Detection of Lying Electrical Vehicles in Charging Coordination Application Using Deep Learning

05/28/2020
by   Ahmed Shafee, et al.
0

The simultaneous charging of many electric vehicles (EVs) stresses the distribution system and may cause grid instability in severe cases. The best way to avoid this problem is by charging coordination. The idea is that the EVs should report data (such as state-of-charge (SoC) of the battery) to run a mechanism to prioritize the charging requests and select the EVs that should charge during this time slot and defer other requests to future time slots. However, EVs may lie and send false data to receive high charging priority illegally. In this paper, we first study this attack to evaluate the gains of the lying EVs and how their behavior impacts the honest EVs and the performance of charging coordination mechanism. Our evaluations indicate that lying EVs have a greater chance to get charged comparing to honest EVs and they degrade the performance of the charging coordination mechanism. Then, an anomaly based detector that is using deep neural networks (DNN) is devised to identify the lying EVs. To do that, we first create an honest dataset for charging coordination application using real driving traces and information revealed by EV manufacturers, and then we also propose a number of attacks to create malicious data. We trained and evaluated two models, which are the multi-layer perceptron (MLP) and the gated recurrent unit (GRU) using this dataset and the GRU detector gives better results. Our evaluations indicate that our detector can detect lying EVs with high accuracy and low false positive rate.

READ FULL TEXT
research
12/02/2020

Detection of False-Reading Attacks in the AMI Net-Metering System

In smart grid, malicious customers may compromise their smart meters (SM...
research
11/06/2020

Web Application Attack Detection using Deep Learning

Modern web applications are dominated by HTTP/HTTPS messages that consis...
research
03/13/2020

Towards a Resilient Machine Learning Classifier – a Case Study of Ransomware Detection

The damage caused by crypto-ransomware, due to encryption, is difficult ...
research
09/22/2019

HAWKEYE: Adversarial Example Detector for Deep Neural Networks

Adversarial examples (AEs) are images that can mislead deep neural netwo...
research
03/07/2018

Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attack...
research
12/12/2020

Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning

DDoS attacks are simple, effective, and still pose a significant threat ...
research
11/02/2018

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

Botnets (networks of compromised computers) are often used for malicious...

Please sign up or login with your details

Forgot password? Click here to reset