VNN-DM: a vector neural network-based detection model for time synchronization attacks in park-level energy internet
Abstract
Micro phasor measurement units (µPMUs) provide high-precision voltage and current phasor data, allowing real-time state estimation and fault detection, which are critical for the stability and reliability of modern power systems. However, their reliance on accurate time synchronization makes them vulnerable to time synchronization attacks (TSAs), which can disrupt grid monitoring and control by corrupting µPMU data. Addressing these vulnerabilities is essential to ensure the secure and resilient operation of smart grids and energy internet technologies. To address these challenges, intelligent detection methods are essential. Therefore, this paper proposes a µPMU measurement data TSA detection model based on vector neural networks (VNNs). This model initially employs a vector neural network to process raw data, effectively extracting and analyzing temporal features. During the same time, a capsule network is employed to classify these temporal features. On this basis, a reconstruction network is used to verify the representational capacity of the model. Simulations based on µPMU measurement data demonstrate that the model exhibits excellent detection capacity in various performance metrics, underscoring its precision and robustness.
Keywords
1. INTRODUCTION
The rapid development of the energy internet in industrial parks is transforming the operational model of traditional power systems. State estimation, as a key link in ensuring the stability and security of power systems, has emerged as a key research focus[1]. The application of phasor measurement units (PMUs) in state estimation has significantly enhanced their efficiency and accuracy. PMUs are widely used in smart grids to enhance or replace traditional sensors in supervisory control and data acquisition (SCADA) systems[2]. Compared to traditional sensors, PMUs have higher sampling rates, significantly enhancing the real-time performance of wide-area measurement systems[3]. Micro PMUs (µPMUs) offer even higher sampling rates, finer measurement accuracy, and more flexible deployment, demonstrating distinct advantages in broader power grid monitoring applications[4]. However, accurate time synchronization is critical for µPMUs to capture precise state data from the power grid.
Accurate time synchronization serves as a cornerstone for effective power grid monitoring, enabling precise coordination and data reliability[5]. It ensures that each µPMU device can collect data under the same time reference, allowing precise monitoring of the state of the grid. µPMUs can accurately capture the voltage and current phasor information of the grid, providing real-time monitoring of grid operations, thus enhancing the stability and reliability of the power system[6,7]. However, with the continued advancement of information technology, grid time synchronization technologies face new challenges[8], one of which is the time synchronization attack (TSA).
TSA is a malicious behavior that disrupts time synchronization in the power grid by tampering with time signals. This type of attack exploits system vulnerabilities, using techniques such as injecting false time signals or interfering with the transmission of time signals[9,10], causing µPMUs to receive incorrect time signals. To effectively mitigate these threats, the implementation of intelligent detection technologies is essential. Recent advances in robust consensus mechanisms have shown that resilient consensus can be achieved in multihop communication with path-dependent delays, even within random dynamic networks under mobile malicious attacks[11,12]. These studies provide essential theoretical support for building robust frameworks capable of detecting TSA in complex networked environments. Such technologies employ sophisticated algorithms to continuously monitor synchronization data in real time, facilitating automatic identification of anomalies indicative of TSA[13]. This proactive approach facilitates early warnings, enhancing system resilience and robustness against potential attacks. As a result, µPMUs can report incorrect voltage or current phasor data, leading to misjudgments about the state of the grid at the control center, and potentially resulting in operational scheduling errors. Moreover, during long-term grid operation, repeated errors may lead to the accumulation of synchronization data discrepancies[14], potentially triggering more severe grid safety incidents. Detecting and preventing TSAs and ensuring the authenticity of grid monitoring data have become urgent issues that need to be addressed.
Scholars from various regions have conducted relevant research on attack detection. Existing detection models can be categorized into fully supervised learning models[15-17], semi-supervised learning models[18-20], and unsupervised learning models[21,22] based on their learning approaches. Fully supervised learning models rely on large amounts of labeled data, using known attacks and normal behavior to train the model for classification. Semi-supervised learning models combine a small amount of labeled data with a large amount of unlabeled data, improving detection performance through pseudo-labeling or other techniques. Unsupervised learning models, on the other hand, do not require labeled data; they rely on the intrinsic structure or patterns in the data to identify potential anomalies and attack behaviors.
While fully supervised models are dependent on a substantial quantity of high-quality labeled data, in the context of TSA issues within park-level energy internet environments involving µPMU measurement data, it is often difficult to obtain a large volume of labeled data. Although unsupervised learning models do not require labeled data, they are generally incapable of precise classification or prediction and are commonly used to detect distributed denial of service (DDoS) attacks[23]. Semi-supervised learning models can be effectively trained with a small amount of labeled data and a large amount of unlabeled data; however, these models are often complex in structure, accompanied by high computational costs and unstable training processes. Against this backdrop, the vector neural network (VNN) has emerged as an advanced model offering greater flexibility. VNNs possess strong adaptability and can be tailored to various supervised learning modes based on actual application needs. In wide-area power grids, VNNs have demonstrated the capability to detect attacks[24], thereby enhancing the security and stability of the system.
Therefore, this paper analyzes the application of µPMUs in park-level energy internet systems, the principles of TSAs, and their impact on grid monitoring. To address the TSA issue, a VNN-based detection model (VNN-DM) is proposed. The model incorporates the design concepts of both VNNs and convolutional neural networks (CNNs), enabling the analysis of features in data collected by µPMUs, and achieving detection of TSA data in smart grids. VNNs offer considerable flexibility, adapting to various supervised learning modes based on actual usage scenarios, and possess the ability to recognize complex patterns and attack behaviors. In complex attack scenarios, they exhibit high accuracy and robustness. The contributions of this paper are as follows:
1. Clarification of the characteristics of µPMU measurement data under TSA: This paper conducts an indepth study of the impact of TSAs on µPMU data, revealing how attacks manipulate time signals to cause deviations in power grid state estimation. This provides a theoretical foundation for the design of effective detection methods.
2. Proposal of a TSA detection model based on VNNs (VNN-DM): Building on the VNN architecture, this paper introduces convolutional layers for multi-scale temporal feature extraction and enhances the feature classification capability of capsule networks by optimizing the dynamic routing mechanism. The VNN-DM model achieves precise analysis of power grid states and attack detection in response to TSA issues in park-level energy internet, offering strong detection accuracy and robustness.
The remainder of the paper is structured as follows: Chapter 2 explores the application of µPMU in power grids and the threat of TSAs to grid security. Chapter 3 introduces the improved VNN-DM model for detecting TSAs in µPMU measurement data within park-level energy internet. Chapter 3 validates the performance of the VNN-DM model through simulation experiments, demonstrating its advantages in detection accuracy and robustness. Finally, Chapter 4 concludes the research findings and proposes directions for future work.
2. TSA IN PARK-LEVEL ENERGY INTERNET
In the park-level energy internet, µPMUs, with their high sampling rate and fine measurement accuracy, have become key components in power system state estimation. The measurement data from µPMUs is transmitted through the power communication network to the control center, where it is analyzed to estimate the current state of the power system, detect potential faults, and send control signals back to remote terminal units (RTUs) to execute corresponding operations. This ensures the reliability of the system, as illustrated in Figure 1. The accuracy of µPMU data is crucial for the precision of state estimation and forms the foundation for the stable operation of power systems.
However, TSA poses a real threat to the accuracy of µPMU data. As shown in Figure 1, TSA attackers can send GPS spoofing signals around the target µPMU without needing to infiltrate the monitoring system or physically access the µPMU. By tampering with the time synchronization signals, TSA causes measurement data with incorrect timestamps to be transmitted to the control center, leading to errors in the system state estimation. These erroneous data may bypass simple algorithmic detection and affect the operational scheduling of the power system. While some data processing programs can handle measurement errors, most of them only account for errors caused by noise or data packet loss. Since TSA can introduce time deviations that easily bypass basic defense mechanisms such as smoothing filters and bad data detection (BDD), investigating the impact of TSA on µPMU data collection and ensuring the reliability of grid monitoring data has become a pressing issue that needs to be addressed.
2.1. Principle of system state estimation
In the power system network, µPMUs are strategically distributed across the buses, providing detailed measurements of system dynamics. µPMUs capture both the complex voltage of the bus and the complex currents flowing through all transmission lines connected to it, enabling precise monitoring of power flow dynamics. Considering a local network, suppose there are
Where
where
To obtain the optimal state estimation, it is necessary to minimize the objective function
Assume the initial state estimate is
Where
Substituting the higher-order terms and applying the formula and let
To obtain the optimal objective function, set
Thus, the state estimate vector is iteratively updated according to the iterative formula:
When
In system state estimation, the largest normalized residual (LNR) method is used for anomaly detection. This method normalizes the residuals of each measurement and then compares the maximum normalized residual to a predefined threshold. Specifically, if the LNR is below the threshold
2.2. TSA attack model
During a TSA, the attacker sends spoofed GPS signals, introducing incorrect time synchronization in µPMU measurements. This disrupts the phase angles of synchronized data, causing a mismatch between measured and actual phase values[25]. Assume that the attack occurs on bus
Table 1 presents the phase angle deviation errors caused by TSA. The phase angle deviation of the affected bus
Phase angle error caused by TSA
Through analysis, the relationship between the measurement vector under TSA and the normal measurement vector can be derived. The phase angle deviation
Where
The residual error vector is:
An adversary can exploit the attack matrix
3. TSA DETECTION MODEL
VNNs are a type of neural network model specifically designed to process vector data. They comprise vector neurons (capsules) that use vector outputs instead of traditional scalar-based feature detectors[30,31]. Each vector neuron retains instantiation parameters and uses a dynamic routing mechanism to transmit data to the next layer, while preserving the direction, posture, and spatial information of the target features. Compared to traditional neural networks, VNNs are better at capturing temporal information and geometric relationships in input data. In µPMU measurements, the physical information of magnitude and phase angle are closely related, and the use of VNNs can preserve these relationships, allowing for more accurate detection of phase angle shifts caused by TSA. To address the TSA problem in the park-level energy internet environment, this paper introduces a multi-layer CNN for multi-scale temporal feature extraction and optimizes the dynamic routing mechanism of VNNs to better capture the geometric relationships and feature variations in temporal data. Additionally, a multi-layer perceptron (MLP) is integrated to reconstruct the classification results, enhancing the model's robustness and detection accuracy in complex attack scenarios. The structure of the VNN-DM model is shown in Figure 2. The model consists of a convolutional Layer, a primary capsule layer (PrimeCap), a convolutional capsule layer (ConvCap), a fully connected capsule layer (FCCap), and a decoder. During the feature extraction phase, a multi-layer convolutional structure with different kernel sizes is used to extract multi-scale temporal features. The dynamic routing mechanism enhances the feature classification capabilities of the capsule network, ensuring the model effectively adapts to feature variations in data under different attack modes. Finally, the MLP reconstructs the feature classification results, improving the model's robustness and detection accuracy in complex attack scenarios within localized networks.
3.1. Dynamic routing between vector neurons
Dynamic routing establishes a non-linear mapping through an iterative process, enabling more adaptive and hierarchical information flow between network layers. In this process, the data from each lower-level capsule (sub-capsule) is passed to the appropriate higher-level capsule (parent capsule) in the next layer. Dynamic routing adaptively modulates the connection strength between sub-capsules and parent capsules, leveraging the output of the sub-capsules, thereby increasing or decreasing these connections. Let the data in the sub-capsule be denoted as
Where each sub-component of the data encapsulated in the capsule is subjected to positional encoding. This ensures that the prediction includes the correlation between the input data's amplitude and positional phase. In other words, the prediction captures the correlation between the amplitude and phase of the actual input data. Using the measured value as an example, the corresponding peak value in the complex wave is simplified, and the positional encoding data is expressed. The predictive measurement after encoding is given by:
Where
Where
The parent capsule
In the initial stage, the prediction weights
Algorithm 1 Routing Process for Capsules 1: Begin
2: Initialize the routing coefficients between capsule
3: Compute the prediction vectors.
4: for all capsules
5: Calculate the SoftMax values.
6: end for
7: Accumulate the prediction vectors for all capsules in layer
8: Apply the squash function for all capsules in layer
9: for
10: Update the routing coefficients for all capsules
11: end for
12: Return the final routing vector.
