A Deep Learning Based Secured Energy Management Framework Within a Smart Island

Qianqian Chang,Xiaolin Ma,Ming Chen,Xinwei Gao,Moslem Dehghani
DOI: https://doi.org/10.1016/j.scs.2021.102938
IF: 11.7
2021-01-01
Sustainable Cities and Society
Abstract:This study proposes a novel secured management method for renewable microgrids considering the policies required for diagnosing cyber-attacks happening in the communication networks, usually applied in the secondary control layer of microgrids (MGs). Due to the so long stochastic and bad information entering the systems in order to make malicious attacks, their location and time data links have the ability of straying of those acting in normal conditions that attempt to have an effect on the precise voltage regulation and current dividing via influencing sensors of current and voltage. The ability to extract high-level features due to the usage of fast fourier transform (FFT) and deep learning (DL) for attack detection in cyberspace has made them to be considered as a strong technique in the face of small mutations or new attacks. These self-educated and compaction abilities of DL architectures have been considered as basic techniques for hidden scheme detection from the training datum for this reason attacks have been distinguished from benign traffic. A novel method, deep learning and FFT, for cyber-security has been used in the following paper with the aim of enabling the attacks detection in DC smart MG. The deep model and traditional machine learning way are evaluated in terms of performance, and distributed attack detection has been compared to the centralized diagnosing procedure. The tests proved that the distributed attack detection system studied can be more advanced in comparison with centralized detection systems applying FFT in the role of the input index of the DL model. This suggested distributed method enables for scalable monitoring of a MG and has the ability of detecting the existence of cyber-attacks in the communications between distributed generation agents (DGAs) controlled via a control on the basis of consensus and isolating the communication link over that the attack has been injected. Any local attack detection needs restricted information about its neighbor's dynamics. The most important factor of the proposed detection plan can be that has the ability of detecting cyber-attacks with great precision and distinguishing cyber-attack from load changes.in addition, this has been shown that the suggested model can be further useful in the detection of the attack.
What problem does this paper attempt to address?