Journal of Modern Power Systems and Clean Energy

ISSN 2196-5625 CN 32-1884/TK

An Intrusion Detection Method for Advanced Metering Infrastructure System Based on Federated Learning
Author:
Affiliation:

1. School of Electrical and Information Engineering, Changsha University of Science and Technology, Changsha 410114, China 2.the Hunan Institute of Engineering, Xiangtan 411104, China

Fund Project:

This work was supported in part by the National Natural Science Foundation of China (No. 51807013), the Foundation of Hunan Educational Committee (No. 18B137), the Research Project in Hunan Province Education Department (No. 21C0577), and Postgraduate Research and Innovation Project of Hunan Province, China (No. CX20210791).

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
    Abstract:

    An advanced metering infrastructure (AMI) system plays a key role in the smart grid (SG), but it is vulnerable to cyberattacks. Current detection methods for AMI cyberattacks mainly focus on the data center or a distributed independent node. On one hand, it is difficult to train an excellent detection intrusion model on a self-learning independent node. On the other hand, large amounts of data are shared over the network and uploaded to a central node for training. These processes may compromise data privacy, cause communication delay, and incur high communication costs. With these limitations, we propose an intrusion detection method for AMI system based on federated learning (FL). The intrusion detection system is deployed in the data concentrators for training, and only its model parameters are communicated to the data center. Furthermore, the data center distributes the learning to each data concentrator through aggregation and weight assignments for collaborative learning. An optimized deep neural network (DNN) is exploited for this proposed method, and extensive experiments based on the NSL-KDD dataset are carried out. From the results, this proposed method improves detection performance and reduces computation costs, communication delays, and communication overheads while guaranteeing data privacy.

    Reference
    Related
    Cited by
Get Citation
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 08,2021
  • Revised:August 28,2021
  • Adopted:
  • Online: May 23,2023
  • Published: