ArticlePDF Available

Digital twin-driven SDN for smart grid: A deep learning integrated blockchain for cybersecurity

Authors:
  • LUT university

Abstract and Figures

Internet of Things (IoT)-enabled Smart Grid (SG) network is envisioned as the next-generation network for intelligent and efficient electric power transmission. In SG environment, the Smart Meters (SMs) mostly exchange services and data from Service Providers (SPs) via insecure public channel. This makes the entire SG ecosystem vulnerable to various security threats. Motivated from the aforementioned challenges, we incorporate Digital Twin (DT) technology, Software-Defined Networking (SDN), Deep Learning (DL) and blockchain into the design of a novel SG network. Specifically, a secure communication channel is first designed using an authentication method based on blockchain technology that has the ability to withstand a number of well-known assaults. Second, a new DL architecture that includes a self-attention mechanism, a Bidirectional-Gated Recurrent Unit (Bi-GRU) model, fully connected layers, and a softmax classifier is designed to enhance the attack detection process in SG environments. To deliver low latency and real-time services, the SDN is next employed as the network's backbone to send requests from SMs to a global SDN controller. DT technology is finally integrated into the SDN control plane, which stores the operating states and behavior models of SMs and communicates with SMs. The efficiency of the proposed framework is demonstrated by the blockchain implementation used in the SG network to assess computing time for the various numbers of transactions per block. Finally, the numerical results based on the N-BaIoT dataset shows better intrusion detection.
Content may be subject to copyright.
Solar Energy 263 (2023) 111921
Available online 25 August 2023
0038-092X/© 2023 The Authors. Published by Elsevier Ltd on behalf of International Solar Energy Society. This is an open access article under the CC BY license
(http://creativecommons.org/licenses/by/4.0/).
Contents lists available at ScienceDirect
Solar Energy
journal homepage: www.elsevier.com/locate/solener
Digital twin-driven SDN for smart grid: A deep learning integrated
blockchain for cybersecurity
Prabhat Kumar a,, Randhir Kumar b, Ahamed Aljuhani c, Danish Javeed d, Alireza Jolfaei e,
A. K. M. Najmul Islam a
aDepartment of Software Engineering, LUT School of Engineering Science, LUT University, 53850 Lappeenranta, Finland
bDepartment of Computer Science and Engineering, SRM University AP, AP 522240, India
cDepartment of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
dSoftware College, Northeastern University, Shenyang 110169, China
eCollege of Science and Engineering, Flinders University, Adelaide, Australia
ARTICLE INFO
Keywords:
Blockchain
Deep learning
Digital twin
Internet of things
Smart grid
Software-defined networking
ABSTRACT
Internet of Things (IoT)-enabled Smart Grid (SG) network is envisioned as the next-generation network for
intelligent and efficient electric power transmission. In SG environment, the Smart Meters (SMs) mostly
exchange services and data from Service Providers (SPs) via insecure public channel. This makes the entire
SG ecosystem vulnerable to various security threats. Motivated from the aforementioned challenges, we
incorporate Digital Twin (DT) technology, Software-Defined Networking (SDN), Deep Learning (DL) and
blockchain into the design of a novel SG network. Specifically, a secure communication channel is first designed
using an authentication method based on blockchain technology that has the ability to withstand a number of
well-known assaults. Second, a new DL architecture that includes a self-attention mechanism, a Bidirectional-
Gated Recurrent Unit (Bi-GRU) model, fully connected layers, and a softmax classifier is designed to enhance
the attack detection process in SG environments. To deliver low latency and real-time services, the SDN is next
employed as the network’s backbone to send requests from SMs to a global SDN controller. DT technology is
finally integrated into the SDN control plane, which stores the operating states and behavior models of SMs
and communicates with SMs. The efficiency of the proposed framework is demonstrated by the blockchain
implementation used in the SG network to assess computing time for the various numbers of transactions per
block. Finally, the numerical results based on the N-BaIoT dataset shows better intrusion detection.
1. Introduction
The use of Internet of Things (IoT) has grown so rapidly due
to many advances in technology. This use of IoT devices has been
involved in a diverse range of critical sectors including healthcare,
agriculture, and energy sector [1,2]. For example, the deployment of
IoT technology in energy grid which enables to gather, share, and
analyze real-time data about energy consumption such as home and
street lights through different wireless devices such as sensors, gate-
ways, and routers. The integration of IoT technology into electric
grids has led to the IoT-enabled smart grid. When compared to tra-
ditional grids, the IoT-enabled smart grid can address several issues
such as power outages, solar flares, and security concerns [3], [4].
Additionally, IoT-enabled smart grid adopts alternative solutions such
as solar-based smart grids control in the event of widespread black-
outs or energy shortages. The IoT-enabled smart grid has become an
Corresponding author.
E-mail addresses: prabhat.kumar@lut.fi (P. Kumar), randhir.honeywell@ieee.org (R. Kumar), a_aljuhani@ut.edu.sa (A. Aljuhani), 2027016@stu.neu.edu.cn
(D. Javeed), alireza.jolfaei@flinders.edu.au (A. Jolfaei), najmul.islam@lut.fi (A.K.M.N. Islam).
essential part in the development of energy systems in modern cities,
with the goal of improving the safety, efficiency, and sustainability
of energy management [5]. The IoT-enabled smart grid relies on dif-
ferent telecommunication networks and smart emerging technologies
that cooperate together to improve the quality of energy services for
consumers. Such an emerging technology communicates with sensors,
actuators, machines, gateways, and heterogeneous networks that sense,
exchange, and process data via different communication technologies
(e.g., Bluetooth, ZigBee, WiMax, and 5G/LTE).
Although IoT-enabled smart grid has introduced many great fea-
tures for energy consumers, it carries with itself several security and
privacy issues [6,7]. As the nature of IoT-enabled smart grid, which
includes heterogeneous and homogeneous smart devices, networks, and
applications, sensing data in such environments is transmitted over an
https://doi.org/10.1016/j.solener.2023.111921
Received 24 January 2023; Received in revised form 5 June 2023; Accepted 28 July 2023
Solar Energy 263 (2023) 111921
2
P. Kumar et al.
insecure communication channel, exposing it to a number of privacy
and security issues [8]. For example, Man-in-the-Middle (MiTM) attacks
compromise the integrity and confidentiality of data exchanged among
legitimate entities in such an environment [9]. The availability of smart
grid is also critical in the preservation of security functionalities from
cyber threats. A well-known cyber-attack that threatens smart grid ser-
vice availability is the DDoS attack [10]. As the nature of IoT-enabled
smart grid requires all the smart things verifying their authenticity
and ensuring that smart devices can be trusted to communicate and
exchange information among such entities, the authentication of sens-
ing devices is crucial to avoiding cyberattacks in such a connected
environment [11].
Digital Twin (DT) has recently gained attention in a variety of fields
(e.g., healthcare and energy) [12,13]. A DT is a simulated version
of a real-world system. Such a technology assists in the conduct of
experiments, the testing of hypotheses, and the prediction of smart
grid system’s behavior. The DT has emerged as a promising solution
for IoT-enabled smart grid challenges such as smart grid management,
operations, and cybersecurity concerns. As IoT-enabled smart grids
become targets for various cyberattack threats, security measures such
as firewalls, IDS and IPS become increasingly important in protecting
such a connected environment. However, deploying and testing secu-
rity functions of running systems in smart grids is critical and time
consuming. The DT has the potential to improve security measures in
the IoT-enabled smart grid by maintaining and testing fully security
functional digital twins in an isolated environment to provide reliable,
resilient, and sustainable of IoT-enabled smart grid systems. Several
existing works on the use of DT as an enabler for improved security
have been proposed in the literature [1419]. However, little work has
been done toward DT for IoT-enabled smart grid cybersecurity.
Recently, blockchain technology has been applied in a diverse range
of critical domains and integrated with different emerging technolo-
gies to provide secure and trustworthy systems. Along with other
smart technologies, blockchain technology has gained much attention
in the energy domain for privacy-preserving and secure data sharing
among different smart things in such a connected environment [20].
Blockchain is a peer to peer (P2P) network where peers can communi-
cate and do transactions without the need for a centralized authority.
Blockchain transactions are immutable and traceable, therefor any
attempt to change or manipulate data will be detected [21]. In addition,
the data integrity and confidentiality are ensured through various
cryptographic mechanisms such as symmetric/asymmetric encryption
methods and hash functions, which protect IoT-enabled smart grid data
from unauthorized access [22]. Blockchain can greatly enhance the
privacy and security of data sharing in IoT-enabled smart grid while
also improving interoperability and reliability in such connected envi-
ronments. As the communication among smart objects in IoT-enabled
smart grid environments is done through the public and insecure
channels [23], an adversary may exploit vulnerabilities and violate data
privacy among the smart objects in such a connected environment.
To overcome such serious threats, blockchain-based authentication
and key agreements ensure data sharing security and privacy in IoT-
enabled smart grid networks. Blockchain-based authentication allows
connected devices to authenticate each other with their own secret
credentials, while key agreements are involved to establish secret keys
among authenticated devices. Various existing blockchain-based au-
thentication and key agreement approaches have been proposed in
the literature [2426]. However, less work has been done toward
blockchain for DT in IoT-enabled smart grid.
With the growing development of IoT-enabled smart grid, Artificial
Intelligence (AI) is becoming increasingly important in transforming
the traditional energy systems into cost-effective, autonomous, and in-
telligent systems [27]. The IoT-enabled smart grid can benefits from AI
in many different aspects, including monitoring and controlling grids,
fault detection, safety and security. Specifically, machine learning and
deep learning have sparked interest in protecting such a connected
environment from various types of cyberattacks [27]. Increasing the
security and privacy of sharing data among connected entities from
insider and outsider attacks is critical for providing sustainable and
secure smart grid systems. The enormous amount of heterogeneous,
homogeneous, and ambiguous data generated by IoT-enabled smart
grid networks necessitates a reliable, cost-effective, and robust de-
tection scheme to combat cyberattacks in such a connected network.
IDS becomes an efficient security tool for dealing with a wide range
of cyberattacks. Deep learning (DL) techniques have recently been
fully integrated with IDS and have become an integral part of other
security functions to protect intelligent systems from various types
of cyberattacks [27,28]. When compared to traditional ML, DL is a
better alternative for solving high-dimensional features and providing
more accurate models [29,30]. Although several works on IDS-based
deep learning schemes for IoT-enabled smart grid have been proposed
to ensure security and privacy-preserving of data sharing in such a
connected environment [3133]. However, some limitations in the
existing approaches have been observed, such as low accuracy [34],
high complexity, outdated datasets, and being limited to specific types
of cyberattacks.
In addition to other emerging technologies, software defined net-
working (SDN) is a promising emerging technology with a high poten-
tial for deployment in IoT-enabled smart grid environments [35]. The
SDN architecture is designed to decouple control plane from network
hardware, allowing simplicity of network services, flexibility of net-
work management, and full network programmability [36]. The control
plane offers a full abstraction of the underlying SDN-enabled trans-
portation systems. Although the control plane of SDN-enabled smart
power grid is critical for networking management, routing, monitoring,
decision making, and so on, it is vulnerable to a single point of failure
and DDoS attacks [37,38]. Therefore, a centralized controller of SDN-
enabled smart power grid could be a target of different cyberattacks
aimed at disrupting the entire networking functionalities of a con-
nected system. Several existing works related to SDN-enabled smart
grids have been proposed, such as [3941]; however, those works
lack scalability, have inadequate security analysis, and do not provide
a foundational integration framework with additional technologies in
IoT-enabled smart grid networks.
Although existing authentication and key agreements mechanisms
rely primarily on blockchain-based scheme for securing data sharing
in such connected networks. However, some of those solutions suffers
from consensus delay, high computational complexity, and lack of
scalability [4244]. Additionally, blockchain suffers from data privacy
vulnerabilities that can be exploited by intruders [45]. The security
challenges of SDN controller is critical in ensuring network monitoring
and management of smart power grid systems. On the other hand, IDS
and deep learning techniques should be used to overcome such security
risks and ensure secure data sharing among sensing devices in such a
connected network. Meanwhile, many existing IDS-based schemes in
smart grid networks are designed to detect specific type of cyberattacks;
however, in practical uses and real application of such a connected
network, both internal and external IoT-enabled smart grid networks
are susceptible to a variety of malicious cyberattacks. As several ex-
isting security solutions rely on either a blockchain-based scheme or
IDS-based scheme; however, little research has been conducted on
blockchain and deep learning-enabled secure data sharing for DT in
IoT-enabled smart grid. We believe that Blockchain technology and
deep learning schemes can greatly complement each other to provide
cost-effective, secure, sustainable, and resilient IoT-enabled smart grid.
1.1. System model
1.1.1. Digital twin-driven software-defined networking for smart grid net-
works
The network model of DT-driven SDN for SG is shown in Fig. 1.
Three distinct planes with various participating entities make up this
Solar Energy 263 (2023) 111921
3
P. Kumar et al.
Fig. 1. DT-driven SDN for secure data sharing in smart grid network.
model. For instance, the data plane has a variety of intelligent sources
that are in charge of generating and transmitting data. This plane is
equipped with Smart Meters (SMs), Open Flow Switches (OFSs) and
Service Providers (SPs). The SMs are in charge of reading the amount
of electricity utilized and electricity used time. The SDN forwarding
devices, also referred to as OFSs, forward the generated or collected
data to SPs and SDN Controller (SDNCs) at the control plane using
an unsecured channel on a hop-to-hop basis. The SP, who are in
charge of organizing the system for allocating electricity and trading
energy, conducts an analysis of the data that they have collected. The
core decision-making body, the SDNC, keeps track of how SG’s global
traffic is routed. The DT is situated at the application plane and is
in charge of using the collected data to enhance the SG network’s
data analytics capabilities (such as grid states and electrical equipment
management). However, the reliability of the data collected cannot be
guaranteed, because communication occurs across insecure channels at
lower planes. Therefore, it is essential to develop a secure and efficient
access control with effective strategy across SG entities at the data
plane.
1.2. Research contribution
The prime contributions of this research are as follows:
(1) Secure DT-driven SDN under blockchain-based authentication sche-
me and DL-based IDS: The DT is incorporated in SG network and
its security is improved from two aspects. First by incorporating
mutual authentication and key agreement phase between SG
and SP and further by establishing a common session key for
secure communication. Second, DL-based IDS is incorporated
for attack detection. Finally, a SDN architecture is employed in
the proposed framework to reduce network latency and enhance
quality of service (QoS) in SG network.
(2) A novel blockchain-based authentication scheme: The blockchain-
based authentication scheme ensures a secure communication
and provides integrity for the exchanged messages between SG
and SP. A detailed method for creating and adding new block
to the blockchain using voting-based consensus algorithm is
presented.
(3) A novel DL-based architecture for intrusion detection: A DL-based
IDS is proposed by combining self-attention mechanism, Bi-
GRU model, fully connected layers and a softmax classifier. In
particular, a self-attention mechanism is used to determine the
spatial connections in each network, a Bi-GRU model is used
to capture the temporal dependency across networks, a fully
connected network made up of three fully connected layers, and
a softmax classifier is used to detect attacks.
The remainder of this work is organized as follows. Section 2presents
the proposed framework and its key elements for secure data shar-
ing in SG network. Section 3provides the performance analysis for
blockchain-based authentication scheme and DL-based IDS. Finally,
Section 4concludes the article.
Solar Energy 263 (2023) 111921
4
P. Kumar et al.
2. Proposed framework for secure data sharing
2.1. Blockchain-based authentication scheme
This phase includes blockchain based authentication of data source
i.e., smart meters 𝑆𝑀 and how this authentication is performed by the
various entities participating in the communication start from the smart
meters to SDN controllers. This phase makes the system more secure
by enabling four prominent approach namely System initialization, SM
data collection, and SM data aggregation, and Authentication of the
data source. Finally, the consensus approach is applied to create and
dissemination of the block in the network. The detailed process of each
approach is discussed below.
(𝑖)System Initialization: The initial constraints includes some known
parameters of various participating entities of the network namely
smart meters 𝑆𝑀𝑖, open flow switches 𝑂𝐹 𝑆𝑗, SDN controllers 𝑆 𝐷𝑁𝐶𝑘,
and service providers 𝑆𝑃𝑧. The initialization is performed by trusted
authority TS.
(𝑎)System Constraints: Let 𝑆𝑏represent a bilinear map 𝑆𝑏:𝐾1×𝐾2
𝐾𝑇, a cyclic group with group order 𝑉𝑡, where 𝑉𝑡is a large prime
number and 𝛽is a generator of 𝐾1. Next, the message digest, i.e., a
one way cryptographic hash 𝑀𝑄1is computed. Further, the essential
constraints {𝑆𝑏,𝐾1,𝐾𝑇,𝑉𝑡,𝛽,𝑀𝑄1} are distributed to all network
entities.
(𝑏)𝑆𝑀𝑖,𝑂𝐹 𝑆𝑗,𝑆 𝐷𝑁𝐶𝑘, and 𝑆𝑃𝑧: smart meters 𝑆𝑀𝑖select a secret
key 𝑆𝑀 𝐾𝑖and compute a public key 𝑆 𝑁𝐾𝑖=𝛽𝑆𝑀 𝐾𝑖mod 𝑉𝑡, where 𝑖
{1, 𝑛}represents the number of smart meters. Next, 𝑆𝑀𝑖preserves the
𝑆𝑀 𝐾𝑖and shares 𝑆𝑁𝐾𝑖. Further, 𝑂𝐹 𝑆𝑗picks a secret key 𝑂𝐹 𝑀𝑗and
computes a public key 𝑂𝐹 𝑁𝑗=𝛽𝑂𝐹 𝑀𝑗mod 𝑉𝑡. Next, 𝑂𝐹 𝑆𝑗preserves
𝑂𝐹 𝑀𝑗and distributes 𝑂𝐹 𝑁𝑗. Further, 𝑆𝐷𝑁𝐶𝑘chooses a secret key
𝑆𝐷𝑁 𝑀𝑘and computes a public key 𝑆 𝐷𝑁 𝐾𝑘=𝛽𝑆𝐷𝑁 𝑀𝑘mod 𝑉𝑡. Next,
𝑆𝐷𝑁 𝐶𝑘preserves 𝑆 𝐷𝑁 𝑀𝑘and distributes 𝑆𝐷𝑁𝐾𝑘.
(𝑖𝑖)SM Data Collection: This phase details the SM data collection and
how those data is shared with 𝑂𝐹 𝑆𝑗after encryption and signature of
data, i.e., consumption of units. Next, 𝑂𝐹 𝑆𝑗verifies data and shares to
𝑆𝐷𝑁 𝐶𝑘and 𝑆 𝑃𝑧. Here, 𝑆𝑀𝑖picks a message 𝑀 𝑆 𝐺𝑖and encrypts the
message as 𝐸𝑀 𝑆𝐺𝑖and shares it with 𝑂𝐹 𝑆𝑗. Then, 𝑂𝐹 𝑆𝑗verifies the
signature 𝑆𝑀 𝑆𝐺𝑖and after a successful verification, it will share the
signature with 𝑆𝐷𝑁 𝐶𝑘and 𝑆 𝑃𝑧. Detailed steps are as follows:
𝑆𝑀𝑖picks a random number 𝑆 𝑀𝑟𝑖from {0, 1, . . . , 𝑉𝑡1} and en-
crypts the message 𝑀𝑆 𝐺𝑖as 𝐸𝑀𝑆 𝐺𝑖, where 𝐸𝑀𝑆 𝐺𝑖= (𝐸𝑀𝑆 𝐺1
𝑖,
𝐸𝑀 𝑆𝐺2
𝑖) = (𝛽𝑆𝑀 𝑟𝑖mod 𝑉𝑡,𝑆𝑀 𝑆 𝐺𝑖+𝑆𝑁 𝐾 𝑆𝑀 𝑟𝑖
𝑖mod 𝑉𝑡).
𝑆𝑀𝑖signs 𝐸 𝑀𝑆𝐺𝑖to 𝑆 𝑀𝑆𝐺𝑖, where 𝑆 𝑀 𝑆𝐺𝑖=𝑠𝑖𝑔 𝑛𝑆𝑀 𝐾𝑖
(𝐸𝑀 𝑆𝐺2
𝑖).
𝑆𝑀𝑖generates message digest using SHA-256, i.e., 𝑆 𝑀 𝐷𝑖=
𝑆𝑀 𝐷𝑄1(𝑆 𝑀𝑖𝐸𝑀 𝑆 𝐺𝑖𝑆𝑀 𝑆 𝐺𝑖TP)𝑆 𝑀 𝐾𝑖, where TP signi-
fies current timestamp. Next, parameters {𝐸𝑀 𝑆𝐺𝑖𝑆𝑀 𝑆𝐺𝑖
𝑆𝑀 𝐷𝑖TP} is shared with 𝑂𝐹 𝑆𝑗. Further, the same parame-
ters are disseminated to the 𝑆𝐷𝑁 𝐶𝑘and 𝑆 𝑃𝑧after a successful
verification.
Once 𝑆𝐷𝑁 𝐶𝑘or 𝑆 𝑃𝑧receives {𝐸𝑀 𝑆 𝐺𝑖𝑆𝑀 𝑆 𝐺𝑖𝑆𝑀𝐷𝑖
TP}, it verifies three prominent attributes, i.e., (𝑖)Timestamp,
(𝑖𝑖)message digest SMDV(𝑆𝑀 𝐷𝑖,𝛽) = (𝑆𝑀𝐷𝑄1(𝑆𝑀𝑖𝐸 𝑀𝑆𝐺𝑖
𝑆𝑀 𝑆𝐺𝑖TP), 𝑆 𝑁 𝐾𝑖), and (𝑖𝑖𝑖)signature 𝛽𝐸𝑀 𝑆𝐺𝑖=𝑆 𝑁𝐾𝑠𝑖𝑔 𝑛𝑖
𝑖
(𝑠𝑖𝑔𝑛1
𝑖)𝑠𝑖𝑔𝑛2
𝑖. After a successful verification, 𝑆𝐷𝑁 𝐶𝑘or 𝑆 𝑃𝑧pre-
serves (𝐸𝑀 𝑆𝐺𝑖,𝑆𝑀 𝑆𝐺𝑖) for further communication in network.
(𝑖𝑖𝑖)SM Data Aggregation: This phase discusses about, how the en-
crypted data is collected and verified for respective 𝑆𝑀𝑖. The 𝑆 𝐷𝑁 𝐶𝑘
or 𝑆𝑃𝑧chooses the 𝐸 𝑀𝑆𝐺𝑖from the stored credential and computes.
𝑑=
𝑖∈[1,𝑛]
𝐸𝑀 𝑆𝐺2
𝑖𝑚𝑜𝑑 𝑉𝑡(1)
The 𝑆𝐷𝑁 𝐶𝑘and 𝑆 𝑃𝑧evaluates authentication code 𝐴𝑈 𝑇 𝐻𝑘=𝑆𝑀 𝐷𝑄1
(𝑑𝐸𝑀 𝑆𝐺1
𝑖𝑛TP))𝑆 𝐷𝑁𝑀 𝐾𝑘and shares it with the 𝑆𝑀𝑖with pa-
rameter (𝑑,𝐸𝑀 𝑆𝐺1
𝑖,𝑛,TP,𝐴𝑈 𝑇 𝐻𝑘) for further communication. Simi-
larly, 𝑆𝑃𝑧computes the authentication code for further communication
in the network.
(𝑖𝑣)Authentication: This phase explores authentication process of mes-
sage source, i.e., 𝑆𝑀𝑖. As discussed in data collection phase, 𝑆 𝐷𝑁 𝐶𝑘
or 𝑆𝑃𝑧receives {𝐸 𝑀𝑆𝐺𝑖𝑆 𝑀𝑆𝐺𝑖𝑆 𝑀 𝐷𝑖TP } from the 𝑆𝑀𝑖. To
verify the message source, 𝑆𝐷𝑁 𝐶𝑘or 𝑆 𝑃𝑧verify SMDV(𝑆𝑀 𝐷𝑖,𝛽) =
(𝑆𝑀 𝐷𝑄1(𝑆 𝑀𝑖𝐸𝑀 𝑆 𝐺𝑖𝑆𝑀 𝑆 𝐺𝑖TP), 𝑆 𝑁 𝐾𝑖) using 𝑆𝑀𝑖public
key 𝑆𝑁 𝐾𝑖. If authentication successful, then 𝑆 𝐷𝑁𝐾𝑘share credential
to 𝑆𝑀𝑖for further communication.
(𝑣)Consensus for Block creation and verification: This phase states
about the block creation and verification by 𝑆𝐷𝑁 𝐶𝑘. The block consists
of 𝑠𝑖𝑔𝑛𝑆𝐷 𝑁𝐶𝑘,bk.weight,bk.parent,𝑆 𝐵𝑖𝑏𝑘,𝑇 𝐵𝑖𝑏𝑘.𝑝𝑎𝑟𝑒𝑛𝑡, and
TP [46]. The detailed block creation and verification is illustrated in
Algorithm 1.
2.2. Deep learning-based IDS
Deep Learning (DL) is a subset of Machine Learning (ML) that makes
extensive use of hidden layers. These methods outperform ML because
of their deep structure and inherent capacity to discover relevant
characteristics inside a dataset and produce an output. The proposed
DL-based IDS consist a self-attention mechanism, Bidirectional-Gated
Recurrent Unit (Bi-GRU) model, fully connected layers and a softmax
classifier. Specifically, a self-attention mechanism is used to determine
the spatial connections in each network, a Bi-GRU model is used to
capture the temporal dependency across networks, a fully connected
network made up of three fully connected layers, and a softmax clas-
sifier is used to detect attacks. The working for each of them are
explained below:
2.2.1. Self-attention mechanism for determining spatial connections
The Self-Attention 𝑆𝐴 module computes attention scores to provide
spatial attention weights, which are then automatically applied to each
connection in a network. This makes it possible for the suggested
model to pay greater attention to the discriminative connections in
an adaptive manner. The 𝑆𝐴 mechanism outperforms other attention
mechanisms in terms of computational efficiency by lowering reliance
on external input in theory. It determines the significance of features
for the GRU model’s input and hidden layers, forming a dual-stage self-
attention process 𝐷𝑆𝑆 𝐴𝑃 . The 𝐷𝑆𝑆 𝐴𝑃 𝑠key computation steps are as
follow. Eq. (2) is used to develop correlation between the features.
E𝑚
𝑡=F(W𝑡,𝑚[H1,𝑚 ,H2,𝑚,H𝑇 ,𝑀 ] + U𝑡,𝑚 X𝑘),
𝑡= 1,, 𝑇 , 𝑚 = 1,, 𝑀 (2)
where the hidden state is represented by the H𝑡,𝑚.Wand Urepresent
the parameters for learning in the training process. Fis the dense layer,
𝑇is the number of time steps, and 𝑀is the number of dimensions of the
hidden features accordingly. Further, the attention weight is calculated
as follows:
𝜎𝑚
𝑡=𝐸𝑥𝑝(E𝑚
𝑡)
𝑇
𝐾=1 𝐸𝑥𝑝(E𝑚
𝑘)
,where
𝑡
𝜎𝑚
𝑡= 1.(3)
The original input series X𝑝can be turned into X𝑡using the attention
mechanism as
X𝑡= (𝜎1
𝑡X𝑝
1, 𝜎2
𝑡X𝑝
2, 𝜎3
𝑡X𝑝
3,, 𝜎𝑛
𝑡X𝑝
𝑛).(4)
Finally, the weights 𝜎𝑚
𝑡are averaged to 𝜎𝑚𝑒𝑎𝑛
𝑡to acquire the attention
weight of the 𝑡-th time step as
𝜎𝑚𝑒𝑎𝑛
𝑡=1
M
M
𝑚=1
𝜎𝑚
𝑡.(5)
Later on, the H𝑡can be converted to H𝑎𝑡𝑡
𝑡based on the hidden state’s
attention weight 𝜎𝑚𝑒𝑎𝑛
𝑡in the 𝑡-th time step.
H𝑎𝑡𝑡
𝑡=𝜎𝑚𝑒𝑎𝑛
𝑡H𝑡(6)
Solar Energy 263 (2023) 111921
5
P. Kumar et al.
Algorithm 1 Algorithm for Block Verification and Creation
1: State: 𝑆𝐷𝑁 𝐶𝑘𝐼 𝐷𝑚miners,
2: 𝐶𝐵𝑖=(𝑆 𝐵𝑖,𝑇 𝐵𝑖)𝑆𝐵𝑖is local blockchain of peer 𝑇 𝐵𝑖
3: 𝑏𝑘 Block records
4: parent previous node of 𝑏𝑘
5: miner mines and verify block 𝑏𝑘
6: numbers index of block
7: weight weight of block
8: blocktime timestamp between two different blocks
9: default time is 5 seconds.
10: vote, 𝑚𝑖𝑛𝑒𝑟+1
2
11: minerlimit among various successive block in which miner can
pick only one and sign it.
12: steps addition of new block in network
13: function latestsign(𝑠𝑖𝑔𝑛𝑆𝐷 𝑁𝐶𝑘,𝑍 𝑃 )𝑖
14: 𝛾miner limit
15: resultflag = false
16: for 𝑥=𝑍𝑃 𝛾to 𝑍 𝑃 do
17: if (𝑏𝑘𝑖.𝑛𝑢𝑚𝑏𝑒𝑟 mod 𝑚𝑖𝑛𝑒𝑟== 𝑖)then
18: flagresult = true
19: end if
20: end for
21: return flagresult
22: end function
23: function initialize()𝑤
24: while (True) do
25: 𝑍𝑃 previousblock(𝑠𝑖𝑔𝑛𝑆𝐷𝑁 𝐶𝑘). 𝑛𝑢𝑚𝑏𝑒𝑟
26: wait until latestsign(𝑠𝑖𝑔𝑛𝑆𝐷 𝑁𝐶𝑘,𝑍 𝑃 )
27: TP previous-timestamp (𝑠𝑖𝑔𝑛𝑆𝐷 𝑁𝐶𝑘)
28: wait until clock >=TP + blocktime
29: if (𝑆𝐷𝑁 𝐶𝑘+𝑖mod 𝑚𝑖𝑛𝑒𝑟== 𝑖)then
30: 𝑏𝑘.𝑤𝑒𝑖𝑔ℎ𝑡 = 2
31: else
32: delay(0, 500)* 𝑣𝑜𝑡𝑒
33: 𝑏𝑘.𝑤𝑒𝑖𝑔ℎ𝑡 = 1
34: end if
35: 𝑏𝑘.𝑛𝑢𝑚𝑏𝑒𝑟 =𝑍𝑃 + 1
36: 𝑏𝑘.𝑝𝑎𝑟𝑒𝑛𝑡 =previousblock(𝑠𝑖𝑔𝑛𝑆𝐷 𝑁𝐶𝑘)
37: 𝑏𝑘.𝑚𝑖𝑛𝑒𝑟 =𝑠𝑖𝑔𝑛𝑆𝐷 𝑁𝐶𝑘
38: 𝑠𝑖𝑔𝑛𝑆𝐷 𝑁𝐶𝑘
(𝑆𝐵𝑖𝑏𝑘,𝑇 𝐵𝑖𝑏𝑘.𝑝𝑎𝑟𝑒𝑛𝑡)
39: end while
40: distribute (𝑠𝑖𝑔𝑛𝑆𝐷 𝑁𝐶𝑘)
41: end function
42: function WeightSum(𝑆𝐵𝑗,𝑇 𝐵𝑗)
43: return 𝑏𝑘𝑆𝐵𝑗𝑏𝑘.𝑤𝑒𝑖𝑔ℎ𝑡
44: end function
45: function Create(𝑆𝐵𝑗,𝑇 𝐵𝑗)
46: if WeightSum(𝑆𝐵𝑗,𝑇 𝐵𝑗)>WeightSum(𝑆 𝐵𝑖,𝑇 𝐵𝑖)then
47: WeigthSum(𝑆𝐵𝑖,𝑇 𝐵𝑖)WeightSum(𝑆 𝐵𝑗,𝑇 𝐵𝑗)
48: end if
49: end function
50: function isCertian(𝑏𝑘)𝑘
51: VT {𝑏𝑘𝑖.𝑆𝐷𝑁 𝐶𝑘|𝑏𝑘𝑖𝑆𝐵𝑖}
52: return (𝑉 𝑇 >𝑣𝑜𝑡𝑒)
53: end function
2.2.2. Bi-GRU model for capturing temporal aspects
The proposed work used a DL-based detection scheme (Bi-GRU)
for an efficient threat detection in such a network. GRU is a type of
RNN with gating mechanism. A simple RNN can preserve history infor-
mation for an undetermined time in theory, however, it has gradient
exploding or gradient vanishing problems practically [17]. The GRU
is an enhanced edition of RNN having strong capacities for long-term
dependencies and is deemed to be less computationally complex due
Fig. 2. Network structure of Bi-GRU.