13: End
This dynamic routing process can be likened to a reinforcement learning mechanism. The process ensures each layer's input is recalculated based on the forward propagation strategy. During network training, the optimization strategy relies on a margin loss function, defined as:
Here,
Where
Where
Where
3.2. TSA detection model
The overall structure of the VNN-DM model consists of two components: an encoder and a decoder. The encoder is primarily responsible for data extraction and representation, while the decoder enhances the model's representational capacity. This section provides a detailed explanation of the detection model's structure.
3.2.1. Encoder
The encoder consists of Conv, PrimCap, ConvCap, and FCCap layers. Multiple convolutional layers are employed to extract features from the input data. When the measured data is fed into the convolutional layers, the local feature detectors are activated by the rectified linear unit (ReLU) to capture the underlying features of the data:
Here,
The initial capsule feature vector is a high-dimensional compressed data vector combined with multiple parameters based on actual input data, maintaining the correlation between the amplitude and positional phase. The relevant equation is:
Where
Due to the dimensional differences between the fully connected capsule layer and the convolutional capsule layer, a pose matrix
Here,
3.2.2. Decoder
The decoder adopts a MLP structure. It is designed to reconstruct the input feature vector from the latent space representation
Where
Where
To balance the reconstruction error, the mean squared error (MSE) is used as the loss function
By minimizing the error, the model can accurately reconstruct the input data, ensuring that the capsule network retains the feature extraction and representational power necessary for TSA detection tasks.
4. RESULTS
To simulate the basic equipment and scenarios of a regional energy internet and verify the effectiveness of the detection model, this paper generates a simulation dataset based on the IEEE 14-bus standard network, incorporating the fundamental characteristics of a regional energy internet. The IEEE 14-bus network is a widely used and standardized test system that provides representative operational scenarios for power systems within energy internet frameworks. The network includes key components such as generators, transformers, and load nodes, effectively reflecting the complexity of multi-node, multi-device coordinated operation in a regional energy internet. Using the standard topology and parameter settings provided by the Matpower toolbox, this paper simulates measurement data samples under real-world conditions. To better represent the measurement errors found in actual data, the signal-to-noise ratio (SNR) of the simulation dataset is set to 20 dB, thereby simulating measurement data with random noise. Additionally, to evaluate the performance of the detection model under malicious attacks, this paper introduces a TSA at one of the nodes in the IEEE 14-bus network, simulating the power system state of a regional energy internet under such attacks. This process generates power data samples for both normal and attack scenarios. The simulation dataset is shown in Table 2.
Training data set
Data type | Training data | Test data |
Measure data | 12000 | 3000 |
Attack data | 12000 | 3000 |
4.1. The impact of TSA attacks on energy internet systems
To analyze the impact of TSA attacks on park-level energy internet, this paper designs a system state estimation simulation scenario based on the IEEE 14-bus standard network. The system state estimation method follows the approach outlined in Chapter 2. During the state estimation process, this paper simulates an attacker's TSA on the system, with the attack set at Node 4. The WLS calculation values under both attack and non-attack conditions are shown in Figure 3.
The experimental results demonstrate that significant deviations in voltage phase angles occurred at multiple nodes before and after the attack, with the attack on Node 4 also causing deviations at other nodes. This is because the power system is a complex network where the state of each node depends not only on its own attributes but also on the states of the nodes it is connected to. When Node 4 is attacked, its voltage phase angle is tampered with or disturbed, altering the power flow and phase angle distribution between this node and its neighboring nodes, which in turn causes changes in the states of other nodes. The TSA attack directly influences the time synchronization of measurement devices, leading to phase angle shifts in state estimation. Distortion in state estimation can result in incorrect power flow control and dispatch, thereby affecting the normal operation and energy distribution of the system. This has significant implications for the reliability and security of the regional energy internet system.
