, Gianluca
    Facchinetti, Tullio
    Darjani, Shiva
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 721 - 728
  • [34] Prediction interval of wind power using parameter optimized Beta distribution based LSTM model
    Yuan, Xiaohui
    Chen, Chen
    Jiang, Min
    Yuan, Yanbin
    APPLIED SOFT COMPUTING, 2019, 82
  • [35] Security State Estimation for Cyber-Physical Systems against DoS Attacks via Reinforcement Learning and Game Theory
    Jin, Zengwang
    Zhang, Shuting
    Hu, Yanyan
    Zhang, Yanning
    Sun, Changyin
    ACTUATORS, 2022, 11 (07)
  • [36] Switching-Like Event-Triggered State Estimation for Reaction–Diffusion Neural Networks Against DoS Attacks
    Xiaona Song
    Nana Wu
    Shuai Song
    Vladimir Stojanovic
    Neural Processing Letters, 2023, 55 : 8997 - 9018
  • [37] Battery State of Health Prediction using Hybrid PSO-LSTM Algorithm
    Reddy, Ambati Lokeswara
    Baskaran, Shakila
    Marimuthu, Prakash
    2024 CONTROL INSTRUMENTATION SYSTEM CONFERENCE, CISCON 2024, 2024,
  • [38] Prediction of DoS Attacks in External Communication for Self-driving Vehicles Using A Fuzzy Petri Net Model
    Alheeti, Khattab M. Ali
    Gruebler, Anna
    McDonald-Maier, Klaus D.
    Fernando, Anil
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2016,
  • [39] Securing Cloud Infrastructure Against Co-Resident DoS Attacks Using Game Theoretic Defense Mechanisms
    Bedi, Harkeerat Singh
    Shiva, Sajjan
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 463 - 469
  • [40] Safety and Performance, Why Not Both? Bi-Objective Optimized Model Compression Against Heterogeneous Attacks Toward AI Software Deployment
    Zhu, Jie
    Wang, Leye
    Han, Xiao
    Liu, Anmin
    Xie, Tao
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (03) : 376 - 390