to its uncomplicated structure. The GRU uses two gates, reset Re𝑡and
update gate U𝑡, that results in a use of smaller number of parameters
to train it. In Bi-GRU, the final output at time 𝑡is concluded by the
preceding and next frame at time 𝑡 1 and 𝑡+ 1. In Bi-GRU, one GRU
run forwards and one GRU runs in backward direction to calculate the
hidden states (h1,h2,h3, . . . , hn) of forward and backward directions.
A complete network structure of the Bi-GRU is shown in Fig. 2. The
following equations are used for computing the Bi-GRU hidden units:
Upt=𝜎(WXUpdt+WhUp ht1+bUp ),(7)
Ret=𝜎(WXRedt+WhRe ht1+bRe),(8)
Ct= tanh(WXc dt+Whc (Ret ht1) + bC),(9)
ht= (1Ut)ht1+UptCt,(10)
where Up𝑡,Re𝑡are update and reset gates while C𝑡,h𝑡are candidate
cell and final state. The weight matrix for the input dtis denoted by
WXUp,WXRe , and WXc . Furthermore, WhUp ,WhRe and Whc denotes the
recurrent weight matrix between two consecutive h
tsfor future prior
recurrent input ht1and future recurrent input ht+1. The tanh denotes
the non-linear activation function, while represents the point-wise
multiplication.
2.2.3. Fully connected layers and softmax classifier for attack detection
The proposed IDS comprises two layers having 100 and 50 neurons
with a dropout rate of 0.2% respectively, which are set to prevent data
overfitting along with batch normalization to speed up the network
convergence. We have employed ADAM as an optimizer and RELU as
an activation function in the input layer and CC-E as a loss function.
The probability computation is then performed by a fully linked layer
followed by a Softmax layer. It computes a probability distribution over
a network’s non-normalized output for a given input sample. Finally,
the highest probability is calculated as the projected activity using
maximum likelihood estimation. The Eqs. (11) and (12) are used to
compute the probability and loss as
P𝑗=E𝑑𝑗
𝑁
𝑚=1 E𝑑𝑚 ,(11)
where P𝑗denotes the corresponding probability, is the sum of
multiple vectors, 𝑁represents the number of classes, and 𝑑𝑗 denotes
the input vector’s element.
L𝑜𝑠𝑠 =
𝐶
I=1
Y𝑖𝑙𝑜𝑔
Y𝑖+𝜆1
L
L
𝐼=1
(1
T
𝑡=1
𝑚𝑡,1T)
+𝜆2
T
T
𝑡=1
(1
T
𝑖=1
𝑒𝑡,𝑖T) + 𝜆3
W𝑔,𝑓
2,
(12)
where Y𝑖is the true label,
Y𝑖is the 𝑖-th class sequence probability and
W𝑔,𝑓 denotes the BiGRU weight matrices.
Solar Energy 263 (2023) 111921
6
P. Kumar et al.
Algorithm 2 Proposed Detection Scheme
1: Input: Dataset= 𝐷𝑠𝑒𝑡
2: Output:𝐵𝑒𝑛𝑖𝑔𝑛 0,𝑀 𝑖𝑟𝑎𝑖.𝑎𝑐𝑘 1,𝑀𝑖𝑟𝑎𝑖.𝑆 𝑐𝑎𝑛 2, and so on.
3: Split 𝐷𝑠𝑒𝑡 in to 𝐷𝑠𝑒𝑡𝑇 𝑟 and 𝐷𝑠𝑒𝑡𝑇 𝑠
4: for each layer of BiGRU do
5: 𝐷𝑠𝑒𝑡
𝑇 𝑟 =𝐷𝑠𝑒𝑡𝑇 𝑟 pre-processing
6: 𝐵𝑖𝐺𝑅𝑈𝑇 𝑟𝑀 𝑜𝑑𝑒𝑙 = Train BiGRU using 𝐷𝑠𝑒𝑡
𝑇 𝑟
7: Upt=𝜎(WXUpdt+WhUp ht1+bUp )
8: Ret=𝜎(WXRedt+WhReht1+bRe )
9: Ct= tanh(WXc dt+Whc (Ret ht1) + bC
10: ht= (1Ut)ht1+UptCt
11: end for
12: 𝐷𝑠𝑒𝑡
𝑇 𝑠 =𝐷𝑠𝑒𝑡𝑇 𝑠 pre-processing
13: while True do
14: 𝑂𝑢𝑡𝑝𝑢𝑡 𝐵𝑖𝐺𝑅𝑈𝑇 𝑟𝑀 𝑜𝑑𝑒𝑙 (𝐷𝑠𝑒𝑡
𝑇 𝑠)
15: if the predicted value = 0 then
16: Return Benign
17: else
18: Return the type of attack
19: end if
20: end while
3. Performance analysis
In this section, we discuss the details of our experiments and results
obtained from proposed framework. Specifically, this section is divided
into three parts: (𝐴)Experimental Setup, (𝐵)Numerical results of
blockchain-based authentication scheme and (𝐶)Numerical results of
DL-based IDS.
3.1. Experimental setup
The experiments are performed on a Tyrone PC with a 2 GHz
Intel(R) Xeon(R) Silver 4114 CPU, a RAM of 128 GB, and a hard
disk drive of 2 TB. The DL-based IDS is created using the TensorFlow
(TF) library Keras. Python programming language is used to run the
implementation scripts. The Ethereum Ropsten test network is used for
the blockchain experiment.
3.1.1. Overview of the dataset
This work used the N-BaIoT [47] dataset for the experimentation.
The NBaIoT dataset includes two distinct categories of IoT attack types:
Mirai and Gafgyt along with a Benign class. The Mirai and Gafgyt are
subdivided into multiple subclasses, i.e., Mirai.ack, scan, syn, UDP, UDP
plain, Gafgyt combo, junk, and TCP.
3.1.2. Data pre-processing
We removed any rows with blank or nan values, as they might have
an impact on data quality and the assessment model. Further, as the
DL algorithms primarily handle numeric data, we converted all non
numeric values to numeric ones using the label encoder, i.e., sklearn.
We also used the MinMax scalar function for data normalization [48].
3.1.3. Implementation details
The proposed IDS model comprises of two layers of Bi-GRU with
100 and 50 neurons and a dropout rate of 0.2%, respectively. The
model is set to prevent data overfitting along with batch normalization
to speed up the network convergence. We further employed an ADAM
optimizer. We used an RELU and a CC-E in the input layer as activation
and loss functions. The experiments were performed for 10 epochs with
a batch-size of 64.
Fig. 3. Analysis of blockchain-based authentication scheme in terms of transaction (tx)
upload and block mining time.
Fig. 4. Analysis of blockchain-based authentication scheme in terms of block creation
time and transaction (tx) storage.
3.1.4. Evaluation metrics
As the focus of this work was on multi-classification, macro-averaging
procedures were utilized to determine Accuracy (Ac), Detection Rate
(Dr), Precision (Pn), and F1-score (F1). In order to calculate these
metric, we have used various parameters named as True Positive Rate
(𝜖), True Negative Rate (𝛾), False Positive Rate (𝜂), and False Negative
Rate (𝜅). The Accuracy (Ac) is; 𝐴𝑐 =𝜖+𝛾
𝛾+𝜅+𝜖+𝜂. Detection Rate (Dr) or
Recall (Re) is 𝐷𝑟 =𝜖
𝜅+𝜖. Precision (Pn) is 𝑃 𝑛 =𝜖
𝜖+𝜂, and F1-Score is
𝐹1=2𝑃 𝑛×𝑅𝑒
𝑃 𝑛+𝑅𝑒 .
3.2. Numerical results of blockchain-based authentication scheme
Figs. 3 and 4illustrate the blockchain analysis in terms of execution
time for transaction (Tx) upload, mining of block, creation of block,
and the size (in KB) of transactions uploaded into off-chain storage.
The upload time of transaction indicates that original transactions
sharing over the off-chain storage layer. Figs. 3(b) and 4(a) illustrate
mining time of block and creation time of block with different set
of transactions and peers. The execution time analysis can be seen
growing with the amount of transactions and peers in the network.
Fig. 4(b) illustrates off-chain storage size (in KB) over the off-chain
storage layer for different set of transactions and peers. It can be seen
that the size is increasing as the number of transactions is increasing in
the network.
3.3. Numerical results of DL-based IDS
While evaluating a DL-based classification algorithm’s generalized
performance, confusion metrics are considered a substantial element. It
indicates the actual performance of an algorithm on the pre-determined
values of a test dataset. The proposed IDS is rationally examined to
monitor its confusion metrics performance, as shown in Fig. 5. The con-
solidated pattern of a true label and the predicted label demonstrated
Solar Energy 263 (2023) 111921
7
P. Kumar et al.
Fig. 5. Confusion matrix analysis.
Fig. 6. ROC analysis.
the efficiency of Bi-GRU. Further, the ROC curve exhibits conclu-
sive and comprehensive remarks regarding the stability of a DL-based
anomaly detection mechanism. It indicates the direct relationship be-
tween the TPR and FPR values accomplished by an algorithm. Fig. 6
exhibits the ROC curve analysis of the proposed IDS on various compo-
nents. It can be witnessed that we have obtained a stable straight line
that defines the appropriate ratio between TPR and FPR. The ROC is
further monitored at eight different classes, however, the conclusive
scale has projected equal area under all classes. That phenomenon
results in a straight end-to-end line to declare the reliability of the
proposed Bi-GRU.
While analyzing the performance efficiency of a DL-based threat
detection algorithm, Ac, Pn, Re, and F1 play a crucial role. From
Fig. 7, it can be seen that Bi-GRU achieves an Ac of 99.73%, while
LSTM and GRU achieve an Ac of 98.69% and 98.68% , respectively.
The higher Ac endorses the superiority of Bi-GRU over LSTM and
GRU. The same scenario is noticed regarding Pn, where Bi-GRU has
achieved a precision of 97.3%. The number is comparatively impressive
as competitive schemes such as LSTM and GRU could achieve 96.08%
and 96.38% Pn. A likewise sequence is monitored while investigating
the recall value. The proposed IDS has accomplished a Re value of
97.95% by beating the benchmarked schemes. The LSTM has shown a
92.37% Re score. However, the GRU only got stuck at 91.97%. The F1
determines the stability of a threat detection protocol. The proposed
Fig. 7. Overall comparison.
Table 1
Comparison with existing approaches.
Approaches Dataset Model SDN BC DT Ac (%)
[28] N-BaIoT Hybrid DL × × 99.45
[30] N-BaIoT CNN-Stacked
LSTM
× × × 97.39
[34] N-BaIoT SVM × × × 95.90
Proposed Approach N-BaIoT SA-BiGRU 99.73
IDS has outclassed LSTM and GRU by achieving the F1 of 97.56%,
whereas the number was 93.87% for LSTM and 93.71% for GRU. The
exceptional performance exhibited by Bi-GRU in terms of Ac, Pn, Re,
and F1 advocates its efficiency over LSTM and GRU.
Likewise, other crucial performance parameters, TPR, TNR, and
NPV should also be included in ideal performance metrics. We have
investigated the performance of Bi-GRU in terms of these performance
parameters; additionally, the performance is then compared with its
competitive schemes, LSTM and GRU. It can be seen from Fig. 8 that
Bi-GRU has significantly achieved a 97.95% TPR, which is vividly
high as compared to the 91.87% TPR shown by LSTM. However, GRU
has demonstrated 91.97% TPR, which is slightly closer to the TPR
shown by LSTM; however still lower than the proposed Bi-GRU. That
phenomenon highly supports the validity of Bi-GRU over LSTM and
GRU. The performance of all these algorithms is evaluated in terms of
TNR, where Bi-GRU has demonstrated a 99.57% TNR by dominating
LSTM and GRU where the TNR was 99.2% and 99.17% respectively.
The more excellent value of TNR declares the higher efficiency of Bi-
GRU on a comparative scale with existing benchmarked schemes. NPV
is the following important performance parameter while interrogating
the real-time performance of a DL-based threat detection scheme. The
proposed IDS has substantially attained 99.63% NPV by suppressing
the performance of LSTM and GRU with 99.44% and 99.48% NPV,
respectively.
A DL-based intrusion detection model can be more accurately in-
spected by understanding its FDR, FNR, FOR, and FPR. The proposed
IDS is evaluated on these performance parameters, which are then ana-
lyzed on a comparative scale with competitive frameworks, e.g., LSTM
and GRU. Fig. 9 depicts that the Bi-GRU has 0.02668% FDR, which
is considerably lower than the 0.03612% FDR shown by GRU and
0.03894% FDR shown by LSTM. The lower FDR exhibited by Bi-GRU
is a solid declaration of its reliability. FNR determines the number of
adverse events that were negatively detected. Bi-GRU has exhibited
0.02041% FNR, remarkably reduced to the FNR shown by competitive
Solar Energy 263 (2023) 111921
8
P. Kumar et al.
Fig. 8. TPR, TNR and NPV comparison.
Fig. 9. FDR, DNR, FOR, and FRP comparison.
schemes. The LSTM has projected 0.07863% FNR; however, the FNR
value is 0.08021% for GRU. FOR is another performance measurement
standard that determines the actual validation of an algorithm. The
lower value of FOR demonstrates the efficiency of a DL-based threat
detection model. The proposed IDS has potentially achieved a lower
FOR of 0.000036% by beating the benchmarked schemes where GRU
has shown 0.0051% FOR; however, the value is 0.00556% for LSTM.
The proposed IDS has outpaced LSTM and GRU in terms of FPR.
The FPR has attained 0.000004% FPR, which is visually lower than
the 0.0073% FPR value achieved by LSTM and 0.00814% FPR value
demonstrated by GRU. Finally, we compare the performance of the
proposed IDS with some existing approaches, i.e., [28,30], and [34]
in Table 1. The table shows that the proposed IDS achieves a higher Ac
compared to existing approaches.
4. Conclusion
Smart grid (SG) aims to provide efficient energy management sys-
tem using SDN and DT technology. However, the communication be-
tween the SG entities take place using an insecure open channel and
DT heavily depends on the collected data for analysis. In this pa-
per, a blockchain-based authentication scheme and a deep learning-
based intrusion detection system were proposed. More specifically,
firstly, a mutual authentication between the smart meter and open flow
switches, and also between the service provider and open flow switches
were performed. After authentication, a session key was established
between them to securely transmit the collected data using the shared
session key. The authenticated data can be used by the upper planes
(i.e., control plane, digital twin and application plane) for further
analysis. The SPs use consensus algorithm to create and write data
into blockchain ledger to ensure privacy and integrity. Additionally,
a deep learning-based intrusion detection system was proposed by
combining a self-attention mechanism, a Bi-GRU model, fully connected
layers and a softmax classifier. The proposed approach was deployed
at control plane to further analyze the traffic in SG network. Numerical
results for blockchain and deep learning show the effectiveness of the
proposed framework. Future research will include the scalability testing
of the proposed framework using a larger number of smart meters and
different real-time datasets.
Declaration of competing interest
The authors declare that they have no known competing finan-
cial interests or personal relationships that could have appeared to
influence the work reported in this paper.
References
[1] R. Kumar, P. Kumar, A. Aljuhani, A.N. Islam, A. Jolfaei, S. Garg, Deep
learning and smart contract-assisted secure data sharing for iot-based intelligent
agriculture, IEEE Intell. Syst. (2022).
[2] S.A.A. Abir, A. Anwar, J. Choi, A. Kayes, Iot-enabled smart energy grid:
Applications and challenges, IEEE Access 9 (2021) 50961–50981.
[3] F. Al-Turjman, M. Abujubbeh, IoT-enabled smart grid via SM: An overview,
Future Gener. Comput. Syst. 96 (2019) 579–590.
[4] M.Y. Mehmood, A. Oad, M. Abrar, H.M. Munir, S.F. Hasan, H. Muqeet, N.A.
Golilarz, Edge computing for IoT-enabled smart grid, Secur. Commun. Netw.
2021 (2021).
[5] G. Fenza, M. Gallo, V. Loia, Drift-aware methodology for anomaly detection in
smart grid, IEEE Access 7 (2019) 9645–9657.
[6] P.H. Mirzaee, M. Shojafar, H. Cruickshank, R. Tafazolli, Smart grid secu-
rity and privacy: From conventional to machine learning issues (threats and
countermeasures), IEEE Access (2022).
[7] K.G. Boroojeni, M.H. Amini, S. Iyengar, Overview of the security and privacy
issues in smart grids, in: Smart Grids: Security and Privacy Issues, Springer,
2017, pp. 1–16.
[8] M. Babar, M.U. Tariq, M.A. Jan, Secure and resilient demand side management
engine using machine learning for IoT-enabled smart grid, Sustainable Cities Soc.
62 (2020) 102370.
[9] R. Khan, P. Maynard, K. McLaughlin, D. Laverty, S. Sezer, Threat analysis of
blackenergy malware for synchrophasor based real-time control and monitoring
in smart grid, in: 4th International Symposium for ICS & SCADA Cyber Security
Research 2016 4, 2016, pp. 53–63.
[10] D. Acarali, K.R. Rao, M. Rajarajan, D. Chema, M. Ginzburg, Modelling smart grid
IT-OT dependencies for DDoS impact propagation, Comput. Secur. 112 (2022)
102528.
[11] N. Saxena, B.J. Choi, State of the art authentication, access control, and secure
integration in smart grid, Energies 8 (10) (2015) 11883–11915.
[12] M. Alazab, L.U. Khan, S. Koppu, S.P. Ramu, I. M, P. Boobalan, T. Baker, P.K.R.
Maddikunta, T.R. Gadekallu, A. Aljuhani, Digital twins for healthcare 4.0 - recent
advances, architecture, and open challenges, IEEE Consum. Electron. Mag. (2022)
1–8, http://dx.doi.org/10.1109/MCE.2022.3208986.
[13] T. Cioara, I. Anghel, M. Antal, I. Salomie, C. Antal, A.G. Ioan, An overview
of digital twins application domains in smart energy grid, 2021, arXiv preprint
arXiv:2104.07904.
[14] C. Gehrmann, M. Gunnarsson, A digital twin based industrial automation and
control system security architecture, IEEE Trans. Ind. Inform. 16 (1) (2019)
669–680.
[15] R. Bitton, T. Gluck, O. Stan, M. Inokuchi, Y. Ohta, Y. Yamada, T. Yagyu, Y.
Elovici, A. Shabtai, Deriving a cost-effective digital twin of an ICS to facilitate
security evaluation, in: European Symposium on Research in Computer Security,
Springer, 2018, pp. 533–554.
[16] M. Eckhart, A. Ekelhart, Towards security-aware virtual environments for digital
twins, in: Proceedings of the 4th ACM Workshop on Cyber-Physical System
Security, 2018, pp. 61–72.
Solar Energy 263 (2023) 111921
9
P. Kumar et al.
[17] M. Eckhart, A. Ekelhart, A specification-based state replication approach for
digital twins, in: Proceedings of the 2018 Workshop on Cyber-Physical Systems
Security and Privacy, 2018, pp. 36–47.