4.2. Model performance evaluation
To evaluate the performance of the proposed model, this paper introduces the Confusion Matrix to quantify the gap between predicted results and actual outcomes. The Confusion Matrix is a method for visualizing computational results, and its structure is shown in Table 3. From this matrix, four key parameters can be derived: true positive (TP), true negative (TN), false positive (FP), and false negative (FN). Using these parameters, several evaluation metrics can be calculated, including accuracy, precision, recall, and F1-score, as well as the receiver operating characteristic (ROC) curve and the area under the curve (AUC), to quantify the model's performance. These metrics are defined as follows:
Confusion matrix
Actual value (positive) | Actual value (negative) | |
Predicted value (positive) | TP | FP |
Predicted value (negative) | FN | TN |
Accuracy reflects the overall correctness of the model's predictions. Precision evaluates the proportion of correctly predicted positive samples among all samples predicted as positive. Recall measures the model's ability to correctly identify positive samples among all actual positive samples. The F1-score is used to assess the model's performance on imbalanced datasets and is the harmonic mean of Precision and Recall.
To validate the effectiveness of the VNN-DM detection model in TSA detection tasks, two sets of experiments were designed to compare the performance of different models on the same test dataset. The first set of experiments analyzed the detection capability differences between a single-layer convolutional model, the reference model, and the proposed VNN-DM model, aiming to verify the performance improvements in feature extraction and classification achieved by combining a multi-layer convolutional network structure with a capsule network. The second set of experiments compared traditional machine learning models, including support vector machine (SVM), K-nearest neighbor (KNN), and MLP, to further assess the performance improvements of the VNN-DM model over traditional models. The evaluation metrics for all models in both sets of experiments are shown in Table 4.
Model rating index
Model | Accuracy | Precision | Recall | F1-score |
VNN-DM: Vector neural network-based detection model; MLP: multi-layer perceptron; SVM: support vector machine; KNN: K-nearest neighbor. | ||||
1-layer convolutional model | 0.5493 | 0.5591 | 0.4667 | 0.5087 |
Model from ref.[20] | 0.8747 | 0.8482 | 0.9127 | 0.8793 |
VNN-DM | 0.8950 | 0.8741 | 0.9207 | 0.8968 |
MLP | 0.8153 | 0.7986 | 0.8433 | 0.8204 |
SVM | 0.7740 | 0.7553 | 0.8107 | 0.7820 |
KNN | 0.6487 | 0.6345 | 0.7013 | 0.6662 |
Additionally, to further highlight the classification performance of the models, ROC curves were plotted for both sets of experiments. The ROC curve illustrates the model's discriminative ability by displaying the relationship between the true positive rate (TPR) and the false positive rate (FPR). To quantify the overall performance of the ROC curve, the AUC was calculated, with values closer to 1 indicating better model performance. Figure 4 presents the ROC curves for the different models, with Figure 4A showing the ROC curve and AUC values for the first experiment, and Figure 4B for the second experiment.
Figure 4. ROC curves and AUC values corresponding to different models. (A) First set of experiment; (B) Second set of experiment. ROC: Receiver operating characteristic; AUC: area under the curve.
An analysis of the ROC curves and the experimental results in Table 4 clearly demonstrates significant performance differences among the models in the TSA detection task. In the first set of experiments, the single-layer convolutional model performed poorly across all metrics, indicating clear deficiencies in feature extraction and classification, making it difficult to handle data with complex temporal features. In contrast, the reference model showed considerable improvement, but still suffered from a certain degree of false positives and false negatives, indicating that the detection performance was not optimal. The proposed VNN-DM model, utilizing a multi-layer convolutional structure, outperformed the other models in terms of accuracy, precision, and recall. As shown by the ROC curve in Figure 4A, the AUC value of the VNN-DM model is 0.96, higher than the 0.57 of the single-layer convolutional model and the 0.94 of the reference model. This demonstrates that the VNN-DM model can more effectively differentiate between normal data and attack data, particularly when dealing with complex multi-node joint attacks and small phase disturbances, exhibiting higher detection accuracy and robustness.
In the second set of experiments, the VNN-DM model achieved an F1-score of 0.8968, significantly higher than the SVM model's 0.7820 and the KNN model's 0.6662, indicating that the VNN-DM model is more effective at extracting data features when handling complex temporal features and multi-node attacks, thus exhibiting greater classification ability and robustness. The MLP model performed well on some metrics, but its F1-score of 0.8204 was still lower than that of the VNN-DM model. The analysis of the ROC curve in Figure 4B shows that the ROC curve of the VNN-DM model is closer to the upper left corner, with an AUC value of 0.96, significantly outperforming other traditional models. This indicates that the VNN-DM model maintains high classification accuracy and low false-positive and false-negative rates when addressing the problem of TSAs in the Park-Level Energy Internet. Therefore, through the combination of a multi-layer convolutional structure and a dynamic routing mechanism, the VNN-DM model further enhances its ability to extract and classify multi-scale temporal features, making it more adaptable to various complex attack types in the Park-Level Energy Internet environment, thus establishing it as a more robust TSA detection model.
