This paper presents a machine learning-based model for detecting data integrity attacks in wireless sensor networks within microgrids, utilizing an intelligent anomaly detection method based on lower and upper bound estimation (LUBE). The proposed system aims to identify varying levels of cyber threats while ensuring the reliable operation of smart meters and microgrid functionalities. The conclusion emphasizes the importance of protecting against such attacks to maintain optimal operations and prevent unauthorized data access.
This paper presents a machine learning-based model for detecting data integrity attacks in wireless sensor networks within microgrids, utilizing an intelligent anomaly detection method based on lower and upper bound estimation (LUBE). The proposed system aims to identify varying levels of cyber threats while ensuring the reliable operation of smart meters and microgrid functionalities. The conclusion emphasizes the importance of protecting against such attacks to maintain optimal operations and prevent unauthorized data access.
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:09/September-2022 Impact Factor- 6.752 www.irjmets.com
A MACHINE LEARNING BASED CYBER ATTACK DETECTION MODEL FOR
WIRELESS SENSOR NETWORKS IN MICRO GRIDS Varunkumar C*1 *1Dept. Of MCA, Vidya Vikas Institute Of Engineering And Technology, Karnataka, India. ABSTRACT This paper shows a well secured framework to detect and stop data integrity attacks in wireless sensors networks in micro grids. To this end, an intelligent anomaly detection method based on prediction intervals is set up here to distinguish danger attacks with different severities during a good operation. The proposed anomaly detection method is built based on the lower and upper bound estimation (LUBE) method to give great feasible prediction intervals on the smart meter readings at electric consumers. For this purpose, an intelligent anomaly detection method based on prediction interval is set here to distinguish between dangerous attacks of different severities when working normally. The proposed anomaly detection method is based on lower and upper bound estimation (LUBE) method to obtain a large feasible prediction interval for smart meter readings of electricity consumers. It also uses the combinatorial concept of prediction intervals to solve the unknown issues raised from the neural networks. Keywords: Data Integrity Attacks, Micro Grids, Lower And Upper Bound Estimation (LUBE), Two-Way Information Sharing, Smart Metres. I. INTRODUCTION Cyber attack detection has the utmost attention in the current world, as the world is continuously being improved technically.Cyber-attack detection is a hot topic in today's world because the world is constantly being improved by technology.With regard to microgrid control mechanisms, a control strategy is shown and depicted in this section that increases the control geometry for rechargeable batteries and renewable energy sources. While protecting microgrid reliability from unintentional or unpredicted soft switching instabilities by using control loops, which use the dc link voltage as a feedback. we have to protect our system’s with cyber attacks. Existing System Recording anomalies vary from person to person, but smart meters can detect them well using the PIs currently being created. A technique known called "combined NNs" is used to function the best in the instability of traditional machine learning algorithms. SOS, like other meta-heuristic optimization methods, starts with such a normal population of candidates in the institutes. Disadvantages: Slows down the system even more than before. To have a good security, the new program must be updated regularly. For the average user, it may be more pricey. Proposed System Cyber-attacks of varying levels of danger may be detected that use the suggested framework, which measures particular micro grid functionalities and get to know their behaviour while the system is running well. This cyber-resilient model is based on the minimum and maximum estimate approach to produce optimum prediction interval with nothing but a good level of confidence . Advantage: Cyber security engineers are said to enjoy good amount of salary. Most organizations and firms pay salaries that are highly competitive in comparison with average other employees . The need for cybersecurity is inevitable and very necessary these days.The unemployment rate in cybersecurity is less than 1%.There are diverse roles and positions in the field itself, professionals enjoy the chances to move ahead in the bigger roles and positions.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[553] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:09/September-2022 Impact Factor- 6.752 www.irjmets.com
Fig 1: Cybersecurity Solution
II. SYSTEM DESIGN The first step in the process of getting out of trouble is design. In order for administrators to begin the process of moving from problem domain to solution management, the problem must be defined using a suitable diagram. As a link between the development of requirements and the finished response, layout plays an important role here. The design’s goal is to provide a model or description of a system that may be used in the construction approach for that system. Architectural Design This part's LUBE approach can be used to build ideal Primary care physicians around in the smart metres of microgrid users. This new optimization approach has the potential to fine-tune the proposed anomaly- based model. The detection mechanism is the main thing of the architectural framework. The detection technique is based on identifying the anomalous patterns of the performance of system by seeing proper values of selected situations for parameters that are compared to the currently done reference model.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[554] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:09/September-2022 Impact Factor- 6.752 www.irjmets.com Use Case Diagram The main purpose of a use case diagram is to show the dynamic aspect of a system. By collecting the system's requirement, which includes both internal as well as external influences. That complete defines the person’s use cases, and several things that invoke the actors and elements accountable for the implementation of use case diagrams.
