A smart digital twin enabled security framework for vehicle-to-grid cyber-physical systems
The rapid growth of electric vehicle (EV) penetration has led to more flexible and reliable vehicle-to-grid-enabled cyber-physical systems (V2G-CPSs). However, the increasing system complexity also makes them more vulnerable to cyber-physical threats. Coordinated cyber attacks (CCAs) have emerged as...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/171272 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | The rapid growth of electric vehicle (EV) penetration has led to more flexible and reliable vehicle-to-grid-enabled cyber-physical systems (V2G-CPSs). However, the increasing system complexity also makes them more vulnerable to cyber-physical threats. Coordinated cyber attacks (CCAs) have emerged as a major concern, requiring effective detection and mitigation strategies within V2G-CPSs. Digital twin (DT) technologies have shown promise in mitigating system complexity and providing diverse functionalities for complex tasks such as system monitoring, analysis, and optimal control. This paper presents a resilient and secure framework for CCA detection and mitigation in V2G-CPSs, leveraging a smart DT-enabled approach. The framework introduces a smarter DT orchestrator that utilizes long short-term memory (LSTM) based actor-critic deep reinforcement learning (LSTM-DRL) in the DT virtual replica. The LSTM algorithm estimates the system states, which are then used by the DRL network to detect CCAs and take appropriate actions to minimize their impact. To validate the effectiveness and practicality of the proposed smart DT framework, case studies are conducted on an IEEE 30 bus system-based V2G-CPS, considering different CCA types such as malicious V2G node or control command attacks. The results demonstrate that the framework is capable of accurately estimating system states, detecting various CCAs, and mitigating the impact of attacks within 5 seconds. |
---|