5. CONCLUSIONS
We address the challenge of TSA in the park-level energy internet by proposing the VNN-DM model, an innovative detection framework that combines VNNs with CNN, specifically tailored for µPMU-based TSA detection. Experimental results validate that VNN-DM achieves high accuracy and robustness, outperforming benchmark models, and thus advancing the current state-of-the-art in TSA detection. Through comprehensive analysis of µPMU data, we demonstrate the practical applicability of the model to maintaining reliable state estimation under TSA conditions, effectively mitigating a critical vulnerability in the Energy Internet. The unique architecture of VNN-DM, integrating vector processing and capsule networks, enables precise extraction of multi-scale temporal features, representing a significant methodological advancement over traditional approaches. Future efforts will focus on deploying the model on edge devices, thereby extending its applicability to more diverse and complex real-world scenarios. VNN-DM thus offers a deployable solution for bolstering grid resilience against TSA, contributing to the secure evolution of smart grid infrastructure and setting a new benchmark within this field.
DECLARATIONS
Acknowledgements
A part of the experiment results in this paper is simulated by SimuNPS.
Authors' contributions
Implemented the methodologies presented and wrote the paper: Yang J
Developed the idea of the proposed framework: Shi F
Responsible for data collection and technical support: Li Y, Zhao Z
Managed and supervised the research project: Cui Q
All authors have revised the text and agreed to the published version of the manuscript.
Availability of data and materials
Not applicable.
Financial support and sponsorship
The work is supported by the National Natural Science Foundation of China (No. U23A20651)
Conflicts of interest
All authors declared that there are no conflicts of interest.
Ethical approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Copyright
© The Author(s) 2024.
REFERENCES
1. Wu Z, Mao L, Li K, He S. Power distribution network state assessment technology based on unified computing resource pool. In: 2022 7th Asia Conference on Power and Electrical Engineering (ACPEE); 2022 Apr 15-17; Hangzhou, China. IEEE; 2022. pp. 931–7.
2. Phadke AG, Bi T. Phasor measurement units, WAMS, and their applications in protection and control of power systems. J Mod Power Syst Clean Energy 2018;6:619-9.
3. Sexauer J, Javanbakht P, Mohagheghi S. Phasor measurement units for the distribution grid: Necessity and benefits. In: 2013 IEEE PES innovative smart grid technologies conference (ISGT); 2013 Feb 24-27; Washington, USA. IEEE; 2013. p. 1–6.
4. Xue AC, Xu FY, You HY, Xu J, Martin KE, Bi T. Robust parameter identification of distribution line based on micro PMU. Electr Power Autom Equip 2019;39:1-7.
5. Zhao T, Li Z, Zou B, He Z, Ren S. Wide-area time synchronization method for mutual preparation of satellite clock and network clock. Automat Electr Power Syst 2017;41:202-7.
6. Xu J, Wu Z, Hu Q, et al. Interval state estimation for active distribution networks considering uncertainties of multiple types of DGs and loads. Proc CSEE 2018;38:3255-66.
7. Tian S, Li K, Wei S, Fu Y, Li Z, Liu S. Security situation awareness approach for distribution network based on synchronous phasor measurement unit. Proc CSEE 2021;41:617-31.
8. Qian B, Cai Z, Xiao Y, et al. Review on time synchronization attack in power system. Power Syst Technol 2020;44:4035-45.
9. Zhao X, Liu G, Li L. Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems. Intell Robot 2024;4:244-55.
10. Bi T, Guo J, Xu K, Zhang L, Yang Q. The impact of time synchronization deviation on the performance of synchrophasor measurements and wide area damping control. IEEE Trans Smart Grid 2017;8:1545-52.
11. Shang Y. Resilient vector consensus over random dynamic networks under mobile malicious attacks. Comput J 2023;67:1076-86.
