Improved Wasserstein Generative Adversarial Networks Defense Method against Data Integrity Attack on Smart Grid

Recent advances in electrical & electronic engineering(2022)

引用 0|浏览43
暂无评分
摘要
Background: As the integration of communication networks with power systems is getting closer, the number of malicious attacks against the cyber-physical power system is increasing substantially. The data integrity attack can tamper with the measurement information collected by Supervisory Control and Data Acquisition (SCADA), which can affect important decisions of the power grid and pose a significant threat to normal operation. Objective: In order to defend against the data integrity attack, and safeguard the normal operation of power system, we propose a defense method based on improved WGAN (Wasserstein Generative Adversarial Networks). Method: Firstly, through the training of the discriminator and generator, the discriminator identifies and eliminates the measurements damaged by data integrity attack, and the generator uses the temporal and spatial correlation of the power grid measurements to generate complementary measurements which are infinitely close to the original normal data. Meanwhile, using the improved WGAN, the training stability and the convergence speed are significantly improved, and the quality of complementary data is much higher. Results: Extensive simulation experiments were carried out in the IEEE-14 and IEEE-118 standard bus systems. By comparing the deviations between the complementary data and normal data under different iteration times and methods, the mean squared error of the deviations with the proposed method is greatly reduced than traditional methods. The excellent recovery performance of the defense method based on improved WGAN is verified. Conclusion: A smart grid data integrity attack defense method based on improved WGAN is proposed to detect data integrity attacks, and the experimental results demonstrate the recovery effectiveness of the proposed method.
更多
查看译文
关键词
Smart grid,improved WGAN,data integrity attack,defense mechanism,FDIAs,BDD
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要