[18] A. Bécue, Y. Fourastier, I. Praça, A. Savarit, C. Baron, B. Gradussofs, E.
Pouille, C. Thomas, CyberFactory# 1—Securing the industry 4.0 with cyber-
ranges and digital twins, in: 2018 14th IEEE International Workshop on Factory
Communication Systems (WFCS), IEEE, 2018, pp. 1–4.
[19] T. Zheng, M. Liu, D. Puthal, P. Yi, Y. Wu, X. He, Smart grid: Cyber attacks,
critical defense approaches, and digital twin, 2022, arXiv preprint arXiv:2205.
11783.
[20] M.B. Mollah, J. Zhao, D. Niyato, Y.L. Guan, C. Yuen, S. Sun, K.-Y. Lam, L.H.
Koh, Blockchain for the internet of vehicles towards intelligent transportation
systems: A survey, IEEE Internet Things J. 8 (6) (2020) 4157–4185.
[21] H.-N. Dai, Z. Zheng, Y. Zhang, Blockchain for s: A survey, IEEE Internet Things
J. 6 (5) (2019) 8076–8094.
[22] A.S. Musleh, G. Yao, S. Muyeen, Blockchain applications in smart grid–review
and frameworks, IEEE Access 7 (2019) 86746–86757.
[23] K. Park, J. Lee, A.K. Das, Y. Park, BPPS: Blockchain-enabled privacy-preserving
scheme for demand-response management in smart grid environments, IEEE
Trans. Dependable Secure Comput. (2022).
[24] Z. Wang, R. Huo, S. Wang, A lightweight certificateless group key agreement
method without pairing based on blockchain for smart grid, Future Internet 14
(4) (2022) 119.
[25] S.A.M. Taqi, S. Jalili, LSPA-SGs: A lightweight and secure protocol for authen-
tication and key agreement based elliptic curve cryptography in smart grids,
Energy Rep. 8 (2022) 153–164.
[26] A. Tomar, S. Tripathi, Blockchain-assisted authentication and key agreement
scheme for fog-based smart grid, Cluster Comput. 25 (1) (2022) 451–468.
[27] O.A. Omitaomu, H. Niu, Artificial intelligence techniques in smart grid: A survey,
Smart Cities 4 (2) (2021) 548–568.
[28] D. Javeed, T. Gao, M.T. Khan, D. Shoukat, A hybrid intelligent framework to
combat sophisticated threats in secure industries, Sensors 22 (4) (2022) 1582.
[29] M. Hanselmann, T. Strauss, K. Dormann, H. Ulmer, Canet: An unsupervised
intrusion detection system for high dimensional CAN bus data, IEEE Access 8
(2020) 58194–58205.
[30] D. Santhadevi, B. Janet, Stacked deep learning framework for edge-based
intelligent threat detection in IoT network, J. Supercomput. (2023) 1–34.
[31] P.I. Radoglou-Grammatikis, P.G. Sarigiannidis, Securing the smart grid: A com-
prehensive compilation of intrusion detection and prevention systems, IEEE
Access 7 (2019) 46595–46620.
[32] Q. Liu, V. Hagenmeyer, H.B. Keller, A review of rule learning-based intrusion
detection systems and their prospects in smart grids, IEEE Access 9 (2021)
57542–57564.
[33] Z. Lv, Y. Li, H. Feng, H. Lv, Deep learning for security in digital twins of
cooperative intelligent transportation systems, IEEE Trans. Intell. Transp. Syst.
(2021).
[34] T.B. Seong, V. Ponnusamy, N. Jhanjhi, R. Annur, M. Talib, A comparative
analysis on traditional wired datasets and the need for wireless datasets for
IoT wireless intrusion detection, Indonesian J. Electr. Eng. Comput. Sci. 22 (2)
(2021) 1165–1176.
[35] M.H. Rehmani, A. Davy, B. Jennings, C. Assi, Software defined networks-based
smart grid communication: A comprehensive survey, IEEE Commun. Surv. Tutor.
21 (3) (2019) 2637–2670.
[36] D. Javeed, T. Gao, M.T. Khan, SDN-enabled hybrid DL-driven framework for the
detection of emerging cyber threats in IoT, Electronics 10 (8) (2021) 918.
[37] U. Ghosh, P. Chatterjee, S. Shetty, Securing SDN-enabled smart power grids:
SDN-enabled smart grid security, in: Research Anthology on Smart Grid and
Microgrid Development, IGI Global, 2022, pp. 1028–1046.
[38] A. Aljuhani, Machine learning approaches for combating distributed denial of
service attacks in modern networking environments, IEEE Access 9 (2021)
42236–42264, http://dx.doi.org/10.1109/ACCESS.2021.3062909.
[39] Z. Lv, L. Wang, Z. Guan, J. Wu, X. Du, H. Zhao, M. Guizani, An optimizing and
differentially private clustering algorithm for mixed data in SDN-based smart
grid, IEEE Access 7 (2019) 45773–45782.
[40] H. Mahmood, D. Mahmood, Q. Shaheen, R. Akhtar, W. Changda, S-DPs: An
SDN-based DDoS protection system for smart grids, Secur. Commun. Netw. 2021
(2021).
[41] A. Jakaria, M.A. Rahman, A. Gokhale, Resiliency-aware deployment of SDN in
smart grid SCADA: A formal synthesis model, IEEE Trans. Netw. Serv. Manag.
18 (2) (2021) 1430–1444.
[42] L. Vishwakarma, D. Das, Blockchain-based security protocol for next-generation
smart grid transactions, TechScape (2020).
[43] B. Appasani, S.K. Mishra, A.V. Jha, S.K. Mishra, F.M. Enescu, I.S. Sorlei, F.G.
Bîrleanu, N. Takorabet, P. Thounthong, N. Bizon, Blockchain-enabled smart
grid applications: Architecture, challenges, and solutions, Sustainability 14 (14)
(2022) 8801.
[44] A.A.G. Agung, R. Handayani, Blockchain for smart grid, J. King Saud
Univ.-Comput. Inform. Sci. (2020).
[45] M.A. Ferrag, L. Maglaras, DeepCoin: A novel deep learning and blockchain-based
energy exchange framework for smart grids, IEEE Trans. Eng. Manage. 67 (4)
(2019) 1285–1297.
[46] P. Kumar, R. Kumar, S. Garg, K. Kaur, Y. Zhang, M. Guizani, A secure data
dissemination scheme for IoT-based e-health systems using AI and blockchain,
in: GLOBECOM 2022-2022 IEEE Global Communications Conference, IEEE, 2022,
pp. 1397–1403.
[47] Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breitenbacher,
Y. Elovici, N-baIoT: Network-based detection of IoT botnet attacks using deep
autoencoders, IEEE Pervasive Comput. 17 (3) (2018) 12–22.
[48] D. Javeed, M.S. Saeed, I. Ahmad, P. Kumar, A. Jolfaei, M. Tahir, An intelligent
intrusion detection system for smart consumer electronics network, IEEE Trans.
Consum. Electron. (2023).
... Second, as smart grids become more integrated with other critical infrastructure systems, such as water supply and telecommunications, the risks associated with cyber threats increase exponentially. Ensuring the cybersecurity of smart grids, therefore, is not just about protecting the electrical infrastructure but also about safeguarding the broader ecosystem of interconnected services that modern societies rely on [1]. ...
Research
Full-text available
The increasing integration of Internet of Things (IoT) devices in smart grids has revolutionized the energy sector, enhancing efficiency, reliability, and sustainability. However, this digital transformation also introduces significant cybersecurity challenges, as the interconnected nature of IoT devices creates numerous potential entry points for cyberattacks. Ensuring the security of smart grids is critical to maintaining the integrity and availability of power systems. This paper explores the use of deep neural networks (DNNs) for real-time anomaly detection in smart grid cybersecurity, leveraging the vast amount of data generated by IoT devices to identify and mitigate potential threats. Deep neural networks, with their ability to learn complex patterns and relationships in data, are well-suited for detecting anomalies in the diverse and dynamic datasets produced by smart grids. By training DNNs on historical and real-time data, it is possible to create models that can identify deviations from normal behavior, signaling potential security breaches or system faults. The proposed approach focuses on developing a robust anomaly detection framework that can operate in real-time, providing immediate alerts and enabling swift response to cyber threats. The implementation of this framework involves several key steps: data collection and preprocessing, model training and validation, and real-time monitoring and detection. IoT devices continuously collect data from various components of the smart grid, which is then processed to remove noise and enhance signal clarity.
... In analyzing the strength and timelines of pivotal studies in the field of BT and DTs, several research hotspots have emerged. These hotspots include diverse aspects, such as: 1) Frameworks and architecture of DT models based on distributed control solutions, exemplified by works like Alam and El Saddik (2017), Muralidharan et al. (2023), and Lee et al. (2019); 2) Technical solutions for integrating BT into DTs, as seen in studies by Kumar et al. (2023), Leng et al. (2019b), Mandolla et al. (2019), and Westerkamp et al. (2020); 3) BT-based solutions approaches to augment sustainability in DTs, highlighted in research by Abou El Houda and Brik (2023), Leng et al. (2020a), and Wang and Wang (2019); 4) The synergistic use of BT-enhanced DTs with other advanced technologies, with notable examples from Fragapane et al. (2022), Singh et al. (2022), and Tao et al. (2022; 5) The application of BT-enhanced DTs in decentralized automation and smart operation, as explored by Leng et al. (2023), Sahal et al. (2022), andYan et al. (2022); 6) Industrial deployment of BT-enhanced DTs, detailed in studies like Fragapane et al. (2022), Raja Santhi andMuthuswamy (2023), andSuhail et al. (2022a); and 7) The utilization of BT-enhanced DT applications in metaverse, a growing area of interest seen in works by Yaqoob et al. (2023), Banaeian Far et al. (2023), andYao et al. (2024). ...
Article
Full-text available
The integration of Blockchain Technology (BT) with Digital Twins (DTs) is becoming increasingly recognized as an effective strategy to enhance trust, interoperability, and data privacy in virtual spaces such as the metaverse. Although there is a significant body of research at the intersection of BT and DTs, a thorough review of the field has not yet been conducted. This study performs a systematic literature review on BT and DTs, using the CiteSpace analytic tool to evaluate the content and bibliometric information. The review covers 976 publications, identifying the significant effects of BT on DTs and the integration challenges. Key themes emerging from keyword analysis include augmented reality, smart cities, smart manufacturing, cybersecurity, lifecycle management, Ethereum, smart grids, additive manufacturing, blockchain technology, and digitalization. Based on this analysis, the study proposes a development framework for BT-enhanced DTs that includes supporting technologies and applications, main applications, advantages and functionalities, primary contexts of application, and overarching goals and principles. Additionally, an examination of bibliometric data reveals three developmental phases in cross-sectional research on BT and DTs: technology development, technology use, and technology deployment. These phases highlight the research field’s evolution and provide valuable direction for future studies on BT-enhanced DTs.
