Volume 6 , Issue 1 , PP: 38-49, 2023 | Cite this article as | XML | Html | PDF | Full Length Article
Gopal Chaudhary 1 * , Smriti Srivastava 2 , Manju Khari 3
Doi: https://doi.org/10.54216/IJWAC.060104
The critical dependence of industrial smart grid systems on cutting-edge Internet of Things (IoT) technologies has made these systems more susceptible to a diverse array of assaults. This consequently puts at risk the integrity of energy data as well as the safety of energy management activities that depend on those data. This study offers a generative federated learning framework for semi-supervised threat detection in an IoT-assisted smart grid system. We refer to this framework as FSEI-Net. A unique semi-supervised edge intelligence network (SEI-Net) is presented in the FSEI-Net to enable semi-supervised training using labeled and unlabeled data in the edge tier. The design of SEI-Net is based on with bidirectional generative convolutional network that can intelligently capture the patterns of threat data from partially labeled smart grid data. We present federated training to enable remote edge servers to work together on training a semi-supervised detector without disclosing their own private local data. This is accomplished through cooperative training. To facilitate communication between cloud and edge layers that is both secure and respectful of users' privacy, a reputation-based block chain is introduced in the FSEI-Net. The outcomes from the practical applications demonstrate that the effectiveness of the proposed FSEI-Net over the most recent cutting-edge detection approaches are valid
Industrial Smart Grid , Federated Learning , Energy Protection , Attack Detection.
[1] M. Abdel-Basset, H. Hawash, and K. Sallam, “Federated Threat-Hunting Approach for Microservice-Based Industrial Cyber-Physical System,” IEEE Trans. Ind. Informatics, 2022, doi: 10.1109/TII.2021.3091150.
[2] P. Kumar, R. Kumar, G. P. Gupta, R. Tripathi, and G. Srivastava, “P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT,” IEEE Trans. Ind. Informatics, 2022, doi: 10.1109/TII.2022.3142030.
[3] W. Zhang, Y. Bai, and J. Feng, “TIIA: A blockchain-enabled Threat Intelligence Integrity Audit scheme for IIoT,” Futur. Gener. Comput. Syst., 2022, doi: 10.1016/j.future.2022.02.023.
[4] G. Cascavilla, D. A. Tamburri, and W. J. Van Den Heuvel, “Cybercrime threat intelligence: A systematic multi-vocal literature review,” Computers and Security. 2021, doi: 10.1016/j.cose.2021.102258.
[5] M. Abdel-Basset, V. Chang, H. Hawash, R. K. Chakrabortty, and M. Ryan, “Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment,” IEEE Trans. Ind. Informatics, 2021, doi: 10.1109/TII.2020.3025755.
[6] M.van Haastrecht et al., “Correction: van Haastrecht et al. A Shared Cyber Threat Intelligence Solution for SMEs. Electronics 2021, 10, 2913,” Electronics (Switzerland). 2022, doi: 10.3390/electronics11030349.
[7] M. van Haastrecht et al., “A shared cyber threat intelligence solution for smes,” Electron., 2021, doi: 10.3390/electronics10232913.
[8] S. Gong and C. Lee, “Cyber threat intelligence framework for incident response in an energy cloud platform,” Electron., 2021, doi: 10.3390/electronics10030239.
[9] C.Liu, J. Wang, and X. Chen, “Threat intelligence ATT&CK extraction based on the attention transformer hierarchical recurrent neural network,” Appl. Soft Comput., vol. 122, p. 108826, Jun. 2022, doi: 10.1016/j.asoc.2022.108826.
[10] M. Ebrahimi, J. F. Nunamaker, and H. Chen, “Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach,” J. Manag. Inf. Syst., 2020, doi: 10.1080/07421222.2020.1790186.
[11] Y. Li, J. Li, and Y. Wang, “Privacy-Preserving Spatiotemporal Scenario Generation of Renewable Energies: A Federated Deep Generative Learning Approach,” IEEE Trans. Ind. Informatics, 2022, doi: 10.1109/TII.2021.3098259.
[12] D. Xu et al., “Edge Intelligence: Empowering Intelligence to the Edge of Network,” Proc. IEEE, 2021, doi: 10.1109/JPROC.2021.3119950.
[13] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing,” Proc. IEEE, 2019, doi: 10.1109/JPROC.2019.2918951.
[14] O. Gomez-Carmona, D. Casado-Mansilla, D. Lopez-De-Ipina, and J. Garcia-Zubia, “Optimizing Computational Resources for Edge Intelligence Through Model Cascade Strategies,” IEEE Internet Things J., 2022, doi: 10.1109/JIOT.2021.3118845.
[15] Y. Wu, H.-N. Dai, and H. Wang, “Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0,” IEEE Internet Things J., vol. XX, no. X, pp. 1–1, 2020, doi: 10.1109/jiot.2020.3025916.
[16] S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System,” IEEE Trans. Ind. Informatics, 2020, doi: 10.1109/TII.2019.2938001.
[17] S. Rathore and J. H. Park, “A Blockchain-based Deep Learning Approach for Cyber Security in Next Generation Industrial Cyber-Physical Systems,” IEEE Trans. Ind. Informatics, 2020, doi: 10.1109/tii.2020.3040968.
[18] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” 2009, doi: 10.1109/CISDA.2009.5356528.
[19] N. Moustafa, B. Turnbull, and K. K. R. Choo, “An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things,” IEEE Internet Things J., 2019, doi: 10.1109/JIOT.2018.2871719.
[20] Y. Zhang, J. Wang, and B. Chen, “Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep Learning Approach,” IEEE Trans. Smart Grid, 2021, doi: 10.1109/TSG.2020.3010510.
[21] S.Gamage and J. Samarabandu, “Deep learning methods in network intrusion detection: A survey and an objective comparison,” J. Netw. Comput. Appl., 2020, doi: 10.1016/j.jnca.2020.102767.