523 536

Title

Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats

  Gopal Chaudhary 1 * ,   Smriti Srivastava 2 ,   Manju Khari 3

1  VIPS-TC, School of Engineering & Technology, New Delhi, India
    (gopal@vips.edu)

2  School of Computer and System Sciences, Jawaharlal Nehru University, New Delhi-67
    (manjukhari@jnu.ac.in)

3  Netaji Subhas University of Technology, New Delhi,
    (smriti.nsit@gmail.com)


Doi   :   https://doi.org/10.54216/IJWAC.060104

Received: October 12, 2022 Accepted: November 23, 2022

Abstract :

The critical dependence of industrial smart grid systems on cutting-edge Internet of Things (IoT) technologies has made these systems more susceptible to a diverse array of assaults. This consequently puts at risk the integrity of energy data as well as the safety of energy management activities that depend on those data. This study offers a generative federated learning framework for semi-supervised threat detection in an IoT-assisted smart grid system. We refer to this framework as FSEI-Net. A unique semi-supervised edge intelligence network (SEI-Net) is presented in the FSEI-Net to enable semi-supervised training using labeled and unlabeled data in the edge tier. The design of SEI-Net is based on with bidirectional generative convolutional network that can intelligently capture the patterns of threat data from partially labeled smart grid data.  We present federated training to enable remote edge servers to work together on training a semi-supervised detector without disclosing their own private local data. This is accomplished through cooperative training. To facilitate communication between cloud and edge layers that is both secure and respectful of users' privacy, a reputation-based block chain is introduced in the FSEI-Net. The outcomes from the practical applications demonstrate that the effectiveness of the proposed FSEI-Net over the most recent cutting-edge detection approaches are valid

Keywords :

Industrial Smart Grid; Federated Learning; Energy Protection; Attack Detection.

References :

[1] M. Abdel-Basset, H. Hawash, and K. Sallam, “Federated Threat-Hunting Approach for Microservice-Based Industrial

Cyber-Physical System,” IEEE Trans. Ind. Informatics, 2022, doi: 10.1109/TII.2021.3091150.

[2] P. Kumar, R. Kumar, G. P. Gupta, R. Tripathi, and G. Srivastava, “P2TIF: A Blockchain and Deep Learning Framework

for Privacy-Preserved Threat Intelligence in Industrial IoT,” IEEE Trans. Ind. Informatics, 2022, doi:

10.1109/TII.2022.3142030.

[3] W. Zhang, Y. Bai, and J. Feng, “TIIA: A blockchain-enabled Threat Intelligence Integrity Audit scheme for IIoT,”

Futur. Gener. Comput. Syst., 2022, doi: 10.1016/j.future.2022.02.023.

[4] G. Cascavilla, D. A. Tamburri, and W. J. Van Den Heuvel, “Cybercrime threat intelligence: A systematic multi-vocal

literature review,” Computers and Security. 2021, doi: 10.1016/j.cose.2021.102258.

[5] M. Abdel-Basset, V. Chang, H. Hawash, R. K. Chakrabortty, and M. Ryan, “Deep-IFS: Intrusion Detection Approach for

Industrial Internet of Things Traffic in Fog Environment,” IEEE Trans. Ind. Informatics, 2021, doi:

10.1109/TII.2020.3025755.

[6] M. van Haastrecht et al., “Correction: van Haastrecht et al. A Shared Cyber Threat Intelligence Solution for SMEs.

Electronics 2021, 10, 2913,” Electronics (Switzerland). 2022, doi: 10.3390/electronics11030349.

[7] M. van Haastrecht et al., “A shared cyber threat intelligence solution for smes,” Electron., 2021, doi:

10.3390/electronics10232913.

[8] S. Gong and C. Lee, “Cyber threat intelligence framework for incident response in an energy cloud platform,” Electron.,

2021, doi: 10.3390/electronics10030239.

[9] C. Liu, J. Wang, and X. Chen, “Threat intelligence ATT&CK extraction based on the attention transformer

hierarchical recurrent neural network,” Appl. Soft Comput., vol. 122, p. 108826, Jun. 2022, doi:

10.1016/j.asoc.2022.108826.