... In this work, we consider a normal class and nine attack classes of the ToN-IoT dataset, i.e., DDoS, Backdoor, MiTM, etc while for the Edge-IIoTset we consider one normal and fourteen attack classes. Furthermore, we employed different steps to preprocess the data as it impacts the performance of the model [36]. Firstly, we imputed all the missing values and removed the incomplete rows from both the dataset. ...
Article
Full-text available
Industrial Cyber-Physical Systems (ICPSs) are becoming more and more networked and essential to modern infrastructure. This has led to an increase in the complexity of their dynamics and the challenges of protecting them from advanced cyber threats have escalated. Conventional intrusion detection systems (IDS) often struggle to interpret high-dimensional, sequential data efficiently and extract meaningful features. They are characterized by low accuracy and a high rate of false positives. In this article, we adopt the computational design science approach to design an IDS for ICPS, driven by Generative AI and cognitive computing. Initially, we designed a Long Short-Term Memory-based Sparse Variational Autoencoder (LSTM-SVAE) technique to extract relevant features from complex data patterns efficiently. Following this, a Bidirectional Recurrent Neural Network with Hierarchical Attention (BiRNN-HAID) is constructed. This stage focuses on proficiently identifying potential intrusions by processing data with enhanced focus and memory capabilities. Next, a Cognitive Enhancement for Contextual Intrusion Awareness (CE-CIA) is designed to refine the initial predictions by applying cognitive principles. This enhances the system’s reliability by effectively balancing sensitivity and specificity, thereby reducing false positives. The final stage, Interpretive Assurance through Activation Insights in Detection Models (IAA-IDM), involves the visualizations of mean activations of LSTM and GRU layers for providing in-depth insights into the decision-making process for cybersecurity analysts. Our framework undergoes rigorous testing on two publicly accessible industrial datasets, ToN-IoT and Edge-IIoTset, demonstrating its superiority over both baseline methods and recent state-of-the-art approaches.
... Articles Real-time system monitoring and control, fault detection against false data injection [40][41][42][43][44][45][46] State prediction and situational awareness (SA) and situational intelligence (SI) [47][48][49][50] Real-time cyber-physical visualization to enhance security, flexibility, and resilience [51,52] Supervised learning techniques for energy storage system optimization [53][54][55] Multi-agent and self-organizing system for selfadaptive energy management [56][57][58] Real-time demand response and demand prediction in energy building [59][60][61] culates the optimal control gains and control signals. Once the control gains and control signals are determined, they are applied to the DTs to evaluate their effectiveness and safety before being implemented in the cyber-physical microgrid. ...
Article
Full-text available
We introduce data-driven and scalable digital twins (DTs) and decentralized observer-based control (DOBC) to enhance inverter synchronization in low-inertia microgrids. The proposed DT, serving as cyber-physical replicas, enables real-time monitoring and data-driven control. We employed the Kuramoto model as a reduced-order dynamic representation of the low inertia inverter-based microgrid. Additionally, we used finite state machines (FSM) to digitally integrate the states and operating modes of virtual oscillator controls (VOC) inverters and microgrid dynamics. To address potential inconsistencies in data acquisition, we implemented generative adversarial imputation nets (GAIN) for the imputation of missing states in real-time. For inverter synchronization and minimizing the control efforts in the presence of the grid topology changes and interruptions, we applied Gramian localized approximation (GLA) and DOBC. These techniques helped us identify an optimal subset of inverters for control. The efficacy of this approach was validated through several scenarios for normal operation and fault isolation cases. The proposed DT model with DOBC significantly reduces synchronization time to under 9 seconds for average to large topology connections, compared to conventional PLL methods requiring around 3 minutes.
... Kumar et al. [22] developed a self-attention-based Bidirectional Gated Recurrent Unit (SA-BiGRU) approach to identify intrusions in the smart grid (SG) environments. This approach improved the process of intrusion detection in SG ecosystems utilizing the blockchain as well as deep learning (DL) techniques. ...
Article
Full-text available
In an era characterized by the proliferation of the Internet of Things (IoT), the seamless interconnection of diverse devices has revolutionized various sectors. However, this rapid expansion has brought forth significant security concerns, making effective anomaly detection crucial for safeguarding IoT networks. This research introduces a pioneering framework for dynamic behavioral profiling and anomaly detection in Software-Defined IoT Networks (SD-IoT). By leveraging the inherent advantages of SDN, this framework enhances the security and resilience of IoT ecosystems. Through a meticulous step-by-step process, dynamic profiles of IoT devices' behavior are generated to capture evolving attributes over time. Machine learning-based anomaly detection algorithms analyzed profiles to identify deviations from normal behavior and to effectively detect potential security threats. Anomalies detected trigger real-time policy adaptations that contain and mitigate their impact. The SDN controller enforces these adapted policies, preventing anomaly propagation and ensuring network integrity. To evaluate the framework's efficacy, extensive experiments are conducted using a comprehensive datasets in the simulated IoT environment. The results demonstrated the accuracy of dynamic behavioral profiling, the adaptability of the policy adjustments, and the efficiency of the anomaly detection algorithm. The proposed framework holds immense promise in fortifying IoT networks against emerging threats, contributing to the security and stability of our increasingly interconnected world. The comparative analyses in the performance validation showed that the proposed model attained better anomaly detection performances than other existing models.
... Sensors establish a connectivity infrastructure by interlinking the participants, and the communication protocol regulates the data flows across the network [2]. The scope of IoT is widely acknowledged, and its influence can be seen in numerous significant use cases, including smart grids [3], smart industries [4], smart surveillance systems [5], smart transportation, smart agriculture, smart healthcare, and many more [6]. Although the rapidly extended boundaries of IoT are offering enormous advantages, they simultaneously make it vulnerable to a diversified variety of security challenges. ...
Article
Full-text available
The exponential growth of Internet of Things (IoT) devices poses distinctive challenges to safeguarding the security and privacy of interconnected systems. As the frequency of cyberattacks continues to escalate, the development of an effective and scalable Intrusion Detection System (IDS) based on Federated Learning (FL) for IoT becomes increasingly complex. Existing methodologies struggle to balance spatial and temporal feature extraction, particularly when confronted with dynamic and evolving cyber threats. Additionally, the lack of diversity in datasets employed for FL-based IDS evaluations further hinders progress. Furthermore, a notable tradeoff between performance and scalability emerges, particularly as the number of edge devices in communication grows. Motivated by the aforementioned challenges, this article presents a horizontal FL model that combines Convolutional Neural Networks (CNN) and Bidirectional Long-Term Short Memory (BiLSTM) for effective intrusion detection. This hybrid approach aims to address the limitations of existing methods and enhance the effectiveness of intrusion detection in the context of FL for IoT. Specifically, CNN plays a pivotal role in spatial feature extraction, allowing the model to identify and comprehend local patterns indicative of potential intrusions, and the BiLSTM component contributes by capturing temporal dependencies and learning sequential patterns within the data. The proposed IDS adheres to a zero-trust model by keeping the data on local edge devices, sharing only the learned weights with the centralized FL server. In turn, the FL server aggregates updates from diverse sources to optimize the accuracy of the global learning model. The experimental results using CICIDS2017 and Edge-IIoTset prove the effectiveness of the proposed approach over centralized and federated deep learning-based IDS.
... The deployment architecture coupled with a very small size of the mode, 6.97 KB, leads to faster response time and improved network performance. Alternatively, the model can be deployed on the data plane, encompassing both network and device layers, as discussed in [31][32][33], allowing for attack detection on devices like gateways and routers. ...
Article
Full-text available
This paper addresses the persistent threat of botnet attacks on IoT devices, emphasizing their continued existence despite various conventional and deep learning methodologies developed for intrusion detection. Utilizing the Bot-IoT dataset, we propose a hierarchical CNN (HCNN) approach featuring three levels of classification. The HCNN approach, presented in this paper, consists of two networks: the non-hierarchical and the hierarchical network. The hierarchical network works by combining features obtained at a higher level with those of its descender. This combined information is subsequently fed into the following level to extract features for the descendant nodes. The overall network consists of 1790 parameters, with the hierarchical network introducing an additional 942 parameters to the existing backbone. The classification levels comprise a binary classification of normal vs attack in the first level, followed by 5 classes in the second level, and 11 classes in the third level. To assess the effectiveness of our proposed approach, we evaluate performance metrics such as Precision (P), Recall (R), F1 Score (F1), and Accuracy (Acc). Rigorous experiments are conducted to compare the performance of both the hierarchical and non-hierarchical models and existing state-of-the-art approaches, providing valuable insights into the efficiency of our proposed hierarchical CNN approach for addressing botnet attacks on IoT devices.
Article
The Internet of Things (IoT) consists of smart devices with limited resources that can identify and analyze data. In IoT-enabled healthcare systems, the security of IoT devices and the data they contain is complex. These devices in the healthcare industry, edge computing can provide low-latency information services at a reasonable cost. This work proposes a security infrastructure for Software Defined Network (SDN)-based edge computing in IoT-enabled healthcare systems consisting of three steps: Lightweight authentication, collaborative edge computing and job migration. The lightweight authentication step involves both Improved Lightweight Key Management (ILKM) and Improved Elliptic Curve Cryptography (IECC) schemes to ensure authentication among the devices and edge servers. Moreover, the patient’s data in IoT devices are scheduled to the appropriate edge server by examining the load balancing in the collaborative edge computing phase. This is done optimally using the adopted hybrid optimization model, Osprey Assisted Coati Optimization Algorithm (OACOA). Further, job migration takes place, in which the data is allocated to the edge server by comparing the capacity of edge servers and the data gets migrated to other servers by considering migration cost when the capacity of the edge server is overloaded. Finally, the efficiency of the suggested OACOA scheme is evaluated over traditional models with regard to several metrics. When considering the edge-server 30, the OACOA scheme achieves a makespan of 385, while conventional methods acquired fewer makespan ratings. Also, the OACOA approach obtained the highest security ratings (0.7143) on edge-server 20 when compared to existing schemes.