Fig 2: Use case diagram
III. IMPLEMENTATION Each PI is responsible for calculating the noticed error that exists in the electric consumption data in order to get all the integrity attacks in the smart sensors. PIs have lower and upper limits, so almost every anticipated sample will lie somewhere else in the middle of these two boundaries, but not in between anywhere. The term "micro grid" refers to a Customers and micro grid judgement call units will always communicate with one generations only . despite metering devices like smart metres will all time ensure the micro grid's effective and efficient functioning. Micro grids are becoming increasingly important and useful, because of the raising in possibility of cyber- attacks, including the possible hacking of smart metres, against all these systems. Algorithm: This new optimization approach allowed us to fine-tune the parameters of the proposed anomaly detection model. SOS was first published in 2014 because of the interconnections that occur among many microbes within ecosystems. Like some of the other metaheuristic algorithms, SOS started with the ecology of random populations. Special aspects of the SOS method make it an effective optimizer for situations involving nonlinear and nonconvex constraint optimization. Technique: In this sense, data integrity attacks are one of the most devastating and deadly forms of cybercrime, and can be used to compromise microgrids by introducing fake data instead of real data collected by smart meters. It can confuse operations. This kind of attack impacts the healthy data of sophisticated metering infrastructure, such as metres, sensors, or communications networks, by tampering with the sent data. IV. CONCLUSION To prevent the central control unit, data integrity attacks are a serious threat and should focus on the operation and control of the inverter. Additionally, the power system may have to schedule its units at an infeasible point because of the mismatch between the generation and consumption, which will badly result in non optimal unit www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [555] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:09/September-2022 Impact Factor- 6.752 www.irjmets.com operation. As a result, this article successfully outlines an incredibly accurate and intelligent microgrid integrity protection paradigm. A modified LUBE and MSOS paradigm based on any of the required or the PI principle was developed to prevent hackers that are preventing from entering the unwanted and unauthorized data into the central controller. This is giving a significant help to the companies and organizations to function effectively and smoothly format. V. REFERENCES [1] W.R. Issa, A.H. El Khateb, M.A. Abusara, T.K. Mallick, “Control Strategy for Uninterrupted Microgrid Mode Transfer During Unintentional Islanding Scenarios”, IEEE Trans. Industrial Electronics, vol. 65, no. 6, pp. 4831 –4839, 2018. [2] M. Dab, A. Kavousi-Fard, S. Mehraeen, “Effective Scheduling of Reconfigurable Microgrids With Dynamic Thermal Line Rating”, IEEE Trans. Industrial Electronics, vol. 66 , no. 2, pp. 1552 – 1564, 2019. [3] K.W. Hu ; C.M. Liaw, “Incorporated Operation Control of DC Microgrid and Electric Vehicle”, IEEE Trans. Industrial Electronics, vol. 63, no. 1, pp. 202-2015, 2016. [4] Greentech Media reports, 2018. Online: https://www.utilitydive.com [5] Pagliery, J. (2014) Hackers Attacked the U.S. Energy Grid 79 Times This Year, (accessed10 March 2017). http://money.cnn.com/2014/11/18/technology/security/energy-gridhack/
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science