[10] M. Ebrahimi, J. F. Nunamaker, and H. Chen, “Semi-Supervised Cyber Threat Identification in Dark Net Markets: A

Transductive and Deep Learning Approach,” J. Manag. Inf. Syst., 2020, doi: 10.1080/07421222.2020.1790186.

[11] Y. Li, J. Li, and Y. Wang, “Privacy-Preserving Spatiotemporal Scenario Generation of Renewable Energies: A Federated

Deep Generative Learning Approach,” IEEE Trans. Ind. Informatics, 2022, doi: 10.1109/TII.2021.3098259.

[12] D. Xu et al., “Edge Intelligence: Empowering Intelligence to the Edge of Network,” Proc. IEEE, 2021, doi:

10.1109/JPROC.2021.3119950.

[13] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge Intelligence: Paving the Last Mile of Artificial

Intelligence With Edge Computing,” Proc. IEEE, 2019, doi: 10.1109/JPROC.2019.2918951.

[14] O. Gomez-Carmona, D. Casado-Mansilla, D. Lopez-De-Ipina, and J. Garcia-Zubia, “Optimizing Computational

Resources for Edge Intelligence Through Model Cascade Strategies,” IEEE Internet Things J., 2022, doi:

10.1109/JIOT.2021.3118845.

[15] Y. Wu, H.-N. Dai, and H. Wang, “Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT

Critical Infrastructures in Industry 4.0,” IEEE Internet Things J., vol. XX, no. X, pp. 1–1, 2020, doi:

10.1109/jiot.2020.3025916.

[16] S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain Meets Edge Computing: A Distributed and Trusted

Authentication System,” IEEE Trans. Ind. Informatics, 2020, doi: 10.1109/TII.2019.2938001.

[17] S. Rathore and J. H. Park, “A Blockchain-based Deep Learning Approach for Cyber Security in Next Generation

Industrial Cyber-Physical Systems,” IEEE Trans. Ind. Informatics, 2020, doi: 10.1109/tii.2020.3040968.

[18] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” 2009, doi:

10.1109/CISDA.2009.5356528.

[19] N. Moustafa, B. Turnbull, and K. K. R. Choo, “An ensemble intrusion detection technique based on proposed statistical

flow features for protecting network traffic of internet of things,” IEEE Internet Things J., 2019, doi:

10.1109/JIOT.2018.2871719.

[20] Y. Zhang, J. Wang, and B. Chen, “Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep

Learning Approach,” IEEE Trans. Smart Grid, 2021, doi: 10.1109/TSG.2020.3010510.

[21] S. Gamage and J. Samarabandu, “Deep learning methods in network intrusion detection: A survey and an objective

comparison,” J. Netw. Comput. Appl., 2020, doi: 10.1016/j.jnca.2020.102767.


Cite this Article as :
Style #
MLA Gopal Chaudhary, Smriti Srivastava, Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats." International Journal of Wireless and Ad Hoc Communication, Vol. 6, No. 1, 2023 ,PP. 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
APA Gopal Chaudhary, Smriti Srivastava, Manju Khari. (2023). Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats. Journal of International Journal of Wireless and Ad Hoc Communication, 6 ( 1 ), 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
Chicago Gopal Chaudhary, Smriti Srivastava, Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats." Journal of International Journal of Wireless and Ad Hoc Communication, 6 no. 1 (2023): 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
Harvard Gopal Chaudhary, Smriti Srivastava, Manju Khari. (2023). Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats. Journal of International Journal of Wireless and Ad Hoc Communication, 6 ( 1 ), 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
Vancouver Gopal Chaudhary, Smriti Srivastava, Manju Khari. Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats. Journal of International Journal of Wireless and Ad Hoc Communication, (2023); 6 ( 1 ): 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
IEEE Gopal Chaudhary, Smriti Srivastava, Manju Khari, Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats, Journal of International Journal of Wireless and Ad Hoc Communication, Vol. 6 , No. 1 , (2023) : 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)