Article
Full-text available
The technological advancements of Internet of Things (IoT) has revolutionized traditional Consumer Electronics (CE) into next-generation CE with higher connectivity and intelligence. This connectivity among sensors, actuators, appliances, and other consumer devices enables improved data availability, and provides automatic control in CE network. However, due to the diversity, decentralization, and increase in the number of CE devices the data traffic has increased exponentially. Moreover, the traditional static network infrastructure-based approaches need manual configuration and exclusive management of CE devices. Motivated from the aforementioned challenges, this article presents a novel Software-Defined Networking (SDN)-orchestrated Deep Learning (DL) approach to design an intelligent Intrusion Detection System (IDS) for smart CE network. In this approach, we have first considered SDN architecture as a promising solution that enables reconfiguration over static network infrastructure and handles the distributed architecture of smart CE network by separating the control planes and data planes. Second, an DL-based IDS using Cuda-enabled Bidirectional Long Short-Term Memory (Cu-BLSTM) is designed to identify different attack types in the smart CE network. The simulations results based on CICIDS-2018 dataset support the validation of the proposed approach over some recent state-of-the-art security solutions and confirms it a phenomenal choice for next-generation smart CE network.
Article
Full-text available
Cyber-attacks on Internet of Things (IoT) devices are becoming increasingly common due to the rapidly growing number of connected devices and the lack of security measures in many of these devices. Attackers can exploit these flaws using the internet and remote access. The Edge Service is a critical component of NetFlow-based malware detection systems, responsible for several key functions. Firstly, it receives raw network traffic data from the Edge Gateway installed at the network perimeter. Secondly, it processes the raw data to make it suitable for deep learning models by converting it into an appropriate format, normalizing it and extracting relevant features. The Edge Service also develops the deep learning network for malware detection and classification using Vectorized Convolutional Neural Networks (VCNN), multi Long Short-Term Memory (LSTM) models, and mayfly optimization techniques, and trains it on benchmark datasets (NBaIoT-balanced, UNSW-NB15 and UNSW_BOT_IoT-imbalanced) of benign and malicious network traffic to learn the patterns and characteristics of each type of traffic. Once the deep learning network is developed, the Edge Service uses it to detect and classify malware in real time by analyzing network traffic data to identify patterns and anomalies that may indicate the presence of malware. The Edge Service includes a Master Edge Node (MEN) responsible for all these functions. Edge Service plays a crucial role in detecting and preventing malware attacks by providing real-time protection and alerting potential threats.
Article
Full-text available
The importance of smart grids is growing at present, in tendency with the trend of many countries around the world towards the smart city model and enhancing the efficiency of the energy sector, leading to a safer and more sustainable future. On the other hand, there is an urgent need to address the security concerns related to smart grids. Recently, the PALK scheme was designed, which its designers claimed to be a secure protocol and work efficiently. Our revision proved that it contains two security vulnerabilities; user anonymity and guessing password attacks. So, in this paper, we designed a lightweight and robust authentication and key agreement protocol LSPA based on ECC for smart grid. The LSPA takes into consideration the flaws in the PALK scheme. It was verified formally by the Scyther tool to show that it withstands many attacks. Moreover, the informal proof shows that the LSPA scheme is secure and resistant to many attacks. Finally, the performance analysis for PALK and LSPA shows that LSPA is better in terms of communications and computations costs than the PALK scheme.
Article
Full-text available
The recent development of Internet of Things (IoT) and Unmanned Aerial Vehicles has revolutionized traditional agriculture with intelligence and automation. In a typical Intelligent Agriculture (IA) ecosystem, massive and real-time data are generated, analyzed, and sent to the Cloud Server (CS) for the purpose of addressing complex agricultural issues, such as yield prediction, water feed calculation, and so on. This helps farmer and associated stakeholders to take correct decision that improves the yield and quality of agricultural product. However, the distributed nature of IA entities and the usage of insecure wireless communication open various challenges related to data sharing, monitoring, storage, and further makes the entire IA ecosystem vulnerable to various potential attacks. In this article, we exploit deep learning and smart contract to propose a new IoT-enabled IA framework for enabling secure data sharing among its various entities. Specifically, first we develop new authentication and key management scheme to ensure secure data transmission in IoT-enabled IA. The encrypted transactions are then used by the CS to analyze and further detect intrusions by a novel deep learning architecture. In CS, the smart contract (SC)-based consensus mechanism is executed on legitimate transactions that verifies and adds the formed blocks into blockchain by a peer-to-peer CSs network. In comparison to existing competing security solutions, a rigorous comparative research demonstrates that the proposed approach provides greater security and more utility characteristics.
Article
Full-text available
The conventional electrical grid is undergoing substantial growth for reliable grid operation and for more efficient and sustainable energy use. The traditional grid is now metamorphosing into a smart grid (SG) that incorporates a diverse, heterogeneous blend of operating measures such as smart appliances, meters, and renewable energy resources. With better efficient results and dependability, the SG can be described as a modern electric power grid architecture. The SG is one of the greatest potential advances as a promising solution for the energy crisis. However, it is complex and its decentralization could be of tremendous benefit. Moreover, digitalization and integration of a large number of growing connections make it a target of cyber-attacks. In this sense, blockchain is a promising SG paradigm solution that offers several excellent features. There has been considerable effort put into using blockchains in the smart grid for its decentralization and enhanced cybersecurity; however, it has not been thoroughly studied in both application and architectural perspectives. An in-depth study was conducted on blockchain-enabled SG applications. Blockchain architectures for various applications, such as the synchrophasor applications, electric vehicles, energy management systems, etc., were proposed. The purpose of this article is to provide directions for future research efforts aimed at secure and decentralized SG applications using blockchain.
Article
Full-text available
Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of energy and information between customers and suppliers. The integration of power networks with information and communication technologies enables pervasive control, automation and connectivity from the energy generation power plants to the consumption level. However, the development of wireless communications, the increased level of autonomy, and the growing sofwarisation and virtualisation trends have expanded the attack susceptibility and threat surface of SGs. Besides, with the real-time information flow, and online energy consumption controlling systems, customers' privacy and preserving their confidential data in SG is critical to be addressed. In order to prevent potential attacks and vulnerabilities in evolving power networks, the need for additional studying security and privacy mechanisms is reinforced. In addition, recently, there has been an ever-increasing use of machine intelligence and Machine Learning (ML) algorithms in different components of SG. ML models are currently the mainstream for attack detection and threat analysis. However, despite these algorithms' high accuracy and reliability, ML systems are also vulnerable to a group of malicious activities called adversarial ML (AML) attacks. Throughout this paper, we survey and discuss new findings and developments in existing security issues and privacy breaches associated with the SG and the introduction of novel threats embedded within power systems due to the development of ML-based applications. Our survey builds multiple taxonomies and tables to express the relationships of various variables in the field. Our final section identifies the implications of emerging technologies, future communication systems, and advanced industries on the security and privacy issues of SG.
Article
Full-text available
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security. This means that smart grids need a new key management method that is safe and efficient and has a low computational cost. Although a large number of scholars have conducted relevant research, most of these schemes cannot balance the computational overhead and security. Therefore, we propose a lightweight and secure key management method, having a low computational overhead, based on blockchain for smart grids. Firstly, we redesigned the architecture of the smart grid based on blockchain and completed the division of various entities. Furthermore, we designed a pairing-free certification authenticated group key agreement method based on blockchain under the architecture. Finally, we achieved higher security attributes, and lower authentication delay and computational overhead, compared to the traditional schemes, as shown in performance analysis and comparison.
Article
With the ongoing revolutionary growth of the industrial Internet of Things and smart grid networks, smart grid (SG) communication has been acknowledged as a next-generation network for intelligent and efficient electric power transmission. In SG networks, smart meters (SMs) generally send requests for electricity demand to service providers (SPs), which deal with the requests for efficient energy distribution. However, SGs experience many security issues with the deployed SMs and untrusted wireless communication. To tackle these security issues, we propose a privacy-preserving authentication scheme for demand response management in SGs, called BPPS. It can resist various attacks and achieve secure mutual authentication with key agreement; moreover, it provides integrity of demand-response data using blockchain. Moreover, we perform the informal and formal (mathematical) security analysis to confirm that BPPS is secure against various attacks and achieves session key security, respectively. Furthermore, we conduct the performance and simulation analysis for SGs using NS3 and Ethereum testnet. Consequently, BPPS provides high-level security and can be applied to actual SG networks.
Conference Paper
In Internet of Things (IoT)-based e-Health Systems (IoTEHS), medical devices form a large network that continuously sense and share the healthcare data with the nearby edge devices or cloud servers. The health data is subsequently made available to various IoTEHS stakeholders (such as doctors, nurses and patients) to track and monitor patients under observation. However, the entire IoTEHS stakeholders communicate with each other over a wireless unsecured public communication channel. This is a major security and privacy loophole wherein the attacker can exploit the vulnerability of the system and can launch various attacks on the ongoing communication. Motivated by the aforementioned challenges, a secure data dissemination scheme using AI and blockchain is proposed. In this scheme, the transaction collected through healthcare sensors installed around the patients premises act as data sets that is forwarded to the nearby edge devices. The collected data is first filtered using AI-based intrusion detection system located at the edge of the network. Second, a secure health monitoring network is designed using blockchain. Specifically, the filtered or normal transactions are transmitted to centralized cloud servers where the smart contact-enabled consensus mechanism is used to validate the transactions. Once the transaction gets validated, it is stored on distributed InterPlanetary File System (IPFS) of cloud and returned transaction hash is stored on the blockchain ledger located at edge devices making data exchange faster. The detailed experimental investigation demonstrates that the proposed schemes are efficient (in terms of computing and processing time) as well as its resistance to a variety of security attacks.
Article
Recent trends have shown a widespread increase in the landscape of digital healthcare (i.e., Healthcare 4.0) services, such as personalized healthcare, intelligent rehabilitation, telemedicine, and smart diet management, among others. These healthcare services are based on a variety of diverse requirements. Fulfilling these requirements require proactive intelligent analytics and self-sustainability of networks. Self-sustainability enables the operation of a network with minimum possible interaction from the end-users/network operators, whereas proactive intelligent analytics enables efficient management of resources in response to users' requests. To enable healthcare 4.0 with proactive online analytics and self-sustainability, one can leverage digital twins. In this article, we present an overview and recent advances of digital twins for healthcare 4.0. An architecture of digital twins for healthcare is also proposed. Furthermore, we present several use cases of digital twins. Finally, we present open research challenges with possible solutions.