Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid
Abstract: The rapid growth of distributed energy resources (DERs), such as renewable energy sources, generators, consumers, and prosumers in the smart grid infrastructure, poses significant cybersecurity and trust challenges to the grid controller. Consequently, it is crucial to identify adversarial tactics and measure the strength of the attacker's DER. To enable a trustworthy smart grid controller, this work investigates a trustworthy AI mechanism for proactive identification and explanation of the cyber risk caused by the control/status message of DERs. Thus, proposing and developing a trustworthy AI framework to facilitate the deployment of any AI algorithms for detecting potential cyber threats and analyzing root causes based on Shapley value interpretation while dynamically quantifying the risk of an attack based on Ward's minimum variance formula. The experiment with a state-of-the-art dataset establishes the proposed framework as a trustworthy AI by fulfilling the capabilities of reliability, fairness, explainability, transparency, reproducibility, and accountability.
- U.S. Energy Information Administration, “Annual energy outlook 2023 with projections to 2050.”
- M. N. Nafees, N. Saxena, A. Cardenas, S. Grijalva, and P. Burnap, “Smart grid cyber-physical situational awareness of complex operational technology attacks: A review,” ACM Computing Surveys, vol. 55, no. 10, pp. 1–36, 2023.
- K. Bitirgen and Ümmühan Başaran Filik, “A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid,” International Journal of Critical Infrastructure Protection, vol. 40, p. 100582, 2023.
- H. Karimipour, A. Dehghantanha, R. M. Parizi, K.-K. R. Choo, and H. Leung, “A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids,” IEEE Access, vol. 7, pp. 80 778–80 788, 2019.
- M. N. Kurt, O. Ogundijo, C. Li, and X. Wang, “Online cyber-attack detection in smart grid: A reinforcement learning approach,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 5174–5185, 2019.
- R. Dwivedi, D. Dave, H. Naik, S. Singhal, R. Omer, P. Patel, B. Qian, Z. Wen, T. Shah, G. Morgan, and R. Ranjan, “Explainable ai (xai): Core ideas, techniques, and solutions,” ACM Comput. Surv., vol. 55, no. 9, jan 2023. [Online]. Available: https://doi.org/10.1145/3561048
- J. M. Wing, “Trustworthy ai,” Commun. ACM, vol. 64, no. 10, p. 64–71, sep 2021. [Online]. Available: https://doi.org/10.1145/3448248
- L. Floridi, “Establishing the rules for building trustworthy ai,” Nature Machine Intelligence, vol. 1, no. 6, pp. 261–262, 2019.
- R. Chatila, V. Dignum, M. Fisher, F. Giannotti, K. Morik, S. Russell, and K. Yeung, “Trustworthy ai,” Reflections on Artificial Intelligence for Humanity, pp. 13–39, 2021.
- W. Liang, G. A. Tadesse, D. Ho, L. Fei-Fei, M. Zaharia, C. Zhang, and J. Zou, “Advances, challenges and opportunities in creating data for trustworthy ai,” Nature Machine Intelligence, vol. 4, no. 8, pp. 669–677, 2022.
- M. S. Munir, K. T. Kim, A. Adhikary, W. Saad, S. Shetty, S.-B. Park, and C. S. Hong, “Neuro-symbolic explainable artificial intelligence twin for zero-touch ioe in wireless network,” arXiv preprint arXiv:2210.06649, 2022.
- L. S. Shapley et al., “A value for n-person games,” 1953.
- M. S. Munir, S.-B. Park, and C. S. Hong, “An explainable artificial intelligence framework for quality-aware ioe service delivery,” in ICC 2022 - IEEE International Conference on Communications, 2022, pp. 4787–4793.
- P. Dubey, “On the uniqueness of the shapley value,” International Journal of Game Theory, vol. 4, no. 3, pp. 131–139, 1975.
- S. M. Lundberg and S.-I. Lee, “A unified approach to interpreting model predictions,” Advances in neural information processing systems, vol. 30, 2017.
- J. H. Ward Jr, “Hierarchical grouping to optimize an objective function,” Journal of the American statistical association, vol. 58, no. 301, pp. 236–244, 1963.
- M. Teixeira, M. Zolanvari, and R. Jain, “Wustl-iiot-2018,” 2020. [Online]. Available: https://dx.doi.org/10.21227/kzgp-7t84
- J. Sakhnini, H. Karimipour, and A. Dehghantanha, “Smart grid cyber attacks detection using supervised learning and heuristic feature selection,” in 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), 2019, pp. 108–112.
- M. S. Munir, D. H. Kim, S. W. Kang, L. Zou, and C. S. Hong, “Intelligent grid shepherd: Towards a resilient distributed energy resources control system,” in 2021 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS), 2021, pp. 398–401.
- M. S. Munir, N. H. Tran, W. Saad, and C. S. Hong, “Multi-agent meta-reinforcement learning for self-powered and sustainable edge computing systems,” IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3353–3374, 2021.
- M. S. Munir, K. T. Kim, K. Thar, D. Niyato, and C. S. Hong, “Risk adversarial learning system for connected and autonomous vehicle charging,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 15 184–15 203, 2022.
- Scikit-learn, “Ensemble methods,” https://scikit-learn.org/stable/modules/ensemble.html, accessed 26.04.2023.
- SHAP, “Welcome to the SHAP documentation,” https://scikit-learn.org/stable/modules/generated/sklearn.cluster.AgglomerativeClustering.html, accessed 26.04.2023.
- Scikit-learn, “sklearn.cluster.AgglomerativeClustering,” https://scikit-learn.org/stable/modules/ensemble.html, accessed 26.04.2023.
- ——, “sklearn.metrics: Metrics,” https://scikit-learn.org/stable/modules/classes.html.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.