Research on FDI Attacks in Edge Computing Environment

The False Data Injection (FDI) attack in the smart grid can bypass the bad data detection mechanism and make the control center make an incorrect estimate of the system status. The smart grid under the edge computing architecture is more likely to be maliciously attacked by the terminal because it is close to the terminal. For this reason, this paper proposes a method combining PCA and ReliefF algorithm to achieve the purpose of dimensionality reduction. It can solve the overfitting problem caused by the high dimensionality of traditional machine learning attack signal detection, and it is suitable for terminals with low computing power.

[1]  Hong Wen,et al.  Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers , 2018, IEEE Transactions on Vehicular Technology.

[2]  Hong Wen,et al.  A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT) , 2015, IEEE Transactions on Emerging Topics in Computing.

[3]  Zuyi Li,et al.  False Data Attacks Against AC State Estimation With Incomplete Network Information , 2017, IEEE Transactions on Smart Grid.

[4]  Lei Zhang,et al.  Joint Design on DCN Placement and Survivable Cloud Service Provision over All-Optical Mesh Networks , 2014, IEEE Transactions on Communications.

[5]  Bi Kai,et al.  New feature selection approach by PCA and ReliefF , 2010 .

[6]  Guang Gong,et al.  Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..

[7]  Hong Wen,et al.  Physical layer assist authentication technique for smart meter system , 2013, IET Commun..

[8]  Hong Wen,et al.  A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing , 2019, IEEE Transactions on Cloud Computing.

[9]  Hong Wen,et al.  Internet of Things Based Smart Grids Supported by Intelligent Edge Computing , 2019, IEEE Access.

[10]  Peerapon Vateekul,et al.  Enhancing accuracy of multi-label classification by applying one-vs-one support vector machine , 2016, 2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[11]  Eklas Hossain,et al.  Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review , 2019, IEEE Access.

[12]  Hong Wen,et al.  Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting , 2019, IEEE Access.

[13]  Hong Wen,et al.  Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.