2/2024 - 4 |
Enhancing V2G Network Security: A Novel Cockroach Behavior-Based Machine Learning Classifier to Mitigate MitM and DoS AttacksMEKKAOUI, K. |
Extra paper information in |
Click to see author's profile in SCOPUS, IEEE Xplore, Web of Science |
Download PDF (896 KB) | Citation | Downloads: 500 | Views: 592 |
Author keywords
electric vehicles, smart grids, intrusion detection, supervised learning, communication networks
References keywords
detection(11), intrusion(10), vehicle(9), security(7), electronics(7), review(6), networks(6), network(6), learning(6), internet(6)
Blue keywords are present in both the references section and the paper title.
About this article
Date of Publication: 2024-05-31
Volume 24, Issue 2, Year 2024, On page(s): 31 - 40
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2024.02004
Web of Science Accession Number: 001242091800004
SCOPUS ID: 85195631972
Abstract
V2G (Vehicle-to-Grid) is a system that allows an electric vehicle to connect and exchange energy with the electricity grid. This system is part of the smart-grid, which is an intelligent electricity network offering bidirectional communication and contributes to the environmental protection. Different actors are involved in communication in a V2G network, such as electric vehicles, charging stations, energy suppliers, and network operators, etc. Therefore, the V2G network faces several security challenges, such as data integrity, power system security, physical security of charging systems, data confidentiality and system interoperability. In this paper, an intrusion detection system (IDS) is proposed with the aim of predicting attacks in the V2G network. The study started with the generation of a dataset and the implementation of the Cockroach Behavior-Based Machine Learning Classifier with the objective of enhancing security of V2G networks by addressing Men-in-the-Middle (MitM) and Denial of Service (DoS) attacks. The simulation results, through the MiniV2G simulator, show that the proposed system achieved a detection accuracy of 98.93 %. This improves the reliability of the V2G network for users and better protects Electric Vehicle Charging Stations (EVCS) against DoS and MitM. |
References | | | Cited By «-- Click to see who has cited this paper |
[1] S. Vadi, R. Bayindir, A. M. Colak, E. Hossain, "A review on communication standards and charging topologies of V2G and V2H operation strategies," Energies, 2019, vol. 12, no 19, p. 3748. [CrossRef] [Web of Science Times Cited 41] [SCOPUS Times Cited 61] [2] G. Kumar, S. Mikkili, "Critical review of vehicle-to-everything (V2X) topologies: Communication, power flow characteristics, challenges, and opportunities," CPSS Transactions on Power Electronics and Applications, 2023. [CrossRef] [SCOPUS Times Cited 4] [3] S. J. Jian, Z. G. Lu, D. Du, B. Jiang, and B. X. Liu, "Overview of network intrusion detection technology," J. Cyber Secur., vol. 5, no. 4, pp. 96-122, 2020. [CrossRef] [4] S. Purohit, M. Govindarasu, "Cybersecurity investment analysis for electric vehicle charging infrastructures," In 2023 Resilience Week (RWS) (pp. 1-6). IEEE. [CrossRef] [SCOPUS Times Cited 2] [5] K. Wu, Z. Chen, and W. Li, "A novel intrusion detection model for a massive network using convolutional neural networks," IEEE Access, vol. 6, pp. 50850-50859, 2018. [CrossRef] [Web of Science Times Cited 169] [SCOPUS Times Cited 242] [6] A. Brighente, M. Conti, D. Donadel, R. Poovendran, F. Turrin, J. Zhou, "Electric vehicles security and privacy: Challenges, solutions, and future needs," arXiv preprint arXiv:2301.04587, 2023. [CrossRef] [7] M. U. Ilyas and S. A. Alharbi, "Machine learning approaches to network intrusion detection for contemporary internet traffic," Computing, vol. 104, no. 5, pp. 1061-1076, May 2022. [CrossRef] [Web of Science Times Cited 15] [SCOPUS Times Cited 24] [8] M. Abdullahi, Y. Baashar, H. Alhussian, A. Alwadain, N. Aziz, L. F. Capretz, et al. "Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review," Electronics, 2022, vol. 11, no 2, p. 198. [CrossRef] [Web of Science Times Cited 84] [SCOPUS Times Cited 159] [9] M. Abdullahi, Y. Baashar, H. Alhussian, A. Alwadain, N. Aziz, L. F. Capretz, et al., "Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review". Electronics, 2022, vol. 11, no 2, p. 198. [CrossRef] [Web of Science Times Cited 84] [SCOPUS Times Cited 159] [10] J. Du, K. Yang, Y. Hu, L. Jiang, "Nids-cnnlstm: Network intrusion detection classification model based on deep learning," IEEE Access, 2023, vol. 11, p. 24808-24821. [CrossRef] [Web of Science Times Cited 22] [SCOPUS Times Cited 40] [11] A. Heidari, M. A. Jabraeil Jamali. "Internet of things intrusion detection systems: A comprehensive review and future directions," Cluster Computing, 2023, vol. 26, no 6, p. 3753-3780. [CrossRef] [Web of Science Times Cited 68] [SCOPUS Times Cited 