Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A quantum-based approach for offensive security against cyber attacks in electrical infrastructure

Published: 01 March 2023 Publication History

Abstract

Deciding the correct offensive security strategy for safeguarding the electrical physical infrastructures of smart grids is a challenging task. The offensive security training against various cyber-attacks focuses on a multitude of electrical subsystems and measurement systems like the Load Frequency Control(LFC) system. Primarily, the principal challenge is to categorize and parameterize the various possible cyber-attacks on electrical infrastructures. This is done by specifying and selecting cyber-attacks considering various main and subsystem blocks of the power structural system within each area of major installations. In this research investigation, formal modeling of security strategy is proposed using Lambda calculus with both classical and quantum perspectives. Furthermore, using a Quantum Machine Learning (QML) technique, the procedure for correct vulnerability prediction, exploitation, and execution strategy is presented with an approximated likelihood of attack and its mode. The local and non-local interactions are introduced as quantum threats and entanglement threats similar to False Data Injection (FDI) methods to induce the attack and counter-attack events through quantum causality connections. Finally, the Quirk simulator is used to validate the proposed quantum design of offensive and defensive attack models considering scenarios of exogenous and scaling attacks on the LFC systems that support the feasibility of the present research work to address the issue of cyber-attacks on the power system networks.

Highlights

In this research investigation, a formal modeling of security strategy is proposed using Lambda calculus with both classical and quantum perspectives.
Furthermore, using a quantum machine learning technique, the procedure for correct vulnerability prediction, exploitation, and execution strategy is presented with an approximated likelihood of attack and its mode. The local and non-local interactions are introduced as quantum threats and entanglement threats similar to false data injection (FDI) methods to induce the attack and counter-attack events through quantum causality connections.
Finally, the Quirk simulator is used to validate the proposed quantum design of offensive and defensive attack models considering scenarios of exogenous and scaling attacks on LFC system that support the feasibility of the present research work to address the issue of cyber-attacks on the power system networks.

