Loading…

A Trojan Attack against Smart Grid Federated Learning and Countermeasures

In smart power grid, consumers can hack their smart meters to report low electricity consumption readings to reduce their bills launching electricity theft cyberattacks. This study investigates a Trojan attack in federated learning of a detector for electricity theft. In this attack, dishonest consu...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2024-12, Vol.12, p.1-1
Main Authors: Bondok, Atef H., Badr, Mahmoud M., Mahmoud, Mohamed, El-Toukhy, Ahmed T., Alsabaan, Maazen, Amsaad, Fathi, Ibrahem, Mohamed I.
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In smart power grid, consumers can hack their smart meters to report low electricity consumption readings to reduce their bills launching electricity theft cyberattacks. This study investigates a Trojan attack in federated learning of a detector for electricity theft. In this attack, dishonest consumers train the detector on false data to later bypass detection, without degrading the detector's overall performance. We propose three defense strategies: Redundancy, Med-Selection and Combined-Selection . In the Redundancy approach, redundant consumers with similar consumption patterns are included in the federated learning process, so their correct data offsets the attackers' false data when the local models are aggregated. Med-Selection selects the median model parameters of consumers with similar usage patterns to reduce outlier influence. In Combined-Selection , we compare gradients from consumers with same consumption patterns to the median of all local models, leveraging the fact that honest consumers' gradients are closer to the median while malicious ones deviate. Our experiments using real-world data show the Trojan attack's success rate can reach 90%. However, our defense methods reduce the attack success rate to about 7%, 4%, and 3.3% for Redundancy, Med-Selection , and Combined-Selection , respectively, when 10% of consumers are malicious.
ISSN:2169-3536
DOI:10.1109/ACCESS.2024.3515099