77] [12] O. Aslan, S. S. Aktug, M. Ozkan-Okay, A. A. Yilmaz, E. Akin, "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions," Electronics, 2023, vol. 12, no 6, p. 1333. [CrossRef] [Web of Science Times Cited 45] [SCOPUS Times Cited 109] [13] A. S. Rajasekaran, M. Azees, F. Al-Turjman, "A comprehensive survey on security issues in vehicle-to-grid networks," Journal of Control and Decision, 2023, vol. 10, no 2, p. 150-159. [CrossRef] [Web of Science Times Cited 15] [SCOPUS Times Cited 20] [14] Y. Shang, Z. Li, S. Li, Z. Shao and L. Jian, "An information security solution for vehicle-to-grid scheduling by distributed edge computing and federated deep learning," in IEEE Transactions on Industry Applications, 2024, pp. 1-15. [CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 3] [15] W. J. Bell, L. M. Roth, C. A. Nalepa, "Cockroaches: ecology, behavior, and natural history," JHU Press, 2007. [CrossRef] [16] L. Attanasio, M. Conti, D. Donadel, F. Turrin, "MiniV2G: an electric vehicle charging emulator," In: Proceedings of the 7th ACM on Cyber-Physical System Security Workshop. 2021. p. 65-73. [CrossRef] [SCOPUS Times Cited 6] [17] B. H. Ali, N. Sulaiman, S. A. R. Al-Haddad, R. Atan, S. L. M. Hassan, "DDoS detection using active and idle features of revised CICFlowMeter and statistical approaches," In: 2022 4th International Conference on Advanced Science and Engineering (ICOASE). IEEE, 2022. p. 148-153. [CrossRef] [SCOPUS Times Cited 3] [18] S. Kumar, S. Gupta, S. Arora, "A comparative simulation of normalization methods for machine learning-based intrusion detection systems using KDD Cup'99 dataset," Journal of Intelligent & Fuzzy Systems, 2022, vol. 42, no 3, p. 1749-1766. [CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 11] [19] N. A. Solekha, "Analysis of NSL-KDD dataset for classification of attacks based on intrusion detection system using binary logistics and multinomial logistics," In: Seminar Nasional Official Statistics. 2022. p. 507-520. [CrossRef] [20] Y. F. Sallam, S. Abd El-Nabi, W. El-Shafai, H. E. H. Ahmed, A. Saleeb, N. A. El-Bahnasawy, "Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset," Security and Privacy, 2023, vol. 6, no 5, p. e300. [CrossRef] [Web of Science Times Cited 3] [21] K. Bao, H. Valev, M. Wagner, H. Schmeck, "A threat analysis of the vehicle-to-grid charging protocol ISO 15118," Computer Science-Research and Development, 2018, vol. 33, no 1-2, p. 3-12. [CrossRef] [Web of Science Times Cited 31] [SCOPUS Times Cited 45] [22] T. Z. Nonvignon, A. B. Boucif, M. Mhamed, "A copula-based attack prediction model for vehicle-to-grid networks," Applied Sciences, 2022, vol. 12, no 8, p. 3830. [CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 4] [23] N. Sultana, N. Chilamkurti, W. Peng, R. Alhadad, "Survey on SDN based network intrusion detection system using machine learning approaches," Peer-to-Peer Networking and Applications, 2019, vol. 12, p. 493-501. [CrossRef] [Web of Science Times Cited 163] [SCOPUS Times Cited 372] [24] L. F. A Roman, P. R. L. Gondim, J. Lloret, "Pairing-based authentication protocol for V2G networks in smart grid," Ad Hoc Networks, 2019, vol. 90, p. 101745. [CrossRef] [Web of Science Times Cited 33] [SCOPUS Times Cited 43] [25] K. Park, Y. Park, A. K. Das, S. Yu, J. Lee, Y. Par, "A dynamic privacy-preserving key management protocol for V2G in social internet of things," IEEE Access, 2019, vol. 7, p. 76812-76832. [CrossRef] [Web of Science Times Cited 42] [SCOPUS Times Cited 50] [26] G. A. Kaya, A. Badwan,"Fuzzy rule based classification system from vehicle-to-grid data," In: 2021 9th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2021. p. 1-7. [CrossRef] [Web of Science Times Cited 1] [SCOPUS Times Cited 1] [27] M. Basnet, M. H. Ali, "Deep learning-based intrusion detection system for electric vehicle charging station," In: 2020 2nd International Conference on Smart Power & Internet Energy Systems (SPIES). IEEE, 2020. p. 408-413. [CrossRef] [SCOPUS Times Cited 45] [28] S. Irum, B. Moomal, U. Mukhtar, et al., "Threats, Vulnerabilities, and Mitigation in V2G Networks," In: Planning and Operation of Electric Vehicles in Smart Grids. Cham: Springer Nature Switzerland, 2023. p. 1-30. [CrossRef] [SCOPUS Record] Web of Science® Citations for all references: 826 TCR SCOPUS® Citations for all references: 1,480 TCR Web of Science® Average Citations per reference: 28 ACR SCOPUS® Average Citations per reference: 51 ACR TCR = Total Citations for References / ACR = Average Citations per Reference We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more Citations for references updated on 2024-11-02 12:39 in 189 seconds. Note1: Web of Science® is a registered trademark of Clarivate Analytics. Note2: SCOPUS® is a registered trademark of Elsevier B.V. Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site. |
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.