International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)
Full Length Article

International Journal of Wireless and Ad Hoc Communication

Volume 6, Issue 1, PP: 38-49, 2023 | Cite this article as | XML | | Html PDF

Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats

Gopal Chaudhary   1 * , Smriti Srivastava   2 , Manju Khari   3

  • 1 VIPS-TC, School of Engineering & Technology, New Delhi, India - (gopal@vips.edu)
  • 2 School of Computer and System Sciences, Jawaharlal Nehru University, New Delhi-67 - (manjukhari@jnu.ac.in)
  • 3 Netaji Subhas University of Technology, New Delhi, - (smriti.nsit@gmail.com)
  • Doi: https://doi.org/10.54216/IJWAC.060104

    Received: October 12, 2022 Accepted: November 23, 2022
    Abstract

    The critical dependence of industrial smart grid systems on cutting-edge Internet of Things (IoT) technologies has made these systems more susceptible to a diverse array of assaults. This consequently puts at risk the integrity of energy data as well as the safety of energy management activities that depend on those data. This study offers a generative federated learning framework for semi-supervised threat detection in an IoT-assisted smart grid system. We refer to this framework as FSEI-Net. A unique semi-supervised edge intelligence network (SEI-Net) is presented in the FSEI-Net to enable semi-supervised training using labeled and unlabeled data in the edge tier. The design of SEI-Net is based on with bidirectional generative convolutional network that can intelligently capture the patterns of threat data from partially labeled smart grid data.  We present federated training to enable remote edge servers to work together on training a semi-supervised detector without disclosing their own private local data. This is accomplished through cooperative training. To facilitate communication between cloud and edge layers that is both secure and respectful of users' privacy, a reputation-based block chain is introduced in the FSEI-Net. The outcomes from the practical applications demonstrate that the effectiveness of the proposed FSEI-Net over the most recent cutting-edge detection approaches are valid

    Keywords :

    Industrial Smart Grid , Federated Learning , Energy Protection , Attack Detection.

    References

    [1] M. Abdel-Basset, H. Hawash, and K. Sallam, “Federated Threat-Hunting Approach for Microservice-Based Industrial

    Cyber-Physical System,” IEEE Trans. Ind. Informatics, 2022, doi: 10.1109/TII.2021.3091150.

    [2] P. Kumar, R. Kumar, G. P. Gupta, R. Tripathi, and G. Srivastava, “P2TIF: A Blockchain and Deep Learning Framework

    for Privacy-Preserved Threat Intelligence in Industrial IoT,” IEEE Trans. Ind. Informatics, 2022, doi:

    10.1109/TII.2022.3142030.

    [3] W. Zhang, Y. Bai, and J. Feng, “TIIA: A blockchain-enabled Threat Intelligence Integrity Audit scheme for IIoT,”

    Futur. Gener. Comput. Syst., 2022, doi: 10.1016/j.future.2022.02.023.

    [4] G. Cascavilla, D. A. Tamburri, and W. J. Van Den Heuvel, “Cybercrime threat intelligence: A systematic multi-vocal

    literature review,” Computers and Security. 2021, doi: 10.1016/j.cose.2021.102258.

    [5] M. Abdel-Basset, V. Chang, H. Hawash, R. K. Chakrabortty, and M. Ryan, “Deep-IFS: Intrusion Detection Approach for

    Industrial Internet of Things Traffic in Fog Environment,” IEEE Trans. Ind. Informatics, 2021, doi:

    10.1109/TII.2020.3025755.

    [6] M. van Haastrecht et al., “Correction: van Haastrecht et al. A Shared Cyber Threat Intelligence Solution for SMEs.

    Electronics 2021, 10, 2913,” Electronics (Switzerland). 2022, doi: 10.3390/electronics11030349.

    [7] M. van Haastrecht et al., “A shared cyber threat intelligence solution for smes,” Electron., 2021, doi:

    10.3390/electronics10232913.

    [8] S. Gong and C. Lee, “Cyber threat intelligence framework for incident response in an energy cloud platform,” Electron.,

    2021, doi: 10.3390/electronics10030239.

