Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems

التفاصيل البيبلوغرافية
العنوان: Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems
المؤلفون: Xiao, Qi, Song, Lidong, Woo, Jongha, Hu, Rongxing, Xu, Bei, Ye, Kai, Lu, Ning
سنة النشر: 2024
المجموعة: Computer Science
مصطلحات موضوعية: Electrical Engineering and Systems Science - Systems and Control
الوصف: This paper introduces "invisible manipulation," an innovative cyber-attack mechanism achieved through strategically timed stealthy false data injection attacks (SFDIAs). By stealthily manipulating measurements of a critical asset prior to the target time period, the attacker can subtly guide the engineering system toward a predetermined operational state without detection. Using the battery energy management system (BEMS) as a case study, we employ deep reinforcement learning (DRL) to generate synthetic measurements, such as battery voltage and current, that align closely with actual measurements. These synthetic measurements, falling within the acceptable error margin of residual-based bad data detection algorithm provided by state estimation, can evade detection and mislead Extended Kalman-filter-based State of Charge estimation. Subsequently, considering the deceptive data as valid inputs, the BEMS will operate the BESS towards the attacker desired operational states when the targeted time period come. The use of the DRL-based scheme allows us to covert an online optimization problem into an offline training process, thereby alleviating the computational burden for real-time implementation. Comprehensive testing on a high-fidelity microgrid real-time simulation testbed validates the effectiveness and adaptability of the proposed methods in achieving different attack objectives.
نوع الوثيقة: Working Paper
URL الوصول: http://arxiv.org/abs/2410.17402
رقم الانضمام: edsarx.2410.17402
قاعدة البيانات: arXiv
ResultId 1
Header edsarx
arXiv
edsarx.2410.17402
1128
3
Report
report
1128.01940917969
PLink https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2410.17402&custid=s6537998&authtype=sso
FullText Array ( [Availability] => 0 )
Array ( [0] => Array ( [Url] => http://arxiv.org/abs/2410.17402 [Name] => EDS - Arxiv [Category] => fullText [Text] => View record in Arxiv [MouseOverText] => View record in Arxiv ) )
Items Array ( [Name] => Title [Label] => Title [Group] => Ti [Data] => Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems )
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Xiao%2C+Qi%22">Xiao, Qi</searchLink><br /><searchLink fieldCode="AR" term="%22Song%2C+Lidong%22">Song, Lidong</searchLink><br /><searchLink fieldCode="AR" term="%22Woo%2C+Jongha%22">Woo, Jongha</searchLink><br /><searchLink fieldCode="AR" term="%22Hu%2C+Rongxing%22">Hu, Rongxing</searchLink><br /><searchLink fieldCode="AR" term="%22Xu%2C+Bei%22">Xu, Bei</searchLink><br /><searchLink fieldCode="AR" term="%22Ye%2C+Kai%22">Ye, Kai</searchLink><br /><searchLink fieldCode="AR" term="%22Lu%2C+Ning%22">Lu, Ning</searchLink> )
Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2024 )
Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => Computer Science )
Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22Electrical+Engineering+and+Systems+Science+-+Systems+and+Control%22">Electrical Engineering and Systems Science - Systems and Control</searchLink> )
Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => This paper introduces "invisible manipulation," an innovative cyber-attack mechanism achieved through strategically timed stealthy false data injection attacks (SFDIAs). By stealthily manipulating measurements of a critical asset prior to the target time period, the attacker can subtly guide the engineering system toward a predetermined operational state without detection. Using the battery energy management system (BEMS) as a case study, we employ deep reinforcement learning (DRL) to generate synthetic measurements, such as battery voltage and current, that align closely with actual measurements. These synthetic measurements, falling within the acceptable error margin of residual-based bad data detection algorithm provided by state estimation, can evade detection and mislead Extended Kalman-filter-based State of Charge estimation. Subsequently, considering the deceptive data as valid inputs, the BEMS will operate the BESS towards the attacker desired operational states when the targeted time period come. The use of the DRL-based scheme allows us to covert an online optimization problem into an offline training process, thereby alleviating the computational burden for real-time implementation. Comprehensive testing on a high-fidelity microgrid real-time simulation testbed validates the effectiveness and adaptability of the proposed methods in achieving different attack objectives. )
Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => Working Paper )
Array ( [Name] => URL [Label] => Access URL [Group] => URL [Data] => <link linkTarget="URL" linkTerm="http://arxiv.org/abs/2410.17402" linkWindow="_blank">http://arxiv.org/abs/2410.17402</link> )
Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsarx.2410.17402 )
RecordInfo Array ( [BibEntity] => Array ( [Subjects] => Array ( [0] => Array ( [SubjectFull] => Electrical Engineering and Systems Science - Systems and Control [Type] => general ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => Invisible Manipulation Deep Reinforcement Learning Enhanced Stealthy Attacks on Battery Energy Management Systems [Type] => main ) ) ) [BibRelationships] => Array ( [HasContributorRelationships] => Array ( [0] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Xiao, Qi ) ) ) [1] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Song, Lidong ) ) ) [2] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Woo, Jongha ) ) ) [3] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Hu, Rongxing ) ) ) [4] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Xu, Bei ) ) ) [5] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Ye, Kai ) ) ) [6] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Lu, Ning ) ) ) ) [IsPartOfRelationships] => Array ( [0] => Array ( [BibEntity] => Array ( [Dates] => Array ( [0] => Array ( [D] => 22 [M] => 10 [Type] => published [Y] => 2024 ) ) ) ) ) ) )
IllustrationInfo