References

[2]
Marco G.D., Loia V., Karimipour H., Siano P., Assessing insider attacks and privacy leakage in managed IoT systems for residential prosumers, Energies 14 (2021) 2385.
[3]
Abbaspour A., Sargolzaei A., Forouzannezhad P., Yen K.K., Sarwat A.I., Resilient control design for load frequency control system under false data injection attacks, IEEE Trans. Ind. Electron. 67 (9) (2020) 7951–7962.
[4]
Alhelou H.H., Hamedani-Golshan M.E., Zamani R., Forushani E.H., Siano P., Challenges and opportunities of load frequency control in conventional, modern and future smart power systems: A comprehensive review, Energies 11 (10) (2018) 2497.
[5]
Mohan A.M., M N., Mehrjerdi H., A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems, Energies 13 (2020) 1–33.
[6]
Nazir S., Hamdoun H., Alzubi J., Cyber attack challenges and resilience for smart grids, Eur. J. Sci. Res. 134 (1) (2015) 111–120.
[7]
El Mrabet Z., Kaabouch N., Ghazi E.H., Ghazi E.H., Cyber security in smart grid: Survey and challenges, Comput. Electr. Eng. 67 (2018) 469–482.
[8]
Faquir D., Chouliaras N., Sofia V., Olga K., Maglaras L., Cybersecurity in smart grids, challenges and solutions, AIMS Electron. Electr. Eng. 5 (1) (2021) 24–37.
[9]
Syrmakesis A.D., Alcaraz C., Hatziargyriou N.D., Classifying resilience approaches for protecting smart grids against cyber threats, Int. J. Inf. Secur. 21 (2022) 1189–1210.
[10]
M.J. Hossain Faruk, S. Tahora, M. Tasnim, H. Shahriar, N. Sakib, A Review of Quantum Cybersecurity: Threats, Risks and Opportunities, in: 1st International Conference on AI in Cybersecurity, ICAIC, 2022, pp. 1–8, https://doi.org/10.1109/ICAIC53980.2022.9896970.
[11]
Ullah M.H., Eskandarpour R., Zheng H., Khodaei A., Quantum computing for smart grid applications, IET Gener. Transm. Distrib. 16 (21) (2022) 4239–4257.
[12]
Habibi M.R., Golestan S., Soltanmanesh A., Guerrero J.M., Vasquez J.C., Power and energy applications based on quantum computing: The possible potentials of grover’s algorithm, Electronics 11 (2022) 2919,.
[13]
Alshowkan M., Evans P.G., Starke M., Earl D., Peters N.A., Authentication of smart grid communications using quantum key distribution, Sci. Rep. 12 (1) (2022) 1–13.
[14]
Tang Z., Qin Y., Jiang Z., Krawec W.O., Zhang P., Quantum-secure microgrid, IEEE Trans. Power Syst. 36 (2) (2020) 1250–1263.
[15]
Barbeau Michel, Garcia-Alfaro Joaquin, Cyber-physical defense in the quantum era, Sci. Rep. 12 (2022) 1905,.
[16]
Payares E.D., Martinez-Santos J.C., Quantum machine learning for intrusion detection of distributed denial of service attacks: a comparative overview, in: Proc. SPIE 11699, Quantum Computing, Communication, and Simulation, Vol. 116990B, 2021,.
[17]
Mohammadi F., Emerging challenges in smart grid cybersecurity enhancement: A review, Energies 14 (2021) 1380.
[18]
Ghafouri M., Au M., Kassouf M., Debbabi M., Assi C., Yan J., Detection and mitigation of cyber attacks on voltage stability monitoring of smart grids, IEEE Trans. Smart Grid 11 (6) (2020) 5227–5238.
[19]
Sridhar S., Govindarasu M., Model-based attack detection and mitigation for automatic generation control, IEEE Trans. Smart Grid 5 (2) (2014) 580–591.
[20]
Chen C., Cui M., Wang X., Zhang K., Yin S., An investigation of coordinated attack on load frequency control, IEEE Access 6 (2018) 30414–30423.
[21]
Lu K., Zeng G., Luo X., Weng J., Zhang Y., Li M., An adaptive resilient load frequency controller for smart grids with DoS attacks, IEEE Trans. Veh. Technol. 69 (5) (2020) 4689–4699.
[22]
Saxena S., Bhatia S., Gupta R., Cybersecurity analysis of load frequency control in power systems: A survey, Designs 5 (2021) 52,.
[23]
Chen C., Zhang K., Yuan K., Zhu L., Qian M., Novel detection scheme design considering cyber attacks on load frequency control, IEEE Trans. Ind. Inform. 14 (5) (2018) 1932–1941.
[24]
Hug G., Giampapa J.A., Vulnerability assessment of ac state estimation with respect to false data injection cyber-attacks, IEEE Trans. Smart Grid 3 (3) (2012) 1362–1370.
[25]
Bi W., Zhang K., Chen C., Cyber attack detection scheme for a load frequency control system based on dual-source data of compromised variables, Appl. Sci. 11 (2021) 1584.
[26]
C.P. Williams, S.H. Cleanwater, Explorations in Quantum Computing, Springer-Verlag, New York, USA, ISBN: 0-387-94768-X.
[27]
Quantum States, https://www2.ph.ed.ac.uk > docs>QM> LECT1-2.
[28]
Winter B.K., Causality and quantum theory, 2017, arXiv:1705.07201 [quant-ph].
[29]
Schuld M., Supervised quantum machine learning models are kernel methods, 2021, pp. 1–25. arXiv:2101.11020v2 [quant-ph].
[30]
J.D. Hidary, Quantum Computing: An Applied Approach, Springer-Verlag, CA, USA, ISBN: 978-3-030-23921-3.
[31]
Rahman M., Paul G., Quantum attacks on HCTR and its variants, quantum computing, IEEE Trans. Quant. Eng. 1 (2020) 1–8.
[33]
Adcock J.C., et al., Advances in quantum machine learning, 2015, pp. 1–38. arXiv:1512.02900v1 [quant-ph].
[34]
Wiebe N., Kumar R.S.S., Hardening quantum machine learning against adversaries, New J. Phys. 20 (2018) 1–26.
[35]
Pichler H., et al., Universal photonic quantum computation via time-delayed feedback, Proc. Natl. Acad. Sci. USA 114 (43) (2017) 1–6.
[36]
Wiebe N., Kapoor Ashish, Svore K.M., Quantum nearest-neighbor algorithms for machine learning, Quantum Inf. Comput. 15 (2018) 2027–2070.
[37]
X. Cai, F. Nie, H. Huang, Multi-View K-Means Clustering on Big Data, in: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, 2013, pp. 2598–2604.
[38]
Alvarez-Rodriguez U., Lamata L., Supervised quantum learning without measurements, 2017, pp. 1–10. arXiv:1612.05535v2 [quant-ph].

Cited By

View all
  • (2024)An interval-valued spherical fuzzy CIMAS-WISP group decision-analytic model for blockchain platform selection in digital projectsApplied Soft Computing10.1016/j.asoc.2024.111810162:COnline publication date: 1-Sep-2024
  • (2024)Virtual special issue on quantum inspired soft computing for intelligent data processing guest editorialApplied Soft Computing10.1016/j.asoc.2023.111156151:COnline publication date: 17-Apr-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Applied Soft Computing
Applied Soft Computing  Volume 136, Issue C
Mar 2023
1100 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 March 2023

Author Tags

  1. Cybersecurity
  2. False data injection
  3. Load frequency control
  4. Local interactions and entanglements
  5. Quantum computing
  6. Quantum machine learning
  7. Smart grid

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)An interval-valued spherical fuzzy CIMAS-WISP group decision-analytic model for blockchain platform selection in digital projectsApplied Soft Computing10.1016/j.asoc.2024.111810162:COnline publication date: 1-Sep-2024
  • (2024)Virtual special issue on quantum inspired soft computing for intelligent data processing guest editorialApplied Soft Computing10.1016/j.asoc.2023.111156151:COnline publication date: 17-Apr-2024

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media