    [9] C. Liu, J. Wang, and X. Chen, “Threat intelligence ATT&CK extraction based on the attention transformer

    hierarchical recurrent neural network,” Appl. Soft Comput., vol. 122, p. 108826, Jun. 2022, doi:

    10.1016/j.asoc.2022.108826.

    [10] M. Ebrahimi, J. F. Nunamaker, and H. Chen, “Semi-Supervised Cyber Threat Identification in Dark Net Markets: A

    Transductive and Deep Learning Approach,” J. Manag. Inf. Syst., 2020, doi: 10.1080/07421222.2020.1790186.

    [11] Y. Li, J. Li, and Y. Wang, “Privacy-Preserving Spatiotemporal Scenario Generation of Renewable Energies: A Federated

    Deep Generative Learning Approach,” IEEE Trans. Ind. Informatics, 2022, doi: 10.1109/TII.2021.3098259.

    [12] D. Xu et al., “Edge Intelligence: Empowering Intelligence to the Edge of Network,” Proc. IEEE, 2021, doi:

    10.1109/JPROC.2021.3119950.

    [13] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge Intelligence: Paving the Last Mile of Artificial

    Intelligence With Edge Computing,” Proc. IEEE, 2019, doi: 10.1109/JPROC.2019.2918951.

    [14] O. Gomez-Carmona, D. Casado-Mansilla, D. Lopez-De-Ipina, and J. Garcia-Zubia, “Optimizing Computational

    Resources for Edge Intelligence Through Model Cascade Strategies,” IEEE Internet Things J., 2022, doi:

    10.1109/JIOT.2021.3118845.

    [15] Y. Wu, H.-N. Dai, and H. Wang, “Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT

    Critical Infrastructures in Industry 4.0,” IEEE Internet Things J., vol. XX, no. X, pp. 1–1, 2020, doi:

    10.1109/jiot.2020.3025916.

    [16] S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain Meets Edge Computing: A Distributed and Trusted

    Authentication System,” IEEE Trans. Ind. Informatics, 2020, doi: 10.1109/TII.2019.2938001.

    [17] S. Rathore and J. H. Park, “A Blockchain-based Deep Learning Approach for Cyber Security in Next Generation

    Industrial Cyber-Physical Systems,” IEEE Trans. Ind. Informatics, 2020, doi: 10.1109/tii.2020.3040968.

    [18] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” 2009, doi:

    10.1109/CISDA.2009.5356528.

    [19] N. Moustafa, B. Turnbull, and K. K. R. Choo, “An ensemble intrusion detection technique based on proposed statistical

    flow features for protecting network traffic of internet of things,” IEEE Internet Things J., 2019, doi:

    10.1109/JIOT.2018.2871719.

    [20] Y. Zhang, J. Wang, and B. Chen, “Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep

    Learning Approach,” IEEE Trans. Smart Grid, 2021, doi: 10.1109/TSG.2020.3010510.

    [21] S. Gamage and J. Samarabandu, “Deep learning methods in network intrusion detection: A survey and an objective

    comparison,” J. Netw. Comput. Appl., 2020, doi: 10.1016/j.jnca.2020.102767.

    Cite This Article As :
    Gopal Chaudhary, Smriti Srivastava, Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats." Full Length Article, Vol. 6, No. 1, 2023 ,PP. 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
    Gopal Chaudhary, Smriti Srivastava, Manju Khari. (2023). Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats. Journal of , 6 ( 1 ), 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
    Gopal Chaudhary, Smriti Srivastava, Manju Khari. "Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats." Journal of , 6 no. 1 (2023): 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
    Gopal Chaudhary, Smriti Srivastava, Manju Khari. (2023). Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats. Journal of , 6 ( 1 ), 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
    Gopal Chaudhary, Smriti Srivastava, Manju Khari. Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats. Journal of , (2023); 6 ( 1 ): 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)
    Gopal Chaudhary, Smriti Srivastava, Manju Khari, Generative Edge Intelligence for Securing IoT-assisted Smart Grid against Cyber-Threats, Journal of , Vol. 6 , No. 1 , (2023) : 38-49 (Doi   :  https://doi.org/10.54216/IJWAC.060104)