• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过使用无监督自动编码器方法检测基于网络的网络攻击来增强虚拟发电厂的网络安全。

Enhancing cybersecurity in virtual power plants by detecting network based cyber attacks using an unsupervised autoencoder approach.

作者信息

Singh Kumari Nutan, Goswami Arup Kumar, Chudhury Nalin Behari Dev, Shuaibu Hassan Abdurrahman, Ustun Taha Selim

机构信息

Electrical Engineering Department, National Institute of Technology Silchar, Assam, 78801, India.

Department of Electrical, Telecommunications and Computer Engineering, Kampala International University, Kampala, Uganda.

出版信息

Sci Rep. 2025 Sep 5;15(1):32374. doi: 10.1038/s41598-025-01863-w.

DOI:10.1038/s41598-025-01863-w
PMID:40913053
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12413436/
Abstract

The increasing adoption of the Internet of Things (IoT) in energy systems has brought significant advancements but also heightened cyber security risks. Virtual Power Plants (VPPs), which aggregate distributed renewable energy resources into a single entity for participation in energy markets, are particularly vulnerable to cyber-attacks due to their reliance on modern information and communication technologies. Cyber-attacks targeting devices, networks, or specific goals can compromise system integrity. Common attack types include Denial of Service (DoS), Man-in-the-Middle (MITM), and False Data Injection Attacks (FDIA).Among these threats, FDIA are especially concerning as they manipulate critical operational data, such as bid prices and energy quantities, to disrupt system reliability, market stability, and financial performance. This study proposes an unsupervised Autoencoder (AE) deep learning approach to detect FDIA in VPP systems. The methodology is validated on a 9-bus and IEEE-39 bus test system modeled in MATLAB Simulink, encompassing renewable energy sources, energy storage systems, and variable loads. Time-series data generated over 1,000 days is used for training, validation, and testing the AE model. The results demonstrate the model's ability to detect anomalies with high accuracy by analyzing reconstruction errors. By identifying false data, the approach ensures system reliability, protects against financial losses, and maintains energy market stability. This work highlights the importance of advanced machine learning techniques in enhancing cyber security for IoT-based energy systems and ensuring secure VPP operations.

摘要

物联网(IoT)在能源系统中的应用日益广泛,带来了显著进步,但也增加了网络安全风险。虚拟电厂(VPP)将分布式可再生能源资源整合为一个单一实体以参与能源市场,由于其依赖现代信息和通信技术,特别容易受到网络攻击。针对设备、网络或特定目标的网络攻击可能会损害系统完整性。常见的攻击类型包括拒绝服务(DoS)、中间人攻击(MITM)和虚假数据注入攻击(FDIA)。在这些威胁中,FDIA尤其令人担忧,因为它们会操纵关键运营数据,如投标价格和电量,以破坏系统可靠性、市场稳定性和财务绩效。本研究提出了一种无监督自动编码器(AE)深度学习方法来检测VPP系统中的FDIA。该方法在MATLAB Simulink中建模的9节点和IEEE - 39节点测试系统上进行了验证,该系统包含可再生能源、储能系统和可变负载。通过1000天生成的时间序列数据用于训练、验证和测试AE模型。结果表明,该模型能够通过分析重构误差以高精度检测异常。通过识别虚假数据,该方法确保了系统可靠性,防止了财务损失,并维持了能源市场稳定性。这项工作突出了先进机器学习技术在增强基于物联网的能源系统网络安全和确保VPP安全运行方面的重要性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/b1dd99f15281/41598_2025_1863_Fig25_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/7afc06d70cd7/41598_2025_1863_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/2daaf576a245/41598_2025_1863_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/e3bd9b7f8205/41598_2025_1863_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/3ff691777353/41598_2025_1863_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/2aa849d7286e/41598_2025_1863_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/216966dc2705/41598_2025_1863_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/93fe6b18c60b/41598_2025_1863_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/2dcdf8d85684/41598_2025_1863_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/cc15519b29de/41598_2025_1863_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/0207ef60fa27/41598_2025_1863_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/07c474db2b0b/41598_2025_1863_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/3c80fa013251/41598_2025_1863_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/b765efe7578c/41598_2025_1863_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/72384d6755c8/41598_2025_1863_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/929d691c75a4/41598_2025_1863_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/94b08f8cd461/41598_2025_1863_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/833684938016/41598_2025_1863_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/1e791e546f60/41598_2025_1863_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/5600929a9561/41598_2025_1863_Fig19_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/5764c772f7bd/41598_2025_1863_Fig20_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/163f39f0c0e6/41598_2025_1863_Fig21_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/3c744901b544/41598_2025_1863_Fig22_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/acc75e78aeb5/41598_2025_1863_Fig23_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/26e89ca77d30/41598_2025_1863_Fig24_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/b1dd99f15281/41598_2025_1863_Fig25_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/7afc06d70cd7/41598_2025_1863_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/2daaf576a245/41598_2025_1863_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/e3bd9b7f8205/41598_2025_1863_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/3ff691777353/41598_2025_1863_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/2aa849d7286e/41598_2025_1863_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/216966dc2705/41598_2025_1863_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/93fe6b18c60b/41598_2025_1863_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/2dcdf8d85684/41598_2025_1863_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/cc15519b29de/41598_2025_1863_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/0207ef60fa27/41598_2025_1863_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/07c474db2b0b/41598_2025_1863_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/3c80fa013251/41598_2025_1863_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/b765efe7578c/41598_2025_1863_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/72384d6755c8/41598_2025_1863_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/929d691c75a4/41598_2025_1863_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/94b08f8cd461/41598_2025_1863_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/833684938016/41598_2025_1863_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/1e791e546f60/41598_2025_1863_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/5600929a9561/41598_2025_1863_Fig19_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/5764c772f7bd/41598_2025_1863_Fig20_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/163f39f0c0e6/41598_2025_1863_Fig21_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/3c744901b544/41598_2025_1863_Fig22_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/acc75e78aeb5/41598_2025_1863_Fig23_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/26e89ca77d30/41598_2025_1863_Fig24_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4408/12413436/b1dd99f15281/41598_2025_1863_Fig25_HTML.jpg

相似文献

1
Enhancing cybersecurity in virtual power plants by detecting network based cyber attacks using an unsupervised autoencoder approach.通过使用无监督自动编码器方法检测基于网络的网络攻击来增强虚拟发电厂的网络安全。
Sci Rep. 2025 Sep 5;15(1):32374. doi: 10.1038/s41598-025-01863-w.
2
Prescription of Controlled Substances: Benefits and Risks管制药品的处方:益处与风险
3
Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security.利用基于深度神经网络和区块链的网络安全增强物联网(IoT)中的异常检测与预防。
Sci Rep. 2025 Jul 1;15(1):22369. doi: 10.1038/s41598-025-04164-4.
4
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
5
Robust operation of renewable virtual power plant in intelligent distribution system considering active and reactive ancillary services markets.考虑有功和无功辅助服务市场的智能配电系统中可再生虚拟电厂的稳健运行
Sci Rep. 2025 Jul 2;15(1):22693. doi: 10.1038/s41598-025-06501-z.
6
Short-Term Memory Impairment短期记忆障碍
7
Botnet detection in internet of things using stacked ensemble learning model.使用堆叠集成学习模型的物联网僵尸网络检测
Sci Rep. 2025 Jul 1;15(1):21012. doi: 10.1038/s41598-025-02008-9.
8
A deep dive into artificial intelligence with enhanced optimization-based security breach detection in internet of health things enabled smart city environment.在支持智慧城市环境的健康物联网中,通过基于增强优化的安全漏洞检测深入探讨人工智能。
Sci Rep. 2025 Jul 2;15(1):22909. doi: 10.1038/s41598-025-05850-z.
9
Management of urinary stones by experts in stone disease (ESD 2025).结石病专家对尿路结石的管理(2025年结石病专家共识)
Arch Ital Urol Androl. 2025 Jun 30;97(2):14085. doi: 10.4081/aiua.2025.14085.
10
Healthcare workers' informal uses of mobile phones and other mobile devices to support their work: a qualitative evidence synthesis.医护人员非正规使用手机和其他移动设备来支持工作:定性证据综合评价。
Cochrane Database Syst Rev. 2024 Aug 27;8(8):CD015705. doi: 10.1002/14651858.CD015705.pub2.

本文引用的文献

1
Detection of False Data Injection Attacks in Smart Grids Based on Expectation Maximization.基于期望最大化的智能电网虚假数据注入攻击检测。
Sensors (Basel). 2023 Feb 3;23(3):1683. doi: 10.3390/s23031683.
2
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?能源领域(虚拟发电厂)中的网络安全挑战——边缘计算原理能否用于增强安全性?
Energy Inform. 2021;4(1):5. doi: 10.1186/s42162-021-00139-7. Epub 2021 Mar 31.
3
Unsupervised Pre-training of a Deep LSTM-based Stacked Autoencoder for Multivariate Time Series Forecasting Problems.
基于深度 LSTM 的堆叠自动编码器的无监督预训练用于多元时间序列预测问题。
Sci Rep. 2019 Dec 13;9(1):19038. doi: 10.1038/s41598-019-55320-6.
4
Machine Learning Methods for Attack Detection in the Smart Grid.机器学习方法在智能电网中的攻击检测。
IEEE Trans Neural Netw Learn Syst. 2016 Aug;27(8):1773-86. doi: 10.1109/TNNLS.2015.2404803. Epub 2015 Mar 19.