12. Shang Y. Resilient consensus in continuous-time networks with
13. Zeng H, Ye Z, Zhang D, Lu Q. Robust distributed model predictive control of connected vehicle platoon against DoS attacks. Intell Robot 2023;3:288-305.
14. Xue A, Xu F, Martin KE, Xu J, You H, Bi T. Linear approximations for the influence of phasor angle difference errors on line parameter calculation. IEEE Trans Power Syst 2019;34:3455-64.
15. Saraswat D, Bhattacharya P, Zuhair M, Verma A, Kumar A. AnSMart: a SVM-based anomaly detection scheme via system profiling in smart grids. In: 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM); 2021 Apr 28-30; London, UK. IEEE; 2021. pp. 417–22.
16. Niu X, Li J, Sun J, Tomsovic K. Dynamic detection of false data injection attack in smart grid using deep learning. In: 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT); 2019 Feb 18-21; Washington, USA. IEEE; 2019. pp. 1–6.
17. Jeyaselvi M, Sathya M, Suchitra S, Ibrahim SJA, Chakravarthy NSK. SVM-based cloning and jamming attack detection in IoT sensor networks. In: Goar V, Kuri M, Kumar R, Senjyu T, editors. Advances in information communication technology and computing: proceedings of AICTC 2021. Springer; 2022. pp. 461–71.
19. Zhang Y, Wang J, Chen B. Detecting false data injection attacks in smart grids: a semi-supervised deep learning approach. IEEE Trans Smart Grid 2020;12:623-34.
21. Hoang TM, Nguyen NM, Duong TQ. Detection of eavesdropping attack in UAV-aided wireless systems: Unsupervised learning with one-class SVM and k-means clustering. IEEE Wireless Commun Lett 2019;9:139-42.
22. Ma Z, Ma H, Gao X, et al. An improved DDoS attack detection model based on unsupervised learning in smart grid. In: Xiong J, Wu S, Peng C, Tian Y, editors. International Conference on Mobile Multimedia Communications. Springer; 2021. pp. 550–62.
23. Zheng C, Wang H, Liu R. A review of research on DDoS attack detection in SDNs. Comput Eng Appl 2024;1–20. Available from: https://link.cnki.net/urlid/11.2127.TP.20240814.1351.006. [Last accessed on 25 Nov 2024].
24. Huang R, Li Y. False phasor data detection under time synchronization attacks: a neural network approach. IEEE Trans Smart Grid 2022;13:4828-36.
25. Akkaya I, Lee EA, Derler P. Model-based evaluation of GPS spoofing attacks on power grid sensors. In: 2013 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES); 2013 May 20; Berkeley, USA. IEEE; 2013. p. 1–6.
26. Zhang Z, Gong S, Dimitrovski AD, Li H. Time synchronization attack in smart grid: impact and analysis. IEEE Trans Smart Grid 2013;4:87-98.
27. Jiang X, Zhang J, Harding BJ, Makela JJ, Domínguez-García AD. Spoofing GPS receiver clock offset of phasor measurement units. IEEE Trans Power Syst 2013;28:3253-62.
28. Shepard DP, Humphreys TE, Fansler AA. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. Int J Crit Infrastruct Prot 2012;5:146-53.
29. Shereen E, Delcourt M, Barreto S, Dán G, Le Boudec JY, Paolone M. Feasibility of time-synchronization attacks against PMU-based state estimation. IEEE Trans Instrum Meas 2020;69:3412-27.
30. Hinton GE, Krizhevsky A, Wang SD. Transforming auto-encoders. In: Artificial Neural Networks and Machine Learning - ICANN 2011: 21st International Conference on Artificial Neural Networks. Springer; 2011. pp. 44–51.
Cite This Article
How to Cite
Yang, J.; Shi, F.; Li, Y.; Zhao, Z.; Cui, Q. VNN-DM: a vector neural network-based detection model for time synchronization attacks in park-level energy internet. Intell. Robot. 2024, 4, 406-21. http://dx.doi.org/10.20517/ir.2024.24
Download Citation
Export Citation File:
Type of Import
Tips on Downloading Citation
Citation Manager File Format
Type of Import
Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.
Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.
Comments
Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at support@oaepublish.com.