0% found this document useful (0 votes)
2 views

Cyber2

This paper presents a machine learning-based model for detecting data integrity attacks in wireless sensor networks within microgrids, utilizing an intelligent anomaly detection method based on lower and upper bound estimation (LUBE). The proposed system aims to identify varying levels of cyber threats while ensuring the reliable operation of smart meters and microgrid functionalities. The conclusion emphasizes the importance of protecting against such attacks to maintain optimal operations and prevent unauthorized data access.

Uploaded by

prabhamdr
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Cyber2

This paper presents a machine learning-based model for detecting data integrity attacks in wireless sensor networks within microgrids, utilizing an intelligent anomaly detection method based on lower and upper bound estimation (LUBE). The proposed system aims to identify varying levels of cyber threats while ensuring the reliable operation of smart meters and microgrid functionalities. The conclusion emphasizes the importance of protecting against such attacks to maintain optimal operations and prevent unauthorized data access.

Uploaded by

prabhamdr
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

e-ISSN: 2582-5208

International Research Journal of Modernization in Engineering Technology and Science


( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 www.irjmets.com

A MACHINE LEARNING BASED CYBER ATTACK DETECTION MODEL FOR


WIRELESS SENSOR NETWORKS IN MICRO GRIDS
Varunkumar C*1
*1Dept. Of MCA, Vidya Vikas Institute Of Engineering And Technology, Karnataka, India.
ABSTRACT
This paper shows a well secured framework to detect and stop data integrity attacks in wireless sensors
networks in micro grids. To this end, an intelligent anomaly detection method based on prediction intervals is
set up here to distinguish danger attacks with different severities during a good operation. The proposed
anomaly detection method is built based on the lower and upper bound estimation (LUBE) method to give
great feasible prediction intervals on the smart meter readings at electric consumers.
For this purpose, an intelligent anomaly detection method based on prediction interval is set here to
distinguish between dangerous attacks of different severities when working normally. The proposed anomaly
detection method is based on lower and upper bound estimation (LUBE) method to obtain a large feasible
prediction interval for smart meter readings of electricity consumers. It also uses the combinatorial concept of
prediction intervals to solve the unknown issues raised from the neural networks.
Keywords: Data Integrity Attacks, Micro Grids, Lower And Upper Bound Estimation (LUBE), Two-Way
Information Sharing, Smart Metres.
I. INTRODUCTION
Cyber attack detection has the utmost attention in the current world, as the world is continuously being
improved technically.Cyber-attack detection is a hot topic in today's world because the world is constantly
being improved by technology.With regard to microgrid control mechanisms, a control strategy is shown and
depicted in this section that increases the control geometry for rechargeable batteries and renewable energy
sources. While protecting microgrid reliability from unintentional or unpredicted soft switching instabilities by
using control loops, which use the dc link voltage as a feedback. we have to protect our system’s with cyber
attacks.
Existing System
Recording anomalies vary from person to person, but smart meters can detect them well using the PIs currently
being created. A technique known called "combined NNs" is used to function the best in the instability of
traditional machine learning algorithms. SOS, like other meta-heuristic optimization methods, starts with such a
normal population of candidates in the institutes.
Disadvantages:
 Slows down the system even more than before.
 To have a good security, the new program must be updated regularly.
 For the average user, it may be more pricey.
Proposed System
Cyber-attacks of varying levels of danger may be detected that use the suggested framework, which measures
particular micro grid functionalities and get to know their behaviour while the system is running well. This
cyber-resilient model is based on the minimum and maximum estimate approach to produce optimum
prediction interval with nothing but a good level of confidence .
Advantage:
Cyber security engineers are said to enjoy good amount of salary. Most organizations and firms pay salaries
that are highly competitive in comparison with average other employees .
The need for cybersecurity is inevitable and very necessary these days.The unemployment rate in cybersecurity
is less than 1%.There are diverse roles and positions in the field itself, professionals enjoy the chances to move
ahead in the bigger roles and positions.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[553]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 www.irjmets.com

Fig 1: Cybersecurity Solution


II. SYSTEM DESIGN
The first step in the process of getting out of trouble is design. In order for administrators to begin the process
of moving from problem domain to solution management, the problem must be defined using a suitable
diagram. As a link between the development of requirements and the finished response, layout plays an
important role here. The design’s goal is to provide a model or description of a system that may be used in the
construction approach for that system.
Architectural Design
This part's LUBE approach can be used to build ideal Primary care physicians around in the smart metres of
microgrid users. This new optimization approach has the potential to fine-tune the proposed anomaly-
based model.
The detection mechanism is the main thing of the architectural framework. The detection technique is based on
identifying the anomalous patterns of the performance of system by seeing proper values of selected
situations for parameters that are compared to the currently done reference model.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[554]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 www.irjmets.com
Use Case Diagram
The main purpose of a use case diagram is to show the dynamic aspect of a system. By collecting the system's
requirement, which includes both internal as well as external influences. That complete defines the person’s use
cases, and several things that invoke the actors and elements accountable for the implementation of use case
diagrams.

Fig 2: Use case diagram


III. IMPLEMENTATION
Each PI is responsible for calculating the noticed error that exists in the electric consumption data in order to
get all the integrity attacks in the smart sensors. PIs have lower and upper limits, so almost every anticipated
sample will lie somewhere else in the middle of these two boundaries, but not in between anywhere.
The term "micro grid" refers to a Customers and micro grid judgement call units will always communicate with
one generations only . despite metering devices like smart metres will all time ensure the micro grid's effective
and efficient functioning.
Micro grids are becoming increasingly important and useful, because of the raising in possibility of cyber-
attacks, including the possible hacking of smart metres, against all these systems.
Algorithm:
This new optimization approach allowed us to fine-tune the parameters of the proposed anomaly detection
model. SOS was first published in 2014 because of the interconnections that occur among many microbes
within ecosystems. Like some of the other metaheuristic algorithms, SOS started with the ecology of random
populations. Special aspects of the SOS method make it an effective optimizer for situations involving nonlinear
and nonconvex constraint optimization.
Technique:
In this sense, data integrity attacks are one of the most devastating and deadly forms of cybercrime, and can be
used to compromise microgrids by introducing fake data instead of real data collected by smart meters. It can
confuse operations. This kind of attack impacts the healthy data of sophisticated metering infrastructure, such
as metres, sensors, or communications networks, by tampering with the sent data.
IV. CONCLUSION
To prevent the central control unit, data integrity attacks are a serious threat and should focus on the operation
and control of the inverter. Additionally, the power system may have to schedule its units at an infeasible point
because of the mismatch between the generation and consumption, which will badly result in non optimal unit
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[555]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:04/Issue:09/September-2022 Impact Factor- 6.752 www.irjmets.com
operation. As a result, this article successfully outlines an incredibly accurate and intelligent microgrid integrity
protection paradigm. A modified LUBE and MSOS paradigm based on any of the required or the PI principle
was developed to prevent hackers that are preventing from entering the unwanted and unauthorized data into
the central controller. This is giving a significant help to the companies and organizations to function effectively
and smoothly format.
V. REFERENCES
[1] W.R. Issa, A.H. El Khateb, M.A. Abusara, T.K. Mallick, “Control Strategy for Uninterrupted Microgrid
Mode Transfer During Unintentional Islanding Scenarios”, IEEE Trans. Industrial Electronics, vol. 65,
no. 6, pp. 4831 –4839, 2018.
[2] M. Dab, A. Kavousi-Fard, S. Mehraeen, “Effective Scheduling of Reconfigurable Microgrids With
Dynamic Thermal Line Rating”, IEEE Trans. Industrial Electronics, vol. 66 , no. 2, pp. 1552 – 1564,
2019.
[3] K.W. Hu ; C.M. Liaw, “Incorporated Operation Control of DC Microgrid and Electric Vehicle”, IEEE Trans.
Industrial Electronics, vol. 63, no. 1, pp. 202-2015, 2016.
[4] Greentech Media reports, 2018. Online: https://www.utilitydive.com
[5] Pagliery, J. (2014) Hackers Attacked the U.S. Energy Grid 79 Times This Year, (accessed10 March
2017). http://money.cnn.com/2014/11/18/technology/security/energy-gridhack/

